Bug 1915280 - improve UITour origin checks, r=Mardak,nika
Differential Revision: https://phabricator.services.mozilla.com/D241796
This commit is contained in:
@@ -2,12 +2,11 @@
|
|||||||
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||||
|
|
||||||
const PREF_TEST_ORIGINS = "browser.uitour.testingOrigins";
|
import { UITourUtils } from "moz-src:///browser/components/uitour/UITourUtils.sys.mjs";
|
||||||
const UITOUR_PERMISSION = "uitour";
|
|
||||||
|
|
||||||
export class UITourChild extends JSWindowActorChild {
|
export class UITourChild extends JSWindowActorChild {
|
||||||
handleEvent(event) {
|
handleEvent(event) {
|
||||||
if (!this.ensureTrustedOrigin()) {
|
if (!UITourUtils.ensureTrustedOrigin(this.manager)) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -18,62 +17,6 @@ export class UITourChild extends JSWindowActorChild {
|
|||||||
});
|
});
|
||||||
}
|
}
|
||||||
|
|
||||||
isTestingOrigin(aURI) {
|
|
||||||
let testingOrigins = Services.prefs.getStringPref(PREF_TEST_ORIGINS, "");
|
|
||||||
if (!testingOrigins) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Allow any testing origins (comma-seperated).
|
|
||||||
for (let origin of testingOrigins.split(/\s*,\s*/)) {
|
|
||||||
try {
|
|
||||||
let testingURI = Services.io.newURI(origin);
|
|
||||||
if (aURI.prePath == testingURI.prePath) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
} catch (ex) {
|
|
||||||
console.error(ex);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
// This function is copied from UITour.sys.mjs.
|
|
||||||
isSafeScheme(aURI) {
|
|
||||||
let allowedSchemes = new Set(["https", "about"]);
|
|
||||||
if (!allowedSchemes.has(aURI.scheme)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
ensureTrustedOrigin() {
|
|
||||||
if (this.browsingContext.top != this.browsingContext) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
let uri = this.document.documentURIObject;
|
|
||||||
|
|
||||||
if (uri.schemeIs("chrome")) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!this.isSafeScheme(uri)) {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
let permission = Services.perms.testPermissionFromPrincipal(
|
|
||||||
this.document.nodePrincipal,
|
|
||||||
UITOUR_PERMISSION
|
|
||||||
);
|
|
||||||
if (permission == Services.perms.ALLOW_ACTION) {
|
|
||||||
return true;
|
|
||||||
}
|
|
||||||
|
|
||||||
return this.isTestingOrigin(uri);
|
|
||||||
}
|
|
||||||
|
|
||||||
receiveMessage(aMessage) {
|
receiveMessage(aMessage) {
|
||||||
switch (aMessage.name) {
|
switch (aMessage.name) {
|
||||||
case "UITour:SendPageCallback":
|
case "UITour:SendPageCallback":
|
||||||
@@ -86,7 +29,7 @@ export class UITourChild extends JSWindowActorChild {
|
|||||||
}
|
}
|
||||||
|
|
||||||
sendPageEvent(type, detail) {
|
sendPageEvent(type, detail) {
|
||||||
if (!this.ensureTrustedOrigin()) {
|
if (!UITourUtils.ensureTrustedOrigin(this.manager)) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -3,9 +3,13 @@
|
|||||||
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||||
|
|
||||||
import { UITour } from "moz-src:///browser/components/uitour/UITour.sys.mjs";
|
import { UITour } from "moz-src:///browser/components/uitour/UITour.sys.mjs";
|
||||||
|
import { UITourUtils } from "moz-src:///browser/components/uitour/UITourUtils.sys.mjs";
|
||||||
|
|
||||||
export class UITourParent extends JSWindowActorParent {
|
export class UITourParent extends JSWindowActorParent {
|
||||||
receiveMessage(message) {
|
receiveMessage(message) {
|
||||||
|
if (!UITourUtils.ensureTrustedOrigin(this.manager)) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
switch (message.name) {
|
switch (message.name) {
|
||||||
case "UITour:onPageEvent":
|
case "UITour:onPageEvent":
|
||||||
if (this.manager.rootFrameLoader) {
|
if (this.manager.rootFrameLoader) {
|
||||||
|
|||||||
84
browser/components/uitour/UITourUtils.sys.mjs
Normal file
84
browser/components/uitour/UITourUtils.sys.mjs
Normal file
@@ -0,0 +1,84 @@
|
|||||||
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
||||||
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||||
|
|
||||||
|
const PREF_TEST_ORIGINS = "browser.uitour.testingOrigins";
|
||||||
|
const UITOUR_PERMISSION = "uitour";
|
||||||
|
|
||||||
|
export let UITourUtils = {
|
||||||
|
/**
|
||||||
|
* Check if we've got a testing origin.
