| /* |
| * Copyright (C) 2011 Google Inc. All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * 1. Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * 2. Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in the |
| * documentation and/or other materials provided with the distribution. |
| * |
| * THIS SOFTWARE IS PROVIDED BY GOOGLE, INC. ``AS IS'' AND ANY |
| * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
| * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR |
| * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, |
| * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, |
| * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR |
| * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY |
| * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
| * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| * |
| */ |
| |
| #include "config.h" |
| #include "SecurityContext.h" |
| |
| #include "ContentSecurityPolicy.h" |
| #include "IntegrityPolicy.h" |
| #include "PolicyContainer.h" |
| #include "SecurityOrigin.h" |
| #include "SecurityOriginPolicy.h" |
| #include <wtf/text/StringBuilder.h> |
| |
| namespace WebCore { |
| |
| SecurityContext::SecurityContext() = default; |
| |
| SecurityContext::~SecurityContext() = default; |
| |
| void SecurityContext::setSecurityOriginPolicy(RefPtr<SecurityOriginPolicy>&& securityOriginPolicy) |
| { |
| auto currentOrigin = securityOrigin() ? securityOrigin()->data() : SecurityOriginData { }; |
| bool haveInitializedSecurityOrigin = std::exchange(m_haveInitializedSecurityOrigin, true); |
| |
| m_securityOriginPolicy = WTF::move(securityOriginPolicy); |
| m_hasEmptySecurityOriginPolicy = false; |
| |
| auto origin = securityOrigin() ? securityOrigin()->data() : SecurityOriginData { }; |
| if (!haveInitializedSecurityOrigin || currentOrigin != origin) |
| securityOriginDidChange(); |
| } |
| |
| ContentSecurityPolicy* SecurityContext::contentSecurityPolicy() |
| { |
| if (!m_contentSecurityPolicy && m_hasEmptyContentSecurityPolicy) |
| m_contentSecurityPolicy = makeEmptyContentSecurityPolicy(); |
| return m_contentSecurityPolicy.get(); |
| } |
| |
| SecurityOrigin* SecurityContext::securityOrigin() const |
| { |
| RefPtr policy = securityOriginPolicy(); |
| if (!policy) |
| return nullptr; |
| return &policy->origin(); |
| } |
| |
| RefPtr<SecurityOrigin> SecurityContext::protectedSecurityOrigin() const |
| { |
| return securityOrigin(); |
| } |
| |
| SecurityOriginPolicy* SecurityContext::securityOriginPolicy() const |
| { |
| if (!m_securityOriginPolicy && m_hasEmptySecurityOriginPolicy) |
| const_cast<SecurityContext&>(*this).m_securityOriginPolicy = SecurityOriginPolicy::create(SecurityOrigin::createOpaque()); |
| return m_securityOriginPolicy.get(); |
| } |
| |
| void SecurityContext::setContentSecurityPolicy(std::unique_ptr<ContentSecurityPolicy>&& contentSecurityPolicy) |
| { |
| m_contentSecurityPolicy = WTF::move(contentSecurityPolicy); |
| m_hasEmptyContentSecurityPolicy = false; |
| } |
| |
| bool SecurityContext::isSecureTransitionTo(const URL& url) const |
| { |
| // If we haven't initialized our security origin by now, this is probably |
| // a new window created via the API (i.e., that lacks an origin and lacks |
| // a place to inherit the origin from). |
| if (!haveInitializedSecurityOrigin()) |
| return true; |
| |
| return securityOriginPolicy()->origin().isSameOriginDomain(SecurityOrigin::create(url).get()); |
| } |
| |
| void SecurityContext::enforceSandboxFlags(SandboxFlags flags, SandboxFlagsSource source) |
| { |
| if (source != SandboxFlagsSource::CSP) |
| m_creationSandboxFlags.add(flags); |
| m_sandboxFlags.add(flags); |
| |
| // The SandboxFlag::Origin is stored redundantly in the security origin. |
| if (isSandboxed(SandboxFlag::Origin) && securityOriginPolicy() && !securityOriginPolicy()->origin().isOpaque()) |
| setSecurityOriginPolicy(SecurityOriginPolicy::create(SecurityOrigin::createOpaque())); |
| } |
| |
| bool SecurityContext::isSupportedSandboxPolicy(StringView policy) |
| { |
| static constexpr std::array supportedPolicies { |
| "allow-top-navigation-to-custom-protocols"_s, "allow-forms"_s, "allow-same-origin"_s, "allow-scripts"_s, |
| "allow-top-navigation"_s, "allow-pointer-lock"_s, "allow-popups"_s, "allow-popups-to-escape-sandbox"_s, |
| "allow-top-navigation-by-user-activation"_s, "allow-modals"_s, "allow-storage-access-by-user-activation"_s, |
| "allow-downloads"_s |
| }; |
| |
| for (auto supportedPolicy : supportedPolicies) { |
| if (equalIgnoringASCIICase(policy, supportedPolicy)) |
| return true; |
| } |
| return false; |
| } |
| |
| // Keep SecurityContext::isSupportedSandboxPolicy() in sync when updating this function. |
| SandboxFlags SecurityContext::parseSandboxPolicy(StringView policy, String& invalidTokensErrorMessage) |
| { |
| // http://www.w3.org/TR/html5/the-iframe-element.html#attr-iframe-sandbox |
