| // Copyright 2020 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #ifndef CONTENT_BROWSER_RENDERER_HOST_POLICY_CONTAINER_HOST_H_ |
| #define CONTENT_BROWSER_RENDERER_HOST_POLICY_CONTAINER_HOST_H_ |
| |
| #include <iosfwd> |
| #include <memory> |
| #include <vector> |
| |
| #include "content/browser/child_process_host_impl.h" |
| #include "content/common/content_export.h" |
| #include "mojo/public/cpp/bindings/associated_receiver.h" |
| #include "mojo/public/cpp/bindings/pending_associated_remote.h" |
| #include "mojo/public/cpp/bindings/unique_receiver_set.h" |
| #include "services/network/public/cpp/cross_origin_embedder_policy.h" |
| #include "services/network/public/cpp/cross_origin_opener_policy.h" |
| #include "services/network/public/cpp/document_isolation_policy.h" |
| #include "services/network/public/cpp/integrity_policy.h" |
| #include "services/network/public/cpp/web_sandbox_flags.h" |
| #include "services/network/public/mojom/content_security_policy.mojom-forward.h" |
| #include "services/network/public/mojom/ip_address_space.mojom-shared.h" |
| #include "services/network/public/mojom/referrer_policy.mojom-shared.h" |
| #include "services/network/public/mojom/url_response_head.mojom-forward.h" |
| #include "third_party/blink/public/common/tokens/tokens.h" |
| #include "third_party/blink/public/mojom/frame/policy_container.mojom.h" |
| #include "url/gurl.h" |
| |
| namespace content { |
| |
| class ContentBrowserClient; |
| |
| // The contents of a PolicyContainerHost. |
| struct CONTENT_EXPORT PolicyContainerPolicies { |
| PolicyContainerPolicies(); |
| |
| PolicyContainerPolicies( |
| network::mojom::ReferrerPolicy referrer_policy, |
| network::mojom::IPAddressSpace ip_address_space, |
| bool allow_non_secure_local_network_access, |
| bool is_web_secure_context, |
| std::vector<network::mojom::ContentSecurityPolicyPtr> |
| content_security_policies, |
| const network::CrossOriginOpenerPolicy& cross_origin_opener_policy, |
| const network::CrossOriginEmbedderPolicy& cross_origin_embedder_policy, |
| const network::DocumentIsolationPolicy& document_isolation_policy, |
| network::IntegrityPolicy integrity_policy, |
| network::IntegrityPolicy integrity_policy_report_only, |
| network::mojom::WebSandboxFlags sandbox_flags, |
| bool is_credentialless, |
| bool can_navigate_top_without_user_gesture, |
| bool cross_origin_isolation_enabled_by_dip); |
| |
| explicit PolicyContainerPolicies( |
| const blink::mojom::PolicyContainerPolicies& policies, |
| bool is_web_secure_context); |
| |
| // Used when loading workers from network schemes. |
| // WARNING: This does not populate referrer policy. |
| PolicyContainerPolicies(const GURL& url, |
| network::mojom::URLResponseHead* response_head, |
| ContentBrowserClient* client); |
| |
| // Instances of this type are move-only. |
| PolicyContainerPolicies(const PolicyContainerPolicies&) = delete; |
| PolicyContainerPolicies& operator=(const PolicyContainerPolicies&) = delete; |
| PolicyContainerPolicies(PolicyContainerPolicies&&); |
| PolicyContainerPolicies& operator=(PolicyContainerPolicies&&); |
| |
| ~PolicyContainerPolicies(); |
| |
| // Returns an identical copy of this instance. |
| PolicyContainerPolicies Clone() const; |
| |
| // Returns the result of `Clone()` stored on the heap. |
| std::unique_ptr<PolicyContainerPolicies> ClonePtr() const; |
| |
| // Helper function to append items to `content_security_policies`. |
| void AddContentSecurityPolicies( |
| std::vector<network::mojom::ContentSecurityPolicyPtr> policies); |
| |
| blink::mojom::PolicyContainerPoliciesPtr ToMojoPolicyContainerPolicies() |
| const; |
| |
| // PolicyContainerPolicies structs are comparable for equality. |
| CONTENT_EXPORT friend bool operator==(const PolicyContainerPolicies&, |
| const PolicyContainerPolicies&) = |
| default; |
| |
| // The referrer policy for the associated document. If not overwritten via a |
| // call to SetReferrerPolicy (for example after parsing the Referrer-Policy |
| // header or a meta tag), the default referrer policy will be applied to the |
| // document. |
| network::mojom::ReferrerPolicy referrer_policy = |
| network::mojom::ReferrerPolicy::kDefault; |
| |
| // The IPAddressSpace associated with the document. In all non-network pages |
| // (srcdoc, data urls, etc.) where we don't have an IP address to work with, |
| // it is inherited following the general rules of the PolicyContainerHost. |
| network::mojom::IPAddressSpace ip_address_space = |
| network::mojom::IPAddressSpace::kUnknown; |
