The most expensive step in ValidatePrincipal is currently building a SiteOriginNoSuffix from a ContentPrincipal. This codepath has become more hot due to new checks using ValidatePrincipal. This refactors the code to avoid doing any work on the principal in more cases. The new codepath only computes a different siteOrigin for http(s) URIs, which I believe should be correct. It also does manual parsing of the origin which was built by GenerateOriginNoSuffixForURI in order to avoid unnecessary calls to the URI parser. Differential Revision: https://phabricator.services.mozilla.com/D242420
785 lines
24 KiB
C++
785 lines
24 KiB
C++
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=2 sw=2 et tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "ContentPrincipal.h"
|
|
|
|
#include "mozIThirdPartyUtil.h"
|
|
#include "nsContentUtils.h"
|
|
#include "nscore.h"
|
|
#include "nsScriptSecurityManager.h"
|
|
#include "nsString.h"
|
|
#include "nsReadableUtils.h"
|
|
#include "pratom.h"
|
|
#include "nsIURI.h"
|
|
#include "nsIURL.h"
|
|
#include "nsIStandardURL.h"
|
|
#include "nsIURIWithSpecialOrigin.h"
|
|
#include "nsIURIMutator.h"
|
|
#include "nsJSPrincipals.h"
|
|
#include "nsIEffectiveTLDService.h"
|
|
#include "nsIClassInfoImpl.h"
|
|
#include "nsIObjectInputStream.h"
|
|
#include "nsIObjectOutputStream.h"
|
|
#include "nsIProtocolHandler.h"
|
|
#include "nsError.h"
|
|
#include "nsIContentSecurityPolicy.h"
|
|
#include "nsNetCID.h"
|
|
#include "js/RealmIterators.h"
|
|
#include "js/Wrapper.h"
|
|
|
|
#include "mozilla/dom/BlobURLProtocolHandler.h"
|
|
#include "mozilla/dom/ScriptSettings.h"
|
|
#include "mozilla/ClearOnShutdown.h"
|
|
#include "mozilla/ExtensionPolicyService.h"
|
|
#include "mozilla/Preferences.h"
|
|
#include "mozilla/HashFunctions.h"
|
|
|
|
#include "nsSerializationHelper.h"
|
|
|
|
#include "js/JSON.h"
|
|
#include "ContentPrincipalJSONHandler.h"
|
|
|
|
using namespace mozilla;
|
|
|
|
NS_IMPL_CLASSINFO(ContentPrincipal, nullptr, 0, NS_PRINCIPAL_CID)
|
|
NS_IMPL_QUERY_INTERFACE_CI(ContentPrincipal, nsIPrincipal)
|
|
NS_IMPL_CI_INTERFACE_GETTER(ContentPrincipal, nsIPrincipal)
|
|
|
|
ContentPrincipal::ContentPrincipal(nsIURI* aURI,
|
|
const OriginAttributes& aOriginAttributes,
|
|
const nsACString& aOriginNoSuffix,
|
|
nsIURI* aInitialDomain)
|
|
: BasePrincipal(eContentPrincipal, aOriginNoSuffix, aOriginAttributes),
|
|
mURI(aURI),
|
|
mDomain(aInitialDomain) {
|
|
if (mDomain) {
|
|
// We're just creating the principal, so no need to re-compute wrappers.
|
|
SetHasExplicitDomain();
|
|
}
|
|
|
|
#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED
|
|
// Assert that the URI we get here isn't any of the schemes that we know we
|
|
// should not get here. These schemes always either inherit their principal
|
|
// or fall back to a null principal. These are schemes which return
|
|
// URI_INHERITS_SECURITY_CONTEXT from their protocol handler's
|
|
// GetProtocolFlags function.
|
|
bool hasFlag = false;
|
|
MOZ_DIAGNOSTIC_ASSERT(
|
|
NS_SUCCEEDED(NS_URIChainHasFlags(
|
|
aURI, nsIProtocolHandler::URI_INHERITS_SECURITY_CONTEXT, &hasFlag)) &&
|
|
!hasFlag);
|
