blob: 29b063591443745c0c464e1be99df86147b284c3 [file] [log] [blame]
// Copyright 2016 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "core/html/HTMLIFrameElement.h"
#include "core/dom/Document.h"
#include "platform/feature_policy/FeaturePolicy.h"
#include "platform/wtf/text/StringUTF8Adaptor.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace blink {
class HTMLIFrameElementTest : public ::testing::Test {
public:
scoped_refptr<const SecurityOrigin> GetOriginForFeaturePolicy(
HTMLIFrameElement* element) {
return element->GetOriginForFeaturePolicy();
}
};
// Test that the correct origin is used when constructing the container policy,
// and that frames which should inherit their parent document's origin do so.
TEST_F(HTMLIFrameElementTest, FramesUseCorrectOrigin) {
Document* document = Document::CreateForTest();
const KURL document_url("http://example.com");
document->SetURL(document_url);
document->UpdateSecurityOrigin(SecurityOrigin::Create(document_url));
HTMLIFrameElement* frame_element = HTMLIFrameElement::Create(*document);
frame_element->setAttribute(HTMLNames::srcAttr, "about:blank");
scoped_refptr<const SecurityOrigin> effective_origin =
GetOriginForFeaturePolicy(frame_element);
EXPECT_TRUE(
effective_origin->IsSameSchemeHostPort(document->GetSecurityOrigin()));
frame_element->setAttribute(HTMLNames::srcAttr,
"data:text/html;base64,PHRpdGxlPkFCQzwvdGl0bGU+");
effective_origin = GetOriginForFeaturePolicy(frame_element);
EXPECT_FALSE(
effective_origin->IsSameSchemeHostPort(document->GetSecurityOrigin()));
EXPECT_TRUE(effective_origin->IsUnique());
frame_element->setAttribute(HTMLNames::srcAttr, "http://example.net/");
effective_origin = GetOriginForFeaturePolicy(frame_element);
EXPECT_FALSE(
effective_origin->IsSameSchemeHostPort(document->GetSecurityOrigin()));
EXPECT_FALSE(effective_origin->IsUnique());
}
// Test that a unique origin is used when constructing the container policy in a
// sandboxed iframe.
TEST_F(HTMLIFrameElementTest, SandboxFramesUseCorrectOrigin) {
Document* document = Document::CreateForTest();
const KURL document_url("http://example.com");
document->SetURL(document_url);
document->UpdateSecurityOrigin(SecurityOrigin::Create(document_url));
HTMLIFrameElement* frame_element = HTMLIFrameElement::Create(*document);
frame_element->setAttribute(HTMLNames::sandboxAttr, "");
frame_element->setAttribute(HTMLNames::srcAttr, "http://example.com/");
scoped_refptr<const SecurityOrigin> effective_origin =
GetOriginForFeaturePolicy(frame_element);
EXPECT_FALSE(
effective_origin->IsSameSchemeHostPort(document->GetSecurityOrigin()));
EXPECT_TRUE(effective_origin->IsUnique());
frame_element->setAttribute(HTMLNames::srcAttr, "http://example.net/");
effective_origin = GetOriginForFeaturePolicy(frame_element);
EXPECT_FALSE(
effective_origin->IsSameSchemeHostPort(document->GetSecurityOrigin()));
EXPECT_TRUE(effective_origin->IsUnique());
}
// Test that a sandboxed iframe with the allow-same-origin sandbox flag uses the
// parent document's origin for the container policy.
TEST_F(HTMLIFrameElementTest, SameOriginSandboxFramesUseCorrectOrigin) {
Document* document = Document::CreateForTest();
const KURL document_url("http://example.com");
document->SetURL(document_url);
document->UpdateSecurityOrigin(SecurityOrigin::Create(document_url));
HTMLIFrameElement* frame_element = HTMLIFrameElement::Create(*document);
frame_element->setAttribute(HTMLNames::sandboxAttr, "allow-same-origin");
frame_element->setAttribute(HTMLNames::srcAttr, "http://example.com/");
scoped_refptr<const SecurityOrigin> effective_origin =
GetOriginForFeaturePolicy(frame_element);
EXPECT_TRUE(
effective_origin->IsSameSchemeHostPort(document->GetSecurityOrigin()));
EXPECT_FALSE(effective_origin->IsUnique());
}
// Test that the parent document's origin is used when constructing the
// container policy in a srcdoc iframe.
