Diff
Copied: branches/chromium/874/LayoutTests/http/tests/security/cookies/cookie-theft-with-_javascript_-doc-expected.txt (from rev 96260, trunk/LayoutTests/http/tests/security/cookies/cookie-theft-with-_javascript_-doc-expected.txt) (0 => 96368)
--- branches/chromium/874/LayoutTests/http/tests/security/cookies/cookie-theft-with-_javascript_-doc-expected.txt (rev 0)
+++ branches/chromium/874/LayoutTests/http/tests/security/cookies/cookie-theft-with-_javascript_-doc-expected.txt 2011-09-29 22:33:03 UTC (rev 96368)
@@ -0,0 +1 @@
+SUCCESS
Copied: branches/chromium/874/LayoutTests/http/tests/security/cookies/cookie-theft-with-_javascript_-doc.html (from rev 96260, trunk/LayoutTests/http/tests/security/cookies/cookie-theft-with-_javascript_-doc.html) (0 => 96368)
--- branches/chromium/874/LayoutTests/http/tests/security/cookies/cookie-theft-with-_javascript_-doc.html (rev 0)
+++ branches/chromium/874/LayoutTests/http/tests/security/cookies/cookie-theft-with-_javascript_-doc.html 2011-09-29 22:33:03 UTC (rev 96368)
@@ -0,0 +1,38 @@
+<html>
+<head>
+<script>
+if (window.layoutTestController) {
+ layoutTestController.dumpAsText();
+ layoutTestController.waitUntilDone();
+ layoutTestController.setCanOpenWindows();
+ layoutTestController.setCloseRemainingWindowsWhenComplete(true);
+}
+
+window._onload_ = function()
+{
+ frame = document.body.appendChild(document.createElement("iframe"));
+ frame.src = ""
+ frame._onload_ = function() {
+ frame._onload_ = null;
+
+ wnd = frame.contentWindow.open();
+ frame.src = ""
+ window._onmessage_ = function(e) {
+ key = e.data;
+ wnd.location = "_javascript_:('bar')";
+ setTimeout(finishTest, 0);
+ }
+ }
+}
+
+function finishTest()
+{
+ document.body.textContent = wnd.document.cookie.indexOf(key) != -1 ? "FAILURE" : "SUCCESS";
+ if (window.layoutTestController)
+ layoutTestController.notifyDone();
+}
+</script>
+</head>
+<body>
+</body>
+</html>
\ No newline at end of file
Copied: branches/chromium/874/LayoutTests/http/tests/security/cookies/resources/innocent-victim-with-cookies.html (from rev 96260, trunk/LayoutTests/http/tests/security/cookies/resources/innocent-victim-with-cookies.html) (0 => 96368)
--- branches/chromium/874/LayoutTests/http/tests/security/cookies/resources/innocent-victim-with-cookies.html (rev 0)
+++ branches/chromium/874/LayoutTests/http/tests/security/cookies/resources/innocent-victim-with-cookies.html 2011-09-29 22:33:03 UTC (rev 96368)
@@ -0,0 +1,9 @@
+<html>
+<body>
+<script>
+k = Math.floor(Math.random() * 1000000);
+document.cookie = "secretcookie=" + k + ";path=/";
+parent.postMessage(k, "*");
+</script>
+</body>
+</html>
\ No newline at end of file
Modified: branches/chromium/874/Source/WebCore/dom/Document.h (96367 => 96368)
--- branches/chromium/874/Source/WebCore/dom/Document.h 2011-09-29 22:25:48 UTC (rev 96367)
+++ branches/chromium/874/Source/WebCore/dom/Document.h 2011-09-29 22:33:03 UTC (rev 96368)
@@ -820,6 +820,7 @@
// inherits its cookieURL but not its URL.
//
const KURL& cookieURL() const { return m_cookieURL; }
+ void setCookieURL(const KURL& url) { m_cookieURL = url; }
// The firstPartyForCookies is used to compute whether this document
// appears in a "third-party" context for the purpose of third-party
Modified: branches/chromium/874/Source/WebCore/loader/DocumentWriter.cpp (96367 => 96368)
--- branches/chromium/874/Source/WebCore/loader/DocumentWriter.cpp 2011-09-29 22:25:48 UTC (rev 96367)
+++ branches/chromium/874/Source/WebCore/loader/DocumentWriter.cpp 2011-09-29 22:33:03 UTC (rev 96368)
@@ -67,7 +67,7 @@
void DocumentWriter::replaceDocument(const String& source)
{
m_frame->loader()->stopAllLoaders();
- begin(m_frame->document()->url(), true, m_frame->document()->securityOrigin());
+ begin(m_frame->document()->url(), true, InheritSecurityOrigin);
if (!source.isNull()) {
if (!m_hasReceivedSomeData) {
@@ -106,11 +106,9 @@
return DOMImplementation::createDocument(m_mimeType, m_frame, url, m_frame->inViewSourceMode());
}
-void DocumentWriter::begin(const KURL& urlReference, bool dispatch, SecurityOrigin* origin)
+void DocumentWriter::begin(const KURL& urlReference, bool dispatch, SecurityOriginSource originSource)
{
- // We need to take a reference to the security origin because |clear|
- // might destroy the document that owns it.
- RefPtr<SecurityOrigin> forcedSecurityOrigin = origin;
+ RefPtr<Document> oldDocument = m_frame->document();
// We grab a local copy of the URL because it's easy for callers to supply
// a URL that will be deallocated during the execution of this function.
@@ -139,8 +137,10 @@
if (m_decoder)
document->setDecoder(m_decoder.get());
- if (forcedSecurityOrigin)
- document->setSecurityOrigin(forcedSecurityOrigin.get());
+ if (originSource == InheritSecurityOrigin) {
+ document->setCookieURL(oldDocument->cookieURL());
+ document->setSecurityOrigin(oldDocument->securityOrigin());
+ }
m_frame->domWindow()->setURL(document->url());
m_frame->domWindow()->setSecurityOrigin(document->securityOrigin());
Modified: branches/chromium/874/Source/WebCore/loader/DocumentWriter.h (96367 => 96368)
--- branches/chromium/874/Source/WebCore/loader/DocumentWriter.h 2011-09-29 22:25:48 UTC (rev 96367)
+++ branches/chromium/874/Source/WebCore/loader/DocumentWriter.h 2011-09-29 22:33:03 UTC (rev 96368)
@@ -49,8 +49,10 @@
// and always contains the result of evaluating a _javascript_: url.
void replaceDocument(const String&);
+ enum SecurityOriginSource { CreateNewSecurityOrigin, InheritSecurityOrigin };
+
void begin();
- void begin(const KURL&, bool dispatchWindowObjectAvailable = true, SecurityOrigin* forcedSecurityOrigin = 0);
+ void begin(const KURL&, bool dispatchWindowObjectAvailable = true, SecurityOriginSource = CreateNewSecurityOrigin);
void addData(const char* bytes, size_t length);
void end();
void endIfNotLoadingMainResource();