blob: 2316e1ca9db238e92cb72fa3571d38050c8c0950 [file] [log] [blame]
// Copyright 2021 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/browser/fenced_frame/fenced_frame.h"
#include "base/notreached.h"
#include "content/browser/devtools/devtools_instrumentation.h"
#include "content/browser/renderer_host/render_frame_proxy_host.h"
#include "content/browser/renderer_host/render_widget_host_view_child_frame.h"
#include "content/browser/web_contents/web_contents_impl.h"
#include "net/storage_access_api/status.h"
#include "third_party/blink/public/common/fenced_frame/fenced_frame_utils.h"
#include "third_party/blink/public/common/frame/fenced_frame_sandbox_flags.h"
#include "third_party/blink/public/common/frame/frame_owner_element_type.h"
#include "third_party/blink/public/mojom/navigation/navigation_initiator_activation_and_ad_status.mojom.h"
#include "url/gurl.h"
namespace content {
namespace {
FrameTreeNode* CreateDelegateFrameTreeNode(
RenderFrameHostImpl* owner_render_frame_host) {
return owner_render_frame_host->frame_tree()->AddFrame(
&*owner_render_frame_host,
owner_render_frame_host->GetProcess()->GetDeprecatedID(),
owner_render_frame_host->GetProcess()->GetNextRoutingID(),
// We're creating an dummy outer delegate node which will never have a
// corresponding `RenderFrameImpl`, and therefore we pass null
// remotes/receivers for connections that it would normally have to a
// renderer process.
/*frame_remote=*/mojo::NullAssociatedRemote(),
/*browser_interface_broker_receiver=*/mojo::NullReceiver(),
/*policy_container_bind_params=*/nullptr,
/*associated_interface_provider_receiver=*/mojo::NullAssociatedReceiver(),
blink::mojom::TreeScopeType::kDocument, "", "", true,
blink::LocalFrameToken(), base::UnguessableToken::Create(),
blink::DocumentToken(), blink::FramePolicy(),
blink::mojom::FrameOwnerProperties(), false,
blink::FrameOwnerElementType::kFencedframe,
/*is_dummy_frame_for_inner_tree=*/true);
}
} // namespace
FencedFrame::FencedFrame(
base::SafeRef<RenderFrameHostImpl> owner_render_frame_host,
bool was_discarded)
: web_contents_(static_cast<WebContentsImpl*>(
WebContents::FromRenderFrameHost(&*owner_render_frame_host))),
owner_render_frame_host_(owner_render_frame_host),
outer_delegate_frame_tree_node_(
CreateDelegateFrameTreeNode(&*owner_render_frame_host)),
frame_tree_(
std::make_unique<FrameTree>(web_contents_->GetBrowserContext(),
/*delegate=*/this,
/*navigation_controller_delegate=*/this,
/*navigator_delegate=*/web_contents_,
/*render_frame_delegate=*/web_contents_,
/*render_view_delegate=*/web_contents_,
/*render_widget_delegate=*/web_contents_,
/*manager_delegate=*/web_contents_,
/*page_delegate=*/web_contents_,
FrameTree::Type::kFencedFrame)) {
if (was_discarded)
frame_tree_->root()->set_was_discarded();
}
FencedFrame::~FencedFrame() {
DCHECK(frame_tree_);
frame_tree_->Shutdown();
frame_tree_.reset();
}
void FencedFrame::Navigate(
const GURL& url,
base::TimeTicks navigation_start_time,
const std::optional<std::u16string>& embedder_shared_storage_context) {
// We don't need guard against a bad message in the case of prerendering since
// we wouldn't even establish the mojo connection in that case.
DCHECK_NE(RenderFrameHost::LifecycleState::kPrerendering,
owner_render_frame_host_->GetLifecycleState());
if (!blink::IsValidUrnUuidURL(url) && !blink::IsValidFencedFrameURL(url)) {
bad_message::ReceivedBadMessage(owner_render_frame_host_->GetProcess(),
bad_message::FF_NAVIGATION_INVALID_URL);
return;
}
// Confirm that the navigation does not cause a mismatch with the embedder's
// mode, if the embedder is itself a fenced frame. The renderer should prevent
// this from happening.
