/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- * vim: set ts=4 sw=4 et tw=99 ft=cpp: * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "nsJSPrincipals.h" #include "XPCWrapper.h" #include "CrossOriginWrapper.h" #include "AccessCheck.h" #include "WrapperFactory.h" namespace xpc { NoWaiverWrapper::NoWaiverWrapper(unsigned flags) : js::CrossCompartmentWrapper(flags) { } NoWaiverWrapper::~NoWaiverWrapper() { } CrossOriginWrapper::CrossOriginWrapper(unsigned flags) : NoWaiverWrapper(flags) { } CrossOriginWrapper::~CrossOriginWrapper() { } bool CrossOriginWrapper::getPropertyDescriptor(JSContext *cx, JSObject *wrapper, jsid id, bool set, js::PropertyDescriptor *desc) { return CrossCompartmentWrapper::getPropertyDescriptor(cx, wrapper, id, set, desc) && WrapperFactory::WaiveXrayAndWrap(cx, &desc->value); } bool CrossOriginWrapper::getOwnPropertyDescriptor(JSContext *cx, JSObject *wrapper, jsid id, bool set, js::PropertyDescriptor *desc) { return CrossCompartmentWrapper::getOwnPropertyDescriptor(cx, wrapper, id, set, desc) && WrapperFactory::WaiveXrayAndWrap(cx, &desc->value); } bool CrossOriginWrapper::get(JSContext *cx, JSObject *wrapper, JSObject *receiver, jsid id, js::Value *vp) { return CrossCompartmentWrapper::get(cx, wrapper, receiver, id, vp) && WrapperFactory::WaiveXrayAndWrap(cx, vp); } bool CrossOriginWrapper::call(JSContext *cx, JSObject *wrapper, unsigned argc, js::Value *vp) { return CrossCompartmentWrapper::call(cx, wrapper, argc, vp) && WrapperFactory::WaiveXrayAndWrap(cx, vp); } bool CrossOriginWrapper::construct(JSContext *cx, JSObject *wrapper, unsigned argc, js::Value *argv, js::Value *rval) { return CrossCompartmentWrapper::construct(cx, wrapper, argc, argv, rval) && WrapperFactory::WaiveXrayAndWrap(cx, rval); } bool NoWaiverWrapper::enter(JSContext *cx, JSObject *wrapper, jsid id, Action act, bool *bp) { *bp = true; // always allowed nsIScriptSecurityManager *ssm = XPCWrapper::GetSecurityManager(); if (!ssm) { return true; } // Note: By the time enter is called here, CrossCompartmentWrapper has // already pushed the fake stack frame onto cx. Because of this, the frame // that we're clamping is the one that we want (the one in our compartment). JSStackFrame *fp = NULL; nsIPrincipal *principal = GetCompartmentPrincipal(js::GetObjectCompartment(wrappedObject(wrapper))); nsresult rv = ssm->PushContextPrincipal(cx, JS_FrameIterator(cx, &fp), principal); if (NS_FAILED(rv)) { NS_WARNING("Not allowing call because we're out of memory"); JS_ReportOutOfMemory(cx); return false; } return true; } void NoWaiverWrapper::leave(JSContext *cx, JSObject *wrapper) { nsIScriptSecurityManager *ssm = XPCWrapper::GetSecurityManager(); if (ssm) { ssm->PopContextPrincipal(cx); } } }