OLD | NEW |
---|---|
1 /* | 1 /* |
2 * Copyright (C) 2012 Google Inc. All rights reserved. | 2 * Copyright (C) 2012 Google Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions | 5 * modification, are permitted provided that the following conditions |
6 * are met: | 6 * are met: |
7 * | 7 * |
8 * 1. Redistributions of source code must retain the above copyright | 8 * 1. Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * 2. Redistributions in binary form must reproduce the above copyright | 10 * 2. Redistributions in binary form must reproduce the above copyright |
(...skipping 40 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
51 // static | 51 // static |
52 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const K URL& url) | 52 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const K URL& url) |
53 { | 53 { |
54 if (securityOrigin->protocol() != "https") | 54 if (securityOrigin->protocol() != "https") |
55 return false; // We only care about HTTPS security origins. | 55 return false; // We only care about HTTPS security origins. |
56 | 56 |
57 // We're in a secure context, so |url| is mixed content if it's insecure. | 57 // We're in a secure context, so |url| is mixed content if it's insecure. |
58 return !SecurityOrigin::isSecure(url); | 58 return !SecurityOrigin::isSecure(url); |
59 } | 59 } |
60 | 60 |
61 bool MixedContentChecker::canDisplayInsecureContent(SecurityOrigin* securityOrig in, const KURL& url) const | 61 bool MixedContentChecker::canDisplayInsecureContentInternal(SecurityOrigin* secu rityOrigin, const KURL& url, bool isForm) const |
62 { | 62 { |
63 if (!isMixedContent(securityOrigin, url)) | 63 if (!isMixedContent(securityOrigin, url)) |
64 return true; | 64 return true; |
65 | 65 |
66 Settings* settings = m_frame->settings(); | 66 Settings* settings = m_frame->settings(); |
67 bool allowed = client()->allowDisplayingInsecureContent(settings && settings ->allowDisplayOfInsecureContent(), securityOrigin, url); | 67 bool allowed = client()->allowDisplayingInsecureContent(settings && settings ->allowDisplayOfInsecureContent(), securityOrigin, url); |
68 logWarning(allowed, "displayed", url); | 68 if (!isForm) |
69 logWarning(allowed, "displayed insecure content from", "loaded", url); | |
70 else | |
71 logWarning(allowed, "is submitting data to an insecure location at", "su bmitted", url); | |
69 | 72 |
70 if (allowed) | 73 if (allowed) |
71 client()->didDisplayInsecureContent(); | 74 client()->didDisplayInsecureContent(); |
72 | 75 |
73 return allowed; | 76 return allowed; |
74 } | 77 } |
75 | 78 |
76 bool MixedContentChecker::canRunInsecureContentInternal(SecurityOrigin* security Origin, const KURL& url, bool isWebSocket) const | 79 bool MixedContentChecker::canRunInsecureContentInternal(SecurityOrigin* security Origin, const KURL& url, bool isWebSocket) const |
77 { | 80 { |
78 if (!isMixedContent(securityOrigin, url)) | 81 if (!isMixedContent(securityOrigin, url)) |
79 return true; | 82 return true; |
80 | 83 |
81 Settings* settings = m_frame->settings(); | 84 Settings* settings = m_frame->settings(); |
82 bool allowedPerSettings = settings && (settings->allowRunningOfInsecureConte nt() || (isWebSocket && settings->allowConnectingInsecureWebSocket())); | 85 bool allowedPerSettings = settings && (settings->allowRunningOfInsecureConte nt() || (isWebSocket && settings->allowConnectingInsecureWebSocket())); |
83 bool allowed = client()->allowRunningInsecureContent(allowedPerSettings, sec urityOrigin, url); | 86 bool allowed = client()->allowRunningInsecureContent(allowedPerSettings, sec urityOrigin, url); |
84 logWarning(allowed, "ran", url); | 87 logWarning(allowed, "ran insecure content from", "loaded", url); |
85 | 88 |
86 if (allowed) | 89 if (allowed) |
87 client()->didRunInsecureContent(securityOrigin, url); | 90 client()->didRunInsecureContent(securityOrigin, url); |
88 | 91 |
89 return allowed; | 92 return allowed; |
90 } | 93 } |
91 | 94 |
92 void MixedContentChecker::logWarning(bool allowed, const String& action, const K URL& target) const | 95 void MixedContentChecker::logWarning(bool allowed, const String& action1, const String& action2, const KURL& target) const |
Mike West
2014/06/06 12:18:18
I'd prefer that we drop both strings, and turn thi
mhm
2014/06/06 19:11:59
Done.
| |
93 { | 96 { |
94 String message = String(allowed ? "" : "[blocked] ") + "The page at '" + m_f rame->document()->url().elidedString() + "' was loaded over HTTPS, but " + actio n + " insecure content from '" + target.elidedString() + "': this content should also be loaded over HTTPS.\n"; | 97 String message = String(allowed ? "" : "[blocked] ") + "The page at '" + m_f rame->document()->url().elidedString() + "' was loaded over HTTPS, but " + actio n1 + " '" + target.elidedString() + "': this content should also be " + action2 + " over HTTPS.\n"; |
95 MessageLevel messageLevel = allowed ? WarningMessageLevel : ErrorMessageLeve l; | 98 MessageLevel messageLevel = allowed ? WarningMessageLevel : ErrorMessageLeve l; |
96 m_frame->document()->addConsoleMessage(SecurityMessageSource, messageLevel, message); | 99 m_frame->document()->addConsoleMessage(SecurityMessageSource, messageLevel, message); |
97 } | 100 } |
98 | 101 |
99 } // namespace WebCore | 102 } // namespace WebCore |
OLD | NEW |