/* * Copyright (C) 2012 Google Inc. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of Apple Inc. ("Apple") nor the names of * its contributors may be used to endorse or promote products derived * from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY APPLE AND ITS CONTRIBUTORS "AS IS" AND ANY * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL APPLE OR ITS CONTRIBUTORS BE LIABLE FOR ANY * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "config.h" #include "MixedContentChecker.h" #include "Document.h" #include "Frame.h" #include "FrameLoader.h" #include "FrameLoaderClient.h" #include "SecurityOrigin.h" #include "Settings.h" #include #include namespace WebCore { MixedContentChecker::MixedContentChecker(Frame& frame) : m_frame(frame) { } FrameLoaderClient& MixedContentChecker::client() const { return m_frame.loader().client(); } // static bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const URL& url) { if (securityOrigin->protocol() != "https") return false; // We only care about HTTPS security origins. // We're in a secure context, so |url| is mixed content if it's insecure. return !SecurityOrigin::isSecure(url); } bool MixedContentChecker::canDisplayInsecureContent(SecurityOrigin* securityOrigin, ContentType type, const URL& url) const { if (!isMixedContent(securityOrigin, url)) return true; bool allowed = m_frame.settings().allowDisplayOfInsecureContent() || type == ContentType::ActiveCanWarn; logWarning(allowed, "display", url); if (allowed) client().didDisplayInsecureContent(); return allowed; } bool MixedContentChecker::canRunInsecureContent(SecurityOrigin* securityOrigin, const URL& url) const { if (!isMixedContent(securityOrigin, url)) return true; bool allowed = m_frame.settings().allowRunningOfInsecureContent(); logWarning(allowed, "run", url); if (allowed) client().didRunInsecureContent(securityOrigin, url); return allowed; } void MixedContentChecker::checkFormForMixedContent(SecurityOrigin* securityOrigin, const URL& url) const { // Unconditionally allow javascript: URLs as form actions as some pages do this and it does not introduce // a mixed content issue. if (protocolIsJavaScript(url)) return; if (!isMixedContent(securityOrigin, url)) return; String message = makeString("The page at ", m_frame.document()->url().stringCenterEllipsizedToLength(), " contains a form which targets an insecure URL ", url.stringCenterEllipsizedToLength(), ".\n"); m_frame.document()->addConsoleMessage(MessageSource::Security, MessageLevel::Warning, message); client().didDisplayInsecureContent(); } void MixedContentChecker::logWarning(bool allowed, const String& action, const URL& target) const { const char* errorString = allowed ? " was allowed to " : " was not allowed to "; String message = makeString((allowed ? String() : "[blocked] "), "The page at ", m_frame.document()->url().stringCenterEllipsizedToLength(), errorString, action, " insecure content from ", target.stringCenterEllipsizedToLength(), ".\n"); m_frame.document()->addConsoleMessage(MessageSource::Security, MessageLevel::Warning, message); } } // namespace WebCore