DCHECK(outer_delegate_frame_tree_node_);
if (outer_delegate_frame_tree_node_->IsInFencedFrameTree()) {
bool is_nested_inside_opaque_ads_fenced_frame =
outer_delegate_frame_tree_node_->GetDeprecatedFencedFrameMode() ==
blink::FencedFrame::DeprecatedFencedFrameMode::kOpaqueAds;
bool is_nested_inside_default_fenced_frame =
!is_nested_inside_opaque_ads_fenced_frame;
if ((is_nested_inside_opaque_ads_fenced_frame &&
!blink::IsValidUrnUuidURL(url)) ||
(is_nested_inside_default_fenced_frame &&
!blink::IsValidFencedFrameURL(url))) {
bad_message::ReceivedBadMessage(
owner_render_frame_host_->GetProcess(),
bad_message::FF_DIFFERENT_MODE_THAN_EMBEDDER);
return;
}
}
// In fenced frames with network disabled, embedder-initiated navigations of
// nested fenced frames are not allowed. (This is automatically handled for
// nested iframes but not nested fenced frames, because nested fenced frames
// have their own partition nonce.)
// Note the kFrameTreeRoot traversal, because urn iframes cannot disable
// network, so the properties of urn iframes nested inside fenced frames
// should be ignored.
if (base::FeatureList::IsEnabled(
blink::features::kFencedFramesLocalUnpartitionedDataAccess)) {
const std::optional<
FencedFrameProperties>& embedder_fenced_frame_properties =
owner_render_frame_host_->frame_tree_node()->GetFencedFrameProperties(
FencedFramePropertiesNodeSource::kFrameTreeRoot);
if (embedder_fenced_frame_properties.has_value() &&
embedder_fenced_frame_properties
->HasDisabledNetworkForCurrentFrameTree()) {
owner_render_frame_host_->AddMessageToConsole(
blink::mojom::ConsoleMessageLevel::kError,
"Embedder-initiated navigations of fenced frames are not allowed "
"after"
" the embedder's network has been disabled.");
return;
}
}
GURL validated_url = url;
owner_render_frame_host_->GetSiteInstance()->GetProcess()->FilterURL(
/*empty_allowed=*/false, &validated_url);
FrameTreeNode* inner_root = frame_tree_->root();
// The download policy will be controlled and modified by `NavigationRequest`,
// depending on whether the sandbox flags permit downloads.
blink::NavigationDownloadPolicy download_policy;
// This method is only invoked in the context of the embedder navigating
// the embeddee via a `src` attribute modification on the fenced frame
// element. The `initiator_origin` is left as a new opaque origin since
// we do not want to leak information from the outer frame tree to the
// inner frame tree. Note that this will always create a "Sec-Fetch-Site" as
// cross-site. Since we assign an opaque initiator_origin we do not
// need to provide a `source_site_instance`.
url::Origin initiator_origin;
// Similarly, we don't want to leak information from the outer frame tree via
// base url, so we pass nullopt for `initiator_base_url` to
// NavigateFromFrameProxy.
// TODO(yaoxia): implement this. This information will be propagated to the
// `NavigationHandle`. Skip propagating here is fine for now, because we are
// currently only interested navigation that occurs in the outermost RFH.
blink::mojom::NavigationInitiatorActivationAndAdStatus
initiator_activation_and_ad_status =
blink::mojom::NavigationInitiatorActivationAndAdStatus::
kDidNotStartWithTransientActivation;
// Embedder initiated fenced frame navigation should force a new browsing
// instance.
// Note: `navigation_start_time` already comes from the renderer process in
// HTMLFencedFrameElement::FencedFrameDelegate::Navigate, so it is not
// necessary to record a different `actual_navigation_start_time`.