|
||||||
|
*
|
||||||
|
* @param {nsIURI} uri
|
||||||
|
* The URI to check
|
||||||
|
* @returns {boolean}
|
||||||
|
* Whether or not it's a testing origin.
|
||||||
|
*/
|
||||||
|
isTestingOrigin(uri) {
|
||||||
|
let testingOrigins = Services.prefs.getStringPref(PREF_TEST_ORIGINS, "");
|
||||||
|
if (!testingOrigins) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Allow any testing origins (comma-seperated).
|
||||||
|
for (let origin of testingOrigins.split(/\s*,\s*/)) {
|
||||||
|
try {
|
||||||
|
let testingURI = Services.io.newURI(origin);
|
||||||
|
if (uri.prePath == testingURI.prePath) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
} catch (ex) {
|
||||||
|
console.error(ex);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
},
|
||||||
|
|
||||||
|
/**
|
||||||
|
*
|
||||||
|
* @param {WindowGlobalChild|WindowGlobalParent} windowGlobal
|
||||||
|
* The parent/child representation of a window global to check if we can
|
||||||
|
* use UITour.
|
||||||
|
* @returns {boolean}
|
||||||
|
* Whether or not we can use UITour here.
|
||||||
|
*/
|
||||||
|
ensureTrustedOrigin(windowGlobal) {
|
||||||
|
// If we're not top-most or no longer current, bail out immediately.
|
||||||
|
if (windowGlobal.browsingContext.parent || !windowGlobal.isCurrentGlobal) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
let principal, uri;
|
||||||
|
// We can get either a WindowGlobalParent or WindowGlobalChild, depending on
|
||||||
|
// what process we're called in, and determining the secure context-ness and
|
||||||
|
// principal + URI needs different approaches based on this.
|
||||||
|
if (WindowGlobalParent.isInstance(windowGlobal)) {
|
||||||
|
if (!windowGlobal.browsingContext.secureBrowserUI?.isSecureContext) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
principal = windowGlobal.documentPrincipal;
|
||||||
|
uri = windowGlobal.documentURI;
|
||||||
|
} else {
|
||||||
|
if (!windowGlobal.contentWindow?.isSecureContext) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
let document = windowGlobal.contentWindow.document;
|
||||||
|
principal = document?.nodePrincipal;
|
||||||
|
uri = document?.documentURIObject;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!principal) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
let permission = Services.perms.testPermissionFromPrincipal(
|
||||||
|
principal,
|
||||||
|
UITOUR_PERMISSION
|
||||||
|
);
|
||||||
|
if (permission == Services.perms.ALLOW_ACTION) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
return uri && this.isTestingOrigin(uri);
|
||||||
|
},
|
||||||
|
};
|
||||||
@@ -2,7 +2,12 @@
|
|||||||
# License, v. 2.0. If a copy of the MPL was not distributed with this
|
# License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||||
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||||
|
|
||||||
MOZ_SRC_FILES += ["UITour.sys.mjs", "UITourChild.sys.mjs", "UITourParent.sys.mjs"]
|
MOZ_SRC_FILES += [
|
||||||
|
"UITour.sys.mjs",
|
||||||
|
"UITourChild.sys.mjs",
|
||||||
|
"UITourParent.sys.mjs",
|
||||||
|
"UITourUtils.sys.mjs",
|
||||||
|
]
|
||||||
|
|
||||||
BROWSER_CHROME_MANIFESTS += [
|
BROWSER_CHROME_MANIFESTS += [
|
||||||
"test/browser.toml",
|
"test/browser.toml",
|
||||||
|
|||||||
@@ -16,6 +16,10 @@ add_task(async function test_privatebrowsing_window() {
|
|||||||
const ABOUT_ORIGIN_WITH_UITOUR_DEFAULT = "about:newtab";
|
const ABOUT_ORIGIN_WITH_UITOUR_DEFAULT = "about:newtab";
|
||||||
const HTTPS_ORIGIN_WITH_UITOUR_DEFAULT = "https://www.mozilla.org";
|
const HTTPS_ORIGIN_WITH_UITOUR_DEFAULT = "https://www.mozilla.org";
|
||||||
|
|
||||||
|
let { UITourUtils } = ChromeUtils.importESModule(
|
||||||
|
"moz-src:///browser/components/uitour/UITourUtils.sys.mjs"
|
||||||
|
);
|
||||||
|
|
||||||
let win = await BrowserTestUtils.openNewBrowserWindow({ private: true });
|
let win = await BrowserTestUtils.openNewBrowserWindow({ private: true });
|
||||||
let browser = win.gBrowser.selectedBrowser;
|
let browser = win.gBrowser.selectedBrowser;
|
||||||
|
|
||||||
@@ -26,10 +30,21 @@ add_task(async function test_privatebrowsing_window() {
|
|||||||
BrowserTestUtils.startLoadingURIString(browser, uri);
|
BrowserTestUtils.startLoadingURIString(browser, uri);
|
||||||
await BrowserTestUtils.browserLoaded(browser);
|
await BrowserTestUtils.browserLoaded(browser);
|
||||||
|
|
||||||
|
Assert.ok(
|
||||||
|
UITourUtils.ensureTrustedOrigin(
|
||||||
|
browser.browsingContext.currentWindowGlobal
|
||||||
|
),
|
||||||
|
"Page should be considered trusted for UITour in the parent."
