1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280
|
// Copyright 2021 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CONTENT_BROWSER_RENDERER_HOST_NAVIGATION_POLICY_CONTAINER_BUILDER_H_
#define CONTENT_BROWSER_RENDERER_HOST_NAVIGATION_POLICY_CONTAINER_BUILDER_H_
#include <memory>
#include "base/memory/scoped_refptr.h"
#include "base/unguessable_token.h"
#include "content/browser/renderer_host/policy_container_host.h"
#include "content/common/content_export.h"
#include "services/network/public/mojom/ip_address_space.mojom-forward.h"
#include "services/network/public/mojom/web_sandbox_flags.mojom-forward.h"
#include "third_party/blink/public/common/tokens/tokens.h"
#include "third_party/blink/public/mojom/frame/policy_container.mojom.h"
#include "url/gurl.h"
namespace content {
class FrameNavigationEntry;
class NavigationHandle;
class RenderFrameHostImpl;
class StoragePartition;
// Keeps track of a few important sets of policies during a navigation: those of
// the parent document, of the navigation initiator, etc. Computes the policies
// of the new document being navigated to, and creates the new document's
// `PolicyContainerHost`.
//
// Instances of this class live in `NavigationRequest`. They are instantiated
// when the `NavigationRequest` is constructed and destroyed at commit time.
//
// Setters can be called as the navigation progresses to record interesting
// properties for later.
//
// When the potential response to commit is known, `ComputePolicies()` can be
// called to set the final polices of the new document and create a new policy
// container host.
// For error documents, `ComputePoliciesForError()` should be used instead. It
// can also be called after `ComputePolicies()` in some cases when the error is
// only detected after receiving a response.
//
// At commit time, `TakePolicyContainerHost()` can be called to transfer
// ownership of the policy container host to the target `RenderFrameHostImpl`.
class CONTENT_EXPORT NavigationPolicyContainerBuilder {
public:
// All arguments may be nullptr and need only outlive this call.
//
// If `parent` is not nullptr, its policies are copied.
// If `initiator_frame_token` is not nullptr, the policies are copied from the
// corresponding RenderFrameHost.
// `initiator_process_id` is used with the frame token to look up the
// initiator frame.
// If `storage_partition` is not nullptr, it may contain a
// NavigationStateKeepAlive that is keeping the PolicyContainerHost of the
// initiator alive.
// If `history_entry` is not nullptr and contains policies, those are copied.
//
// This must only be called on the browser's UI thread.
NavigationPolicyContainerBuilder(
RenderFrameHostImpl* parent,
const blink::LocalFrameToken* initiator_frame_token,
int initiator_process_id,
StoragePartition* storage_partition,
const FrameNavigationEntry* history_entry);
~NavigationPolicyContainerBuilder();
// Instances of this class are neither copyable nor movable.
NavigationPolicyContainerBuilder(const NavigationPolicyContainerBuilder&) =
delete;
NavigationPolicyContainerBuilder& operator=(
const NavigationPolicyContainerBuilder&) = delete;
NavigationPolicyContainerBuilder(NavigationPolicyContainerBuilder&&) = delete;
NavigationPolicyContainerBuilder& operator=(
NavigationPolicyContainerBuilder&&) = delete;
// Returns a pointer to a snapshot of the parent's policies captured at
// construction time. Returns nullptr if there was no parent.
const PolicyContainerPolicies* ParentPolicies() const;
// Returns a pointer to a snapshot of the navigation initiator's policies
// captured at construction time. Returns nullptr if there was no initiator.
const PolicyContainerPolicies* InitiatorPolicies() const;
// Returns a pointer to a snapshot of the navigation history entry's policies
// captured at construction time. Returns nullptr if there was no entry, of
// if the entry had no policies.
const PolicyContainerPolicies* HistoryPolicies() const;
// Sets the cross origin opener policy of the new document.
//
// This must be called before `ComputePolicies()`.
void SetCrossOriginOpenerPolicy(network::CrossOriginOpenerPolicy coop);
// Sets the cross origin embedder policy of the new document.
//
// This must be called before `ComputePolicies()`.
void SetCrossOriginEmbedderPolicy(network::CrossOriginEmbedderPolicy coep);
// Sets the document isolation policy of the new document.
//
// This must be called before `ComputePolicies()`.
void SetDocumentIsolationPolicy(const network::DocumentIsolationPolicy& dip);
void SetIntegrityPolicy(network::IntegrityPolicy ip);
void SetIntegrityPolicyReportOnly(network::IntegrityPolicy ip);
// Sets the IP address space of the delivered policies of the new document.
//
// This must be called before `ComputePolicies()`.
void SetIPAddressSpace(network::mojom::IPAddressSpace address_space);
// Sets whether the origin of the document being navigated to is
// potentially-trustworthy, as defined in:
// https://w3c.github.io/webappsec-secure-contexts/#is-origin-trustworthy.
//
// This must be called before `ComputePolicies()`.
void SetIsOriginPotentiallyTrustworthy(bool value);
// Sets whether crossOriginIsolation is enabled by DocumentIsolationPolicy.
// This must be called after `ComputePolicies()`.
void SetCrossOriginIsolationEnabledByDIP();
// Records an additional Content Security Policy that will apply to the new
// document. `policy` must not be null. Policies added this way are ignored
// for failed navigations and history navigations.
void AddContentSecurityPolicy(
network::mojom::ContentSecurityPolicyPtr policy);
// Same as calling `AddContentSecurityPolicy()` on each item in `policies`.
void AddContentSecurityPolicies(
std::vector<network::mojom::ContentSecurityPolicyPtr> policies);
// Returns the delivered policies, as set so far by:
//
// - `SetIPAddressSpace()` for `ip_address_space`
// - `SetIsOriginPotentiallyTrustworthy()` and `ComputePolicies()` for
// `is_web_secure_context`
const PolicyContainerPolicies& DeliveredPoliciesForTesting() const;
// Sets final policies to defaults suitable for error pages, and builds a
// policy container host.