| |
| // Whether non-secure contexts are allowed to issue Local Network Access |
| // requests. Even if allowed, they are still bound by permission |
| // requirements. |
| // |
| // Only relevant if network::features::kLocalNetworkAccessChecks is enabled |
| // and blocking. |
| bool allow_non_secure_local_network_access = false; |
| |
| // Whether the document is a secure context. |
| // |
| // See: https://html.spec.whatwg.org/C/#secure-contexts. |
| // |
| // See also: |
| // - |network::IsUrlPotentiallyTrustworthy()| |
| // - |network::IsOriginPotentiallyTrustworthy()| |
| bool is_web_secure_context = false; |
| |
| // The content security policies of the associated document. |
| std::vector<network::mojom::ContentSecurityPolicyPtr> |
| content_security_policies; |
| |
| // The cross-origin-opener-policy (COOP) of the document |
| // See: |
| // https://html.spec.whatwg.org/multipage/origin.html#cross-origin-opener-policies |
| network::CrossOriginOpenerPolicy cross_origin_opener_policy; |
| |
| // The cross-origin-embedder-policy (COEP) of the document |
| // See: |
| // https://html.spec.whatwg.org/multipage/origin.html#coep |
| network::CrossOriginEmbedderPolicy cross_origin_embedder_policy; |
| |
| // The document isolation policy for the document. |
| // See: |
| // https://github.com/explainers-by-googlers/document-isolation-policy |
| network::DocumentIsolationPolicy document_isolation_policy; |
| |
| network::IntegrityPolicy integrity_policy; |
| network::IntegrityPolicy integrity_policy_report_only; |
| |
| // Tracks the sandbox flags which are in effect on this document. This |
| // includes any flags which have been set by a Content-Security-Policy header, |
| // in addition to those which are set by the embedding frame. |
| network::mojom::WebSandboxFlags sandbox_flags = |
| network::mojom::WebSandboxFlags::kNone; |
| |
| // https://wicg.github.io/anonymous-iframe/#spec-window-attribute |
| // True for window framed inside credentialless iframe, directly or indirectly |
| // by one of its ancestors |
| bool is_credentialless = false; |
| |
| // Tracks if a document is allowed to navigate the top-level frame without |
| // sticky user activation. A document loses this ability when it is |
| // cross-origin with the top-level frame. An exception is made if the parent |
| // embeds the child with sandbox="allow-top-navigation", as opposed to not |
| // using sandboxing. A document that is same-origin to the top-level frame |
| // will always have this value set to true. |
| bool can_navigate_top_without_user_gesture = true; |
| |
| // Whether crossOriginIsolation was enabled by DocumentIsolationPolicy. We |
| // pass this to the renderer process, because crossOriginIsolation enabled by |
| // DocumentIsolationPolicy is not subject to the CrossOriginIoslation |
| // Permission Policy (computed in the renderer process). |
| // TODO(crbug.com/393522283): Ensure the COI status of a context is properly |
| // computed in the browser process and just pass it instead of passing several |
| // booleans to the renderer process and having it do the computation. |
| bool cross_origin_isolation_enabled_by_dip = false; |
| }; |
| |
| // Streams a human-readable string representation of |policies| to |out|. |
| CONTENT_EXPORT std::ostream& operator<<( |
| std::ostream& out, |
| const PolicyContainerPolicies& policies); |
| |
| // PolicyContainerHost serves as a container for several security policies. It |
| // should be owned by a RenderFrameHost. It keep tracks of the policies assigned |
| // to a document. When a document creates/opens another document with a local |
| // scheme (about:blank, about:srcdoc, data, blob, filesystem), the |
| // PolicyContainerHost of the opener is cloned and a copy is attached to the new |
| // document, so that the same security policies are applied to it. It implements |
| // a mojo interface that allows updates coming from Blink. |
| // |
| // Although it is owned through a scoped_refptr, a PolicyContainerHost should |
| // not be shared between different owners. A RenderFrameHost gets a |
| // PolicyContainerHost at creation time, and it gets a new one from the |
| // NavigationRequest every time a NavigationRequest commits. |
| // While a navigation is in flight, it is kept alive by |
| // NavigationStateKeepAlive, which means it can outlive its RenderFrameHost. |
| // At that point, it can be accessed through |
| // RenderFrameHostImpl::GetPolicyContainerHost. |