|
||||||
|
);
|
||||||
|
|
||||||
await SpecialPowers.spawn(browser, [], async () => {
|
await SpecialPowers.spawn(browser, [], async () => {
|
||||||
let actor = content.windowGlobalChild.getActor("UITour");
|
let actor = content.windowGlobalChild.getActor("UITour");
|
||||||
|
// eslint-disable-next-line no-shadow
|
||||||
|
let { UITourUtils } = ChromeUtils.importESModule(
|
||||||
|
"moz-src:///browser/components/uitour/UITourUtils.sys.mjs"
|
||||||
|
);
|
||||||
Assert.ok(
|
Assert.ok(
|
||||||
actor.ensureTrustedOrigin(),
|
UITourUtils.ensureTrustedOrigin(actor.manager),
|
||||||
"Page should be considered trusted for UITour."
|
"Page should be considered trusted for UITour."
|
||||||
);
|
);
|
||||||
});
|
});
|
||||||
|
|||||||
@@ -178,6 +178,7 @@ interface WindowGlobalChild {
|
|||||||
readonly attribute boolean isInProcess;
|
readonly attribute boolean isInProcess;
|
||||||
readonly attribute BrowsingContext browsingContext;
|
readonly attribute BrowsingContext browsingContext;
|
||||||
readonly attribute WindowContext windowContext;
|
readonly attribute WindowContext windowContext;
|
||||||
|
readonly attribute WindowProxy? contentWindow;
|
||||||
|
|
||||||
readonly attribute boolean isCurrentGlobal;
|
readonly attribute boolean isCurrentGlobal;
|
||||||
|
|
||||||
|
|||||||
@@ -258,6 +258,13 @@ dom::BrowsingContext* WindowGlobalChild::BrowsingContext() {
|
|||||||
return mWindowContext->GetBrowsingContext();
|
return mWindowContext->GetBrowsingContext();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Nullable<WindowProxyHolder> WindowGlobalChild::GetContentWindow() {
|
||||||
|
if (IsCurrentGlobal()) {
|
||||||
|
return WindowProxyHolder(BrowsingContext());
|
||||||
|
}
|
||||||
|
return nullptr;
|
||||||
|
}
|
||||||
|
|
||||||
uint64_t WindowGlobalChild::InnerWindowId() {
|
uint64_t WindowGlobalChild::InnerWindowId() {
|
||||||
return mWindowContext->InnerWindowId();
|
return mWindowContext->InnerWindowId();
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -14,6 +14,7 @@
|
|||||||
#include "nsWrapperCache.h"
|
#include "nsWrapperCache.h"
|
||||||
#include "mozilla/dom/Document.h"
|
#include "mozilla/dom/Document.h"
|
||||||
#include "mozilla/dom/WindowGlobalActor.h"
|
#include "mozilla/dom/WindowGlobalActor.h"
|
||||||
|
#include "mozilla/dom/WindowProxyHolder.h"
|
||||||
|
|
||||||
class nsGlobalWindowInner;
|
class nsGlobalWindowInner;
|
||||||
class nsDocShell;
|
class nsDocShell;
|
||||||
@@ -53,6 +54,8 @@ class WindowGlobalChild final : public WindowGlobalActor,
|
|||||||
dom::WindowContext* WindowContext() const { return mWindowContext; }
|
dom::WindowContext* WindowContext() const { return mWindowContext; }
|
||||||
nsGlobalWindowInner* GetWindowGlobal() const { return mWindowGlobal; }
|
nsGlobalWindowInner* GetWindowGlobal() const { return mWindowGlobal; }
|
||||||
|
|
||||||
|
Nullable<WindowProxyHolder> GetContentWindow();
|
||||||
|
|
||||||
// Has this actor been shut down
|
// Has this actor been shut down
|
||||||
bool IsClosed() { return !CanSend(); }
|
bool IsClosed() { return !CanSend(); }
|
||||||
void Destroy();
|
void Destroy();
|
||||||
|
|||||||
Reference in New Issue
Block a user