//
// This method must only be called once. However it can be called after
// `ComputePolicies()`.
void ComputePoliciesForError();
// Sets final policies to their correct values and builds a policy container
// host.
//
// `navigation_handle` should be the handle for the navigation to compute
// policies for. Its URL should designate the URL of the document after all
// redirects have been followed.
// `is_inside_mhtml` specifies whether the navigation loads an MHTML document
// or a subframe of an MHTML document. This influences computed sandbox flags.
// `frame_sandbox_flags` represents the frame's sandbox flags.
//
// Also sets `DeliveredPoliciesForTesting().is_web_secure_context` to its
// final value.
//
// This method must only be called once. `ComputePoliciesForError()` may be
// called later, in which case it overrides the final policies.
void ComputePolicies(NavigationHandle* navigation_handle,
bool is_inside_mhtml,
network::mojom::WebSandboxFlags frame_sandbox_flags,
bool is_credentialless);
// Returns a reference to the policies of the new document, i.e. the policies
// in the policy container host to be committed.
//
// `ComputePolicies()` or `ComputePoliciesForError()` must have been called
// previously.
const PolicyContainerPolicies& FinalPolicies() const;
// Creates a PolicyContainer linked to this builder's `PolicyContainerHost`.
//
// Should only be called once. `ComputePolicies()` or
// `ComputePoliciesForError()` must have been called previously.
blink::mojom::PolicyContainerPtr CreatePolicyContainerForBlink();
// Returns a new refptr to the `PolicyContainerHost`.
//
// `ComputePolicies()` or `ComputePoliciesForError()` must have been called
// previously.
// It is invalid to call after `TakePolicyContainerHost()`.
scoped_refptr<PolicyContainerHost> GetPolicyContainerHost();
// Moves the `PolicyContainerHost` out of this builder. The returned host
// contains the same policies as `FinalPolicies()`.
//
// `ComputePolicies()` or `ComputePoliciesForError()` must have been called
// previously.
scoped_refptr<PolicyContainerHost> TakePolicyContainerHost() &&;
// Resets this instance to its freshly-constructed state.
//
// Called by same-document navigation requests that need to be restarted as
// cross-document navigations. This happens when a same-document commit fails
// due to another navigation committing in the meantime.
void ResetForCrossDocumentRestart();
// Whether either of `ComputePolicies()` or `ComputePoliciesForError()` has
// been called yet.
bool HasComputedPolicies() const;
// Modifies the bit that would allow top-level navigation without sticky
// user activation.
void SetAllowTopNavigationWithoutUserGesture(bool allow_top);
private:
// Sets `delivered_policies_.is_web_secure_context` to its final value.
//
// Helper for `ComputePolicies()`.
void ComputeIsWebSecureContext();
// Sets `policies.sandbox_flags` to its final value. This merges the CSP
// sandbox flags with the frame's sandbox flag.
//
// `is_inside_mhtml` Whether the navigation loads an MHTML document or a
// subframe of an MHTML document. When true, this forces all sandbox flags on
// the document except popups and popups-to-escape-sandbox.
// `frame_sandbox_flags` The frame's sandbox flags.
// `policies` The policies computed for the document except for the sandbox
// flags.
//
// Helper for `ComputePolicies()` and `ComputePoliciesForError()`.
void ComputeSandboxFlags(bool is_inside_mhtml,
network::mojom::WebSandboxFlags frame_sandbox_flags,
PolicyContainerPolicies& policies);
// Sets `host_`.
void SetFinalPolicies(PolicyContainerPolicies policies);
// Helper for `FinalizePolicies()`. Called for local scheme urls only,
// incorporates `delivered_policies_` into `policies` (e.g. appending the
// delivered Content Security Policies). This is needed for example for CSP
// Embedded Enforcement, in order to merge the inherited policies with the
// policies forced by the `csp` attribute (which are contained in
// `delivered_policies_`).
void IncorporateDeliveredPoliciesForLocalURL(
PolicyContainerPolicies& policies);
// Helper for `FinalizePolicies()`. Returns, depending on `url`, the policies
// that this document inherits from parent/initiator.
PolicyContainerPolicies ComputeInheritedPolicies(const GURL& url);
// Helper for `FinalizePolicies()`. Returns, depending on `navigation_handle`,
// the final policies for the document that is going to be committed.
PolicyContainerPolicies ComputeFinalPolicies(
NavigationHandle* navigation_handle,
bool is_inside_mhtml,
network::mojom::WebSandboxFlags frame_sandbox_flags,
bool is_credentialless);
// The policies of the parent document, if any.
const std::unique_ptr<PolicyContainerPolicies> parent_policies_;
// The policies of the document that initiated the navigation, if any.
const std::unique_ptr<PolicyContainerPolicies> initiator_policies_;
// The policies restored from the history navigation entry, if any.
const std::unique_ptr<PolicyContainerPolicies> history_policies_;
// The policies extracted from the response as it is loaded.
//
// See the comment on `SetIsOriginPotentiallyTrustworthy()` regarding this
// member's `is_web_secure_context` field.
PolicyContainerPolicies delivered_policies_;
// Nullptr until `ComputePolicies()` or `ComputePoliciesForError()` is
// called, then moved from by `TakePolicyContainerHost()`.
scoped_refptr<PolicyContainerHost> host_;
};
} // namespace content
#endif // CONTENT_BROWSER_RENDERER_HOST_NAVIGATION_POLICY_CONTAINER_BUILDER_H_
|