| // Parse the unordered set of unique space-separated tokens. |
| SandboxFlags flags = SandboxFlags::all(); |
| unsigned length = policy.length(); |
| unsigned start = 0; |
| unsigned numberOfTokenErrors = 0; |
| StringBuilder tokenErrors; |
| while (true) { |
| while (start < length && isASCIIWhitespace(policy[start])) |
| ++start; |
| if (start >= length) |
| break; |
| unsigned end = start + 1; |
| while (end < length && !isASCIIWhitespace(policy[end])) |
| ++end; |
| |
| // Turn off the corresponding sandbox flag if it's set as "allowed". |
| auto sandboxToken = policy.substring(start, end - start); |
| if (equalLettersIgnoringASCIICase(sandboxToken, "allow-same-origin"_s)) |
| flags.remove(SandboxFlag::Origin); |
| else if (equalLettersIgnoringASCIICase(sandboxToken, "allow-downloads"_s)) |
| flags.remove(SandboxFlag::Downloads); |
| else if (equalLettersIgnoringASCIICase(sandboxToken, "allow-forms"_s)) |
| flags.remove(SandboxFlag::Forms); |
| else if (equalLettersIgnoringASCIICase(sandboxToken, "allow-scripts"_s)) { |
| flags.remove(SandboxFlag::Scripts); |
| flags.remove(SandboxFlag::AutomaticFeatures); |
| } else if (equalLettersIgnoringASCIICase(sandboxToken, "allow-top-navigation"_s)) { |
| flags.remove(SandboxFlag::TopNavigation); |
| flags.remove(SandboxFlag::TopNavigationByUserActivation); |
| } else if (equalLettersIgnoringASCIICase(sandboxToken, "allow-popups"_s)) |
| flags.remove(SandboxFlag::Popups); |
| else if (equalLettersIgnoringASCIICase(sandboxToken, "allow-pointer-lock"_s)) |
| flags.remove(SandboxFlag::PointerLock); |
| else if (equalLettersIgnoringASCIICase(sandboxToken, "allow-popups-to-escape-sandbox"_s)) |
| flags.remove(SandboxFlag::PropagatesToAuxiliaryBrowsingContexts); |
| else if (equalLettersIgnoringASCIICase(sandboxToken, "allow-top-navigation-by-user-activation"_s)) |
| flags.remove(SandboxFlag::TopNavigationByUserActivation); |
| else if (equalLettersIgnoringASCIICase(sandboxToken, "allow-top-navigation-to-custom-protocols"_s)) |
| flags.remove(SandboxFlag::TopNavigationToCustomProtocols); |
| else if (equalLettersIgnoringASCIICase(sandboxToken, "allow-modals"_s)) |
| flags.remove(SandboxFlag::Modals); |
| else if (equalLettersIgnoringASCIICase(sandboxToken, "allow-storage-access-by-user-activation"_s)) |
| flags.remove(SandboxFlag::StorageAccessByUserActivation); |
| else { |
| if (numberOfTokenErrors) |
| tokenErrors.append(", '"_s); |
| else |
| tokenErrors.append('\''); |
| tokenErrors.append(sandboxToken, '\''); |
| numberOfTokenErrors++; |
| } |
| |
| start = end + 1; |
| } |
| |
| if (numberOfTokenErrors) { |
| if (numberOfTokenErrors > 1) |
| tokenErrors.append(" are invalid sandbox flags."_s); |
| else |
| tokenErrors.append(" is an invalid sandbox flag."_s); |
| invalidTokensErrorMessage = tokenErrors.toString(); |
| } |
| |
| return flags; |
| } |
| |
| void SecurityContext::setReferrerPolicy(ReferrerPolicy referrerPolicy) |
| { |
| // Do not override existing referrer policy with the "empty string" one as the "empty string" means we should use |
| // the policy defined elsewhere. |
| if (referrerPolicy == ReferrerPolicy::EmptyString) |
| return; |
| |
| m_referrerPolicy = referrerPolicy; |
| } |
| |
| PolicyContainer SecurityContext::policyContainer() const |
| { |
| ASSERT(m_contentSecurityPolicy); |
| return { |
| CheckedRef { *m_contentSecurityPolicy }->responseHeaders(), |
| crossOriginEmbedderPolicy(), |
| crossOriginOpenerPolicy(), |
| referrerPolicy(), |
| ipAddressSpace() |
| }; |
| } |
| |
| void SecurityContext::inheritPolicyContainerFrom(const PolicyContainer& policyContainer) |
| { |
| if (!contentSecurityPolicy()) |
| setContentSecurityPolicy(makeUnique<ContentSecurityPolicy>(URL { }, nullptr, nullptr)); |
| |
| checkedContentSecurityPolicy()->inheritHeadersFrom(policyContainer.contentSecurityPolicyResponseHeaders); |
| setCrossOriginOpenerPolicy(policyContainer.crossOriginOpenerPolicy); |
| setCrossOriginEmbedderPolicy(policyContainer.crossOriginEmbedderPolicy); |
| setReferrerPolicy(policyContainer.referrerPolicy); |
| setIPAddressSpace(policyContainer.ipAddressSpace); |
| } |
| |
| CheckedPtr<ContentSecurityPolicy> SecurityContext::checkedContentSecurityPolicy() |
| { |
| return contentSecurityPolicy(); |
| } |
| |
| const IntegrityPolicy* SecurityContext::integrityPolicy() const |
| { |
| return m_integrityPolicy.get(); |
| } |
| |
| void SecurityContext::setIntegrityPolicy(std::unique_ptr<IntegrityPolicy>&& policy) |
| { |
| m_integrityPolicy = WTF::move(policy); |
| } |
| |
| const IntegrityPolicy* SecurityContext::integrityPolicyReportOnly() const |
| { |
| return m_integrityPolicyReportOnly.get(); |
| } |
| |
| void SecurityContext::setIntegrityPolicyReportOnly(std::unique_ptr<IntegrityPolicy>&& policy) |
| { |
| m_integrityPolicyReportOnly = WTF::move(policy); |
| } |
| |
| } // namespace WebCore |