| class CONTENT_EXPORT PolicyContainerHost |
| : public base::RefCounted<PolicyContainerHost>, |
| public blink::mojom::PolicyContainerHost { |
| public: |
| // Constructs a PolicyContainerHost containing default policies and an unbound |
| // mojo receiver. |
| PolicyContainerHost(); |
| |
| // Constructs a PolicyContainerHost containing the given |policies|. |
| explicit PolicyContainerHost(PolicyContainerPolicies policies); |
| |
| // PolicyContainerHost instances are neither copyable nor movable. |
| PolicyContainerHost(const PolicyContainerHost&) = delete; |
| PolicyContainerHost& operator=(const PolicyContainerHost&) = delete; |
| |
| // AssociateWithFrameToken must be called as soon as this PolicyContainerHost |
| // becomes owned by a RenderFrameHost. |
| void AssociateWithFrameToken( |
| const blink::LocalFrameToken& token, |
| int process_id = ChildProcessHost::kInvalidUniqueID); |
| |
| const PolicyContainerPolicies& policies() const { return policies_; } |
| |
| network::mojom::ReferrerPolicy referrer_policy() const { |
| return policies_.referrer_policy; |
| } |
| |
| network::mojom::IPAddressSpace ip_address_space() const { |
| return policies_.ip_address_space; |
| } |
| |
| network::CrossOriginOpenerPolicy& cross_origin_opener_policy() { |
| return policies_.cross_origin_opener_policy; |
| } |
| |
| const network::CrossOriginEmbedderPolicy& cross_origin_embedder_policy() |
| const { |
| return policies_.cross_origin_embedder_policy; |
| } |
| |
| const network::DocumentIsolationPolicy& document_isolation_policy() const { |
| return policies_.document_isolation_policy; |
| } |
| |
| const network::IntegrityPolicy& integrity_policy() const { |
| return policies_.integrity_policy; |
| } |
| const network::IntegrityPolicy& integrity_policy_report_only() const { |
| return policies_.integrity_policy_report_only; |
| } |
| |
| network::mojom::WebSandboxFlags sandbox_flags() const { |
| return policies_.sandbox_flags; |
| } |
| |
| void AddContentSecurityPolicies( |
| std::vector<network::mojom::ContentSecurityPolicyPtr> |
| content_security_policies) final; |
| |
| void set_cross_origin_opener_policy( |
| const network::CrossOriginOpenerPolicy& policy) { |
| policies_.cross_origin_opener_policy = policy; |
| } |
| |
| void set_cross_origin_embedder_policy( |
| const network::CrossOriginEmbedderPolicy& policy) { |
| policies_.cross_origin_embedder_policy = policy; |
| } |
| |
| void set_document_isolation_policy( |
| const network::DocumentIsolationPolicy& policy) { |
| policies_.document_isolation_policy = policy; |
| } |
| |
| // Merges the provided sandbox flags with the existing flags. |
| void set_sandbox_flags(network::mojom::WebSandboxFlags sandbox_flags) { |
| policies_.sandbox_flags = sandbox_flags; |
| } |
| |
| void SetIsCredentialless() { policies_.is_credentialless = true; } |
| |
| void SetCanNavigateTopWithoutUserGesture(bool value) { |
| policies_.can_navigate_top_without_user_gesture = value; |
| } |
| |
| void SetCrossOriginIsolationEnabledByDIP() { |
| policies_.cross_origin_isolation_enabled_by_dip = true; |
| } |
| |
| // Return a PolicyContainer containing copies of the policies and a pending |
| // mojo remote that can be used to update policies in this object. If called a |
| // second time, it resets the receiver and creates a new PolicyContainer, |
| // invalidating the remote of the previous one. |
| blink::mojom::PolicyContainerPtr CreatePolicyContainerForBlink(); |
| |
| // Create a new PolicyContainerHost with the same policies (i.e. a deep copy), |
| // but with a new, unbound mojo receiver. |
| scoped_refptr<PolicyContainerHost> Clone() const; |
| |
| // Bind this PolicyContainerHost with the given mojo receiver, so that it can |
| // handle mojo messages coming from the corresponding remote. |
| void Bind( |
| blink::mojom::PolicyContainerBindParamsPtr policy_container_bind_params); |
| |
| private: |
| friend class base::RefCounted<PolicyContainerHost>; |
| ~PolicyContainerHost() override; |
| |
| void SetReferrerPolicy(network::mojom::ReferrerPolicy referrer_policy) final; |
| |
| // The policies of this PolicyContainerHost. |
| PolicyContainerPolicies policies_; |
| |
| mojo::AssociatedReceiver<blink::mojom::PolicyContainerHost> |
| policy_container_host_receiver_{this}; |
| |
| std::optional<blink::LocalFrameToken> frame_token_ = std::nullopt; |
| int process_id_ = ChildProcessHost::kInvalidUniqueID; |
| }; |
| |
| } // namespace content |
| |
| #endif // CONTENT_BROWSER_RENDERER_HOST_POLICY_CONTAINER_HOST_H_ |