inner_root->navigator().NavigateFromFrameProxy(
inner_root->current_frame_host(), validated_url,
/*initiator_frame_token=*/nullptr,
content::ChildProcessHost::kInvalidUniqueID, initiator_origin,
/*initiator_base_url=*/std::nullopt,
/*source_site_instance=*/nullptr, content::Referrer(),
ui::PAGE_TRANSITION_AUTO_SUBFRAME,
/*should_replace_current_entry=*/true, download_policy, "GET",
/*post_body=*/nullptr, /*extra_headers=*/"",
/*blob_url_loader_factory=*/nullptr,
network::mojom::SourceLocation::New(), /*has_user_gesture=*/false,
/*is_form_submission=*/false,
/*impression=*/std::nullopt, initiator_activation_and_ad_status,
/*actual_navigation_start_time=*/navigation_start_time,
navigation_start_time,
/*is_embedder_initiated_fenced_frame_navigation=*/true,
/*is_unfenced_top_navigation=*/false,
/*force_new_browsing_instance=*/true, /*is_container_initiated=*/false,
/*has_rel_opener=*/false,
/*storage_access_api_status=*/net::StorageAccessApiStatus::kNone,
embedder_shared_storage_context);
}
bool FencedFrame::IsHidden() {
return web_contents_->IsHidden();
}
FrameTreeNodeId FencedFrame::GetOuterDelegateFrameTreeNodeId() {
DCHECK(outer_delegate_frame_tree_node_);
return outer_delegate_frame_tree_node_->frame_tree_node_id();
}
RenderFrameHostImpl* FencedFrame::GetProspectiveOuterDocument() {
// A fenced frame's outer document is known at initialization, so we could
// never be in this unattached state.
return nullptr;
}
FrameTree* FencedFrame::LoadingTree() {
CHECK_NE(RenderFrameHostImpl::LifecycleStateImpl::kPrerendering,
owner_render_frame_host_->lifecycle_state());
return web_contents_->LoadingTree();
}
void FencedFrame::SetFocusedFrame(FrameTreeNode* node,
SiteInstanceGroup* source) {
web_contents_->SetFocusedFrame(node, source);
}
FrameTree* FencedFrame::GetOwnedPictureInPictureFrameTree() {
return nullptr;
}
bool FencedFrame::OnRenderFrameProxyVisibilityChanged(
RenderFrameProxyHost* render_frame_proxy_host,
blink::mojom::FrameVisibility visibility) {
return false;
}
FrameTree* FencedFrame::GetPictureInPictureOpenerFrameTree() {
return nullptr;
}
RenderFrameProxyHost*
FencedFrame::InitInnerFrameTreeAndReturnProxyToOuterFrameTree(
blink::mojom::RemoteFrameInterfacesFromRendererPtr remote_frame_interfaces,
const blink::RemoteFrameToken& frame_token,
const base::UnguessableToken& devtools_frame_token) {
DCHECK(remote_frame_interfaces);
DCHECK(outer_delegate_frame_tree_node_);
scoped_refptr<SiteInstanceImpl> site_instance =
SiteInstanceImpl::CreateForFencedFrame(
owner_render_frame_host_->GetSiteInstance());
// Set the mandatory sandbox flags from the beginning.
blink::FramePolicy frame_policy;
frame_policy.sandbox_flags = blink::kFencedFrameForcedSandboxFlags;
// Note that even though this is happening in response to an event in the
// renderer (i.e., the creation of a <fencedframe> element), we are still
// putting `renderer_initiated_creation` as false. This is because that
// parameter is only used when a renderer is creating a new window and has
// already created the main frame for the window, but wants the browser to
// refrain from showing the main frame until the renderer signals the browser
// via the mojom.LocalMainFrameHost.ShowCreatedWindow(). This flow does not
// apply for fenced frames and prerendered nested FrameTrees, hence the
// decision to mark it as false.
frame_tree_->Init(site_instance.get(),
/*renderer_initiated_creation=*/false,
/*main_frame_name=*/"",
/*opener_for_origin=*/nullptr, frame_policy,
devtools_frame_token);
// Note that pending frame policy will be passed as `frame_policy` in
// `replication_state` in `mojom::CreateFrameParams`.
// See `RenderFrameHostImpl::CreateRenderFrame`.
frame_tree_->root()->SetPendingFramePolicy(frame_policy);
// TODO(crbug.com/40177940): This should be moved to FrameTree::Init.
web_contents_->NotifySwappedFromRenderManager(
/*old_frame=*/nullptr,
frame_tree_->root()->render_manager()->current_frame_host());
// Connect the outer delegate RenderFrameHost with the inner main
// FrameTreeNode. This allows us to traverse from the outer delegate RFH
// inward, to the inner fenced frame FrameTree.
outer_delegate_frame_tree_node_->current_frame_host()
->set_inner_tree_main_frame_tree_node_id(
frame_tree_->root()->frame_tree_node_id());
FrameTreeNode* inner_root = frame_tree_->root();
// This is for use by the "outer" FrameTree (i.e., the one that
// `owner_render_frame_host_` is associated with).