TEST_F(HTMLIFrameElementTest, SrcdocFramesUseCorrectOrigin) {
Document* document = Document::CreateForTest();
const KURL document_url("http://example.com");
document->SetURL(document_url);
document->UpdateSecurityOrigin(SecurityOrigin::Create(document_url));
HTMLIFrameElement* frame_element = HTMLIFrameElement::Create(*document);
frame_element->setAttribute(HTMLNames::srcdocAttr, "<title>title</title>");
scoped_refptr<const SecurityOrigin> effective_origin =
GetOriginForFeaturePolicy(frame_element);
EXPECT_TRUE(
effective_origin->IsSameSchemeHostPort(document->GetSecurityOrigin()));
}
// Test that a unique origin is used when constructing the container policy in a
// sandboxed iframe with a srcdoc.
TEST_F(HTMLIFrameElementTest, SandboxedSrcdocFramesUseCorrectOrigin) {
Document* document = Document::CreateForTest();
const KURL document_url("http://example.com");
document->SetURL(document_url);
document->UpdateSecurityOrigin(SecurityOrigin::Create(document_url));
HTMLIFrameElement* frame_element = HTMLIFrameElement::Create(*document);
frame_element->setAttribute(HTMLNames::sandboxAttr, "");
frame_element->setAttribute(HTMLNames::srcdocAttr, "<title>title</title>");
scoped_refptr<const SecurityOrigin> effective_origin =
GetOriginForFeaturePolicy(frame_element);
EXPECT_FALSE(
effective_origin->IsSameSchemeHostPort(document->GetSecurityOrigin()));
EXPECT_TRUE(effective_origin->IsUnique());
}
// Test that iframes with relative src urls correctly construct their origin
// relative to the parent document.
TEST_F(HTMLIFrameElementTest, RelativeURLsUseCorrectOrigin) {
Document* document = Document::CreateForTest();
const KURL document_url("http://example.com");
document->SetURL(document_url);
document->UpdateSecurityOrigin(SecurityOrigin::Create(document_url));
HTMLIFrameElement* frame_element = HTMLIFrameElement::Create(*document);
// Host-relative URLs should resolve to the same domain as the parent.
frame_element->setAttribute(HTMLNames::srcAttr, "index2.html");
scoped_refptr<const SecurityOrigin> effective_origin =
GetOriginForFeaturePolicy(frame_element);
EXPECT_TRUE(
effective_origin->IsSameSchemeHostPort(document->GetSecurityOrigin()));
// Scheme-relative URLs should not resolve to the same domain as the parent.
frame_element->setAttribute(HTMLNames::srcAttr, "//example.net/index2.html");
effective_origin = GetOriginForFeaturePolicy(frame_element);
EXPECT_FALSE(
effective_origin->IsSameSchemeHostPort(document->GetSecurityOrigin()));
}
// Test that various iframe attribute configurations result in the correct
// container policies.
// Test that the correct container policy is constructed on an iframe element.
TEST_F(HTMLIFrameElementTest, DefaultContainerPolicy) {
Document* document = Document::CreateForTest();
const KURL document_url("http://example.com");
document->SetURL(document_url);
document->UpdateSecurityOrigin(SecurityOrigin::Create(document_url));
HTMLIFrameElement* frame_element = HTMLIFrameElement::Create(*document);
frame_element->setAttribute(HTMLNames::srcAttr, "http://example.net/");
frame_element->UpdateContainerPolicyForTests();
const ParsedFeaturePolicy& container_policy =
frame_element->ContainerPolicy();
EXPECT_EQ(0UL, container_policy.size());
}
// Test that the allow attribute results in a container policy which is
// restricted to the domain in the src attribute.
TEST_F(HTMLIFrameElementTest, AllowAttributeContainerPolicy) {
Document* document = Document::CreateForTest();
const KURL document_url("http://example.com");
document->SetURL(document_url);
document->UpdateSecurityOrigin(SecurityOrigin::Create(document_url));
HTMLIFrameElement* frame_element = HTMLIFrameElement::Create(*document);
frame_element->setAttribute(HTMLNames::srcAttr, "http://example.net/");
frame_element->setAttribute(HTMLNames::allowAttr, "fullscreen");
frame_element->UpdateContainerPolicyForTests();
const ParsedFeaturePolicy& container_policy1 =
frame_element->ContainerPolicy();
EXPECT_EQ(1UL, container_policy1.size());
EXPECT_EQ(mojom::FeaturePolicyFeature::kFullscreen,
container_policy1[0].feature);
EXPECT_FALSE(container_policy1[0].matches_all_origins);
EXPECT_EQ(1UL, container_policy1[0].origins.size());
EXPECT_EQ("http://example.net", container_policy1[0].origins[0].Serialize());
frame_element->setAttribute(HTMLNames::allowAttr, "payment; fullscreen");
frame_element->UpdateContainerPolicyForTests();
const ParsedFeaturePolicy& container_policy2 =
frame_element->ContainerPolicy();
EXPECT_EQ(2UL, container_policy2.size());
EXPECT_TRUE(container_policy2[0].feature ==
mojom::FeaturePolicyFeature::kFullscreen ||
container_policy2[1].feature ==
mojom::FeaturePolicyFeature::kFullscreen);
EXPECT_TRUE(
container_policy2[0].feature == mojom::FeaturePolicyFeature::kPayment ||
container_policy2[1].feature == mojom::FeaturePolicyFeature::kPayment);
EXPECT_FALSE(container_policy2[0].matches_all_origins);
EXPECT_EQ(1UL, container_policy2[0].origins.size());
EXPECT_EQ("http://example.net", container_policy2[0].origins[0].Serialize());
EXPECT_FALSE(container_policy2[1].matches_all_origins);
EXPECT_EQ(1UL, container_policy2[1].origins.size());
EXPECT_EQ("http://example.net", container_policy2[1].origins[0].Serialize());
// TODO(loonybear): Remove this test when deprecating the old syntax.
// Test for supporting old allow syntax.
frame_element->setAttribute(HTMLNames::allowAttr, "payment fullscreen");
const ParsedFeaturePolicy& container_policy3 =
frame_element->ContainerPolicy();
EXPECT_EQ(2UL, container_policy3.size());
EXPECT_TRUE(container_policy3[0].feature ==
mojom::FeaturePolicyFeature::kFullscreen ||
container_policy3[1].feature ==
mojom::FeaturePolicyFeature::kFullscreen);
EXPECT_TRUE(
container_policy3[0].feature == mojom::FeaturePolicyFeature::kPayment ||
container_policy3[1].feature == mojom::FeaturePolicyFeature::kPayment);
EXPECT_FALSE(container_policy3[0].matches_all_origins);
EXPECT_EQ(1UL, container_policy3[0].origins.size());
EXPECT_EQ("http://example.net", container_policy3[0].origins[0].Serialize());
EXPECT_FALSE(container_policy3[1].matches_all_origins);
EXPECT_EQ(1UL, container_policy3[1].origins.size());
EXPECT_EQ("http://example.net", container_policy3[1].origins[0].Serialize());
}
// Test that the allow attribute on a sandboxed frame results in a container
// policy which is restricted to a unique origin.
TEST_F(HTMLIFrameElementTest, SandboxAttributeContainerPolicy) {
Document* document = Document::CreateForTest();
const KURL document_url("http://example.com");
document->SetURL(document_url);
document->UpdateSecurityOrigin(SecurityOrigin::Create(document_url));
HTMLIFrameElement* frame_element = HTMLIFrameElement::Create(*document);
frame_element->setAttribute(HTMLNames::srcAttr, "http://example.net/");
frame_element->setAttribute(HTMLNames::allowAttr, "fullscreen");
frame_element->setAttribute(HTMLNames::sandboxAttr, "");
frame_element->UpdateContainerPolicyForTests();
const ParsedFeaturePolicy& container_policy =
frame_element->ContainerPolicy();
EXPECT_EQ(1UL, container_policy.size());
EXPECT_EQ(mojom::FeaturePolicyFeature::kFullscreen,
container_policy[0].feature);
EXPECT_FALSE(container_policy[0].matches_all_origins);
EXPECT_EQ(1UL, container_policy[0].origins.size());
EXPECT_TRUE(container_policy[0].origins[0].unique());
}
// Test that the allow attribute on a sandboxed frame with the allow-same-origin
// flag results in a container policy which is restricted to the origin of the
// containing document.
TEST_F(HTMLIFrameElementTest, SameOriginSandboxAttributeContainerPolicy) {
Document* document = Document::CreateForTest();
const KURL document_url("http://example.com");
document->SetURL(document_url);
document->UpdateSecurityOrigin(SecurityOrigin::Create(document_url));
HTMLIFrameElement* frame_element = HTMLIFrameElement::Create(*document);
frame_element->setAttribute(HTMLNames::srcAttr, "http://example.net/");
frame_element->setAttribute(HTMLNames::allowAttr, "fullscreen");
frame_element->setAttribute(HTMLNames::sandboxAttr, "allow-same-origin");
frame_element->UpdateContainerPolicyForTests();
const ParsedFeaturePolicy& container_policy =
frame_element->ContainerPolicy();
EXPECT_EQ(1UL, container_policy.size());
EXPECT_EQ(mojom::FeaturePolicyFeature::kFullscreen,
container_policy[0].feature);
EXPECT_FALSE(container_policy[0].matches_all_origins);
EXPECT_EQ(1UL, container_policy[0].origins.size());
EXPECT_FALSE(container_policy[0].origins[0].unique());
EXPECT_EQ("http://example.net", container_policy[0].origins[0].Serialize());
}
// Test the ConstructContainerPolicy method when no attributes are set on the
// iframe element.
TEST_F(HTMLIFrameElementTest, ConstructEmptyContainerPolicy) {
Document* document = Document::CreateForTest();
const KURL document_url("http://example.com");
document->SetURL(document_url);
document->UpdateSecurityOrigin(SecurityOrigin::Create(document_url));
HTMLIFrameElement* frame_element = HTMLIFrameElement::Create(*document);
ParsedFeaturePolicy container_policy =
frame_element->ConstructContainerPolicy(nullptr, nullptr);
EXPECT_EQ(0UL, container_policy.size());
}
// Test the ConstructContainerPolicy method when the "allow" attribute is used
// to enable features in the frame.
TEST_F(HTMLIFrameElementTest, ConstructContainerPolicy) {
Document* document = Document::CreateForTest();
const KURL document_url("http://example.com");
document->SetURL(document_url);
document->UpdateSecurityOrigin(SecurityOrigin::Create(document_url));
HTMLIFrameElement* frame_element = HTMLIFrameElement::Create(*document);
frame_element->setAttribute(HTMLNames::allowAttr, "payment; usb");
ParsedFeaturePolicy container_policy =
frame_element->ConstructContainerPolicy(nullptr, nullptr);
EXPECT_EQ(2UL, container_policy.size());
EXPECT_EQ(mojom::FeaturePolicyFeature::kPayment, container_policy[0].feature);
EXPECT_FALSE(container_policy[0].matches_all_origins);
EXPECT_EQ(1UL, container_policy[0].origins.size());
EXPECT_TRUE(container_policy[0].origins[0].IsSameOriginWith(
GetOriginForFeaturePolicy(frame_element)->ToUrlOrigin()));
EXPECT_EQ(mojom::FeaturePolicyFeature::kUsb, container_policy[1].feature);
EXPECT_FALSE(container_policy[1].matches_all_origins);
EXPECT_EQ(1UL, container_policy[1].origins.size());
EXPECT_TRUE(container_policy[1].origins[0].IsSameOriginWith(
GetOriginForFeaturePolicy(frame_element)->ToUrlOrigin()));
}
// Test the ConstructContainerPolicy method when the "allowfullscreen" attribute
// is used to enable fullscreen in the frame.
TEST_F(HTMLIFrameElementTest, ConstructContainerPolicyWithAllowFullscreen) {
Document* document = Document::CreateForTest();
const KURL document_url("http://example.com");
document->SetURL(document_url);
document->UpdateSecurityOrigin(SecurityOrigin::Create(document_url));
HTMLIFrameElement* frame_element = HTMLIFrameElement::Create(*document);
frame_element->SetBooleanAttribute(HTMLNames::allowfullscreenAttr, true);
ParsedFeaturePolicy container_policy =
frame_element->ConstructContainerPolicy(nullptr, nullptr);
EXPECT_EQ(1UL, container_policy.size());
EXPECT_EQ(mojom::FeaturePolicyFeature::kFullscreen,
container_policy[0].feature);
EXPECT_TRUE(container_policy[0].matches_all_origins);
}
// Test the ConstructContainerPolicy method when the "allowpaymentrequest"
// attribute is used to enable the paymentrequest API in the frame.
TEST_F(HTMLIFrameElementTest, ConstructContainerPolicyWithAllowPaymentRequest) {
Document* document = Document::CreateForTest();
const KURL document_url("http://example.com");
document->SetURL(document_url);
document->UpdateSecurityOrigin(SecurityOrigin::Create(document_url));
HTMLIFrameElement* frame_element = HTMLIFrameElement::Create(*document);
frame_element->setAttribute(HTMLNames::allowAttr, "usb");
frame_element->SetBooleanAttribute(HTMLNames::allowpaymentrequestAttr, true);
ParsedFeaturePolicy container_policy =
frame_element->ConstructContainerPolicy(nullptr, nullptr);
EXPECT_EQ(2UL, container_policy.size());
EXPECT_EQ(mojom::FeaturePolicyFeature::kUsb, container_policy[0].feature);
EXPECT_FALSE(container_policy[0].matches_all_origins);
EXPECT_EQ(1UL, container_policy[0].origins.size());
EXPECT_TRUE(container_policy[0].origins[0].IsSameOriginWith(
GetOriginForFeaturePolicy(frame_element)->ToUrlOrigin()));
EXPECT_EQ(mojom::FeaturePolicyFeature::kPayment, container_policy[1].feature);
EXPECT_TRUE(container_policy[1].matches_all_origins);
}
// Test the ConstructContainerPolicy method when both "allowfullscreen" and
// "allowpaymentrequest" attributes are set on the iframe element, and the
// "allow" attribute is also used to override the paymentrequest feature. In the
// resulting container policy, the payment and usb features should be enabled
// only for the frame's origin, (since the allow attribute overrides
// allowpaymentrequest,) while fullscreen should be enabled for all origins.
TEST_F(HTMLIFrameElementTest, ConstructContainerPolicyWithAllowAttributes) {
Document* document = Document::CreateForTest();
const KURL document_url("http://example.com");
document->SetURL(document_url);
document->UpdateSecurityOrigin(SecurityOrigin::Create(document_url));
HTMLIFrameElement* frame_element = HTMLIFrameElement::Create(*document);
frame_element->setAttribute(HTMLNames::allowAttr, "payment; usb");
frame_element->SetBooleanAttribute(HTMLNames::allowfullscreenAttr, true);
frame_element->SetBooleanAttribute(HTMLNames::allowpaymentrequestAttr, true);
ParsedFeaturePolicy container_policy =
frame_element->ConstructContainerPolicy(nullptr, nullptr);
EXPECT_EQ(3UL, container_policy.size());
EXPECT_EQ(mojom::FeaturePolicyFeature::kPayment, container_policy[0].feature);
EXPECT_FALSE(container_policy[0].matches_all_origins);
EXPECT_EQ(1UL, container_policy[0].origins.size());
EXPECT_TRUE(container_policy[0].origins[0].IsSameOriginWith(
GetOriginForFeaturePolicy(frame_element)->ToUrlOrigin()));
EXPECT_EQ(mojom::FeaturePolicyFeature::kUsb, container_policy[1].feature);
EXPECT_FALSE(container_policy[1].matches_all_origins);
EXPECT_EQ(1UL, container_policy[1].origins.size());
EXPECT_TRUE(container_policy[1].origins[0].IsSameOriginWith(
GetOriginForFeaturePolicy(frame_element)->ToUrlOrigin()));
EXPECT_EQ(mojom::FeaturePolicyFeature::kFullscreen,
container_policy[2].feature);
EXPECT_TRUE(container_policy[2].matches_all_origins);
}
} // namespace blink