Files
tubestation/toolkit/components/extensions/WebExtensionPolicy.h
Shane Caraveo ecf7aa7e22 Bug 1476570 - allow proxy to work on restricted domains, r=aswan
Proxies must work with all requests, however the new onRequest proxy api
has maching logic using ChannelWrapper which uses WebExtensionPolicy which
checks against restricted domains.  We need to bypass that check when
matching for proxy requests.

MozReview-Commit-ID: 5zCdmV1b9M7
2018-08-02 14:03:00 -03:00

203 lines
5.5 KiB
C++

/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2; -*- */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#ifndef mozilla_extensions_WebExtensionPolicy_h
#define mozilla_extensions_WebExtensionPolicy_h
#include "mozilla/dom/BindingDeclarations.h"
#include "mozilla/dom/Nullable.h"
#include "mozilla/dom/WebExtensionPolicyBinding.h"
#include "mozilla/extensions/MatchPattern.h"
#include "jspubtd.h"
#include "mozilla/Result.h"
#include "mozilla/WeakPtr.h"
#include "nsCOMPtr.h"
#include "nsCycleCollectionParticipant.h"
#include "nsISupports.h"
#include "nsWrapperCache.h"
namespace mozilla {
namespace extensions {
using dom::WebExtensionInit;
using dom::WebExtensionLocalizeCallback;
class DocInfo;
class WebExtensionContentScript;
class WebExtensionPolicy final : public nsISupports
, public nsWrapperCache
, public SupportsWeakPtr<WebExtensionPolicy>
{
public:
NS_DECL_CYCLE_COLLECTING_ISUPPORTS
NS_DECL_CYCLE_COLLECTION_SCRIPT_HOLDER_CLASS(WebExtensionPolicy)
MOZ_DECLARE_WEAKREFERENCE_TYPENAME(WebExtensionPolicy)
using ScriptArray = nsTArray<RefPtr<WebExtensionContentScript>>;
static already_AddRefed<WebExtensionPolicy>
Constructor(dom::GlobalObject& aGlobal, const WebExtensionInit& aInit, ErrorResult& aRv);
nsAtom* Id() const { return mId; }
void GetId(nsAString& aId) const { aId = nsDependentAtomString(mId); };
const nsCString& MozExtensionHostname() const { return mHostname; }
void GetMozExtensionHostname(nsACString& aHostname) const
{
aHostname = MozExtensionHostname();
}
void GetBaseURL(nsACString& aBaseURL) const
{
MOZ_ALWAYS_SUCCEEDS(mBaseURI->GetSpec(aBaseURL));
}
void GetURL(const nsAString& aPath, nsAString& aURL, ErrorResult& aRv) const;
Result<nsString, nsresult> GetURL(const nsAString& aPath) const;
void RegisterContentScript(WebExtensionContentScript& script,
ErrorResult& aRv);
void UnregisterContentScript(const WebExtensionContentScript& script,
ErrorResult& aRv);
bool CanAccessURI(const URLInfo& aURI, bool aExplicit = false, bool aCheckRestricted = true) const
{
return (!aCheckRestricted || !IsRestrictedURI(aURI)) &&
mHostPermissions && mHostPermissions->Matches(aURI, aExplicit);
}
bool IsPathWebAccessible(const nsAString& aPath) const
{
return mWebAccessiblePaths.Matches(aPath);
}
bool HasPermission(const nsAtom* aPermission) const
{
return mPermissions->Contains(aPermission);
}
bool HasPermission(const nsAString& aPermission) const
{
return mPermissions->Contains(aPermission);
}
static bool IsRestrictedDoc(const DocInfo& aDoc);
static bool IsRestrictedURI(const URLInfo& aURI);
nsCString BackgroundPageHTML() const;
void Localize(const nsAString& aInput, nsString& aResult) const;
const nsString& Name() const
{
return mName;
}
void GetName(nsAString& aName) const
{
aName = mName;
}
const nsString& ContentSecurityPolicy() const
{
return mContentSecurityPolicy;
}
void GetContentSecurityPolicy(nsAString& aCSP) const
{
aCSP = mContentSecurityPolicy;
}
already_AddRefed<MatchPatternSet> AllowedOrigins()
{
return do_AddRef(mHostPermissions);
}
void SetAllowedOrigins(MatchPatternSet& aAllowedOrigins)
{
mHostPermissions = &aAllowedOrigins;
}
void GetPermissions(nsTArray<nsString>& aResult) const
{
mPermissions->Get(aResult);
}
void SetPermissions(const nsTArray<nsString>& aPermissions)
{
mPermissions = new AtomSet(aPermissions);
}
void GetContentScripts(ScriptArray& aScripts) const;
const ScriptArray& ContentScripts() const { return mContentScripts; }
bool Active() const { return mActive; }
void SetActive(bool aActive, ErrorResult& aRv);
static void
GetActiveExtensions(dom::GlobalObject& aGlobal, nsTArray<RefPtr<WebExtensionPolicy>>& aResults);
static already_AddRefed<WebExtensionPolicy>
GetByID(dom::GlobalObject& aGlobal, const nsAString& aID);
static already_AddRefed<WebExtensionPolicy>
GetByHostname(dom::GlobalObject& aGlobal, const nsACString& aHostname);
static already_AddRefed<WebExtensionPolicy>
GetByURI(dom::GlobalObject& aGlobal, nsIURI* aURI);
static bool
IsRestrictedURI(dom::GlobalObject& aGlobal, const URLInfo& aURI)
{
return IsRestrictedURI(aURI);
}
static bool UseRemoteWebExtensions(dom::GlobalObject& aGlobal);
static bool IsExtensionProcess(dom::GlobalObject& aGlobal);
nsISupports* GetParentObject() const { return mParent; }
virtual JSObject* WrapObject(JSContext* aCx, JS::HandleObject aGivenProto) override;
protected:
virtual ~WebExtensionPolicy() = default;
private:
WebExtensionPolicy(dom::GlobalObject& aGlobal, const WebExtensionInit& aInit, ErrorResult& aRv);
bool Enable();
bool Disable();
nsCOMPtr<nsISupports> mParent;
RefPtr<nsAtom> mId;
nsCString mHostname;
nsCOMPtr<nsIURI> mBaseURI;
nsString mName;
nsString mContentSecurityPolicy;
bool mActive = false;
RefPtr<WebExtensionLocalizeCallback> mLocalizeCallback;
RefPtr<AtomSet> mPermissions;
RefPtr<MatchPatternSet> mHostPermissions;
MatchGlobSet mWebAccessiblePaths;
dom::Nullable<nsTArray<nsString>> mBackgroundScripts;
nsTArray<RefPtr<WebExtensionContentScript>> mContentScripts;
};
} // namespace extensions
} // namespace mozilla
#endif // mozilla_extensions_WebExtensionPolicy_h