RenderFrameProxyHost* proxy_host =
inner_root->current_frame_host()
->browsing_context_state()
->CreateOuterDelegateProxy(
owner_render_frame_host_->GetSiteInstance()->group(), inner_root,
frame_token);
proxy_host->BindRemoteFrameInterfaces(
std::move(remote_frame_interfaces->frame),
std::move(remote_frame_interfaces->frame_host_receiver));
inner_root->current_frame_host()->PropagateEmbeddingTokenToParentFrame();
// We need to set the `proxy_host` as created because the
// renderer side of this object is live. It is live because the creation of
// the FencedFrame object occurs in a sync request from the renderer where the
// other end of `proxy_host` lives.
proxy_host->SetRenderFrameProxyCreated(true);
RenderFrameHostManager* inner_render_manager = inner_root->render_manager();
// For the newly minted FrameTree (in the constructor) we will have a new
// RenderViewHost that does not yet have a RenderWidgetHostView for it.
// Create a RenderWidgetHostViewChildFrame as this won't be a top-level
// view. Set the associated view for the inner frame tree after it has
// been created.
RenderViewHost* rvh =
inner_render_manager->current_frame_host()->GetRenderViewHost();
if (!inner_render_manager->InitRenderView(
inner_render_manager->current_frame_host()
->GetSiteInstance()
->group(),
static_cast<RenderViewHostImpl*>(rvh), /*proxy=*/nullptr,
/*navigation_metrics_token=*/std::nullopt)) {
return proxy_host;
}
RenderWidgetHostViewBase* child_rwhv =
inner_render_manager->GetRenderWidgetHostView();
CHECK(child_rwhv);
CHECK(child_rwhv->IsRenderWidgetHostViewChildFrame());
inner_render_manager->SetRWHViewForInnerFrameTree(
static_cast<RenderWidgetHostViewChildFrame*>(child_rwhv));
devtools_instrumentation::FencedFrameCreated(owner_render_frame_host_, this);
return proxy_host;
}
const base::UnguessableToken& FencedFrame::GetDevToolsFrameToken() const {
DCHECK(frame_tree_);
return frame_tree_->GetMainFrame()->GetDevToolsFrameToken();
}
void FencedFrame::NotifyBeforeFormRepostWarningShow() {}
void FencedFrame::NotifyNavigationEntryCommitted(
const LoadCommittedDetails& load_details) {}
void FencedFrame::NotifyNavigationEntryChanged(
const EntryChangedDetails& change_details) {}
void FencedFrame::NotifyNavigationListPruned(
const PrunedDetails& pruned_details) {}
void FencedFrame::NotifyNavigationEntriesDeleted() {}
void FencedFrame::ActivateAndShowRepostFormWarningDialog() {
// Not supported, cancel pending reload.
frame_tree_->controller().CancelPendingReload();
}
bool FencedFrame::ShouldPreserveAbortedURLs() {
return false;
}
void FencedFrame::UpdateOverridingUserAgent() {}
void FencedFrame::DidChangeFramePolicy(const blink::FramePolicy& frame_policy) {
FrameTreeNode* inner_root = frame_tree_->root();
const blink::FramePolicy& current_frame_policy =
inner_root->pending_frame_policy();
// Observe that the sandbox flags sent from the renderer are currently
// ignored. The `sandbox` attribute on `HTMLFencedFrameElement` may only
// cause embedder-initiated navigations to fail for now---in the renderer.
// TODO(crbug.com/40233168): Handle sandbox flags for fenced frames properly
// in the browser, allowing us to use non-fixed sets of sandbox flags.
inner_root->SetPendingFramePolicy(blink::FramePolicy(
current_frame_policy.sandbox_flags, frame_policy.container_policy,
current_frame_policy.required_document_policy,
frame_policy.deferred_fetch_policy));
}
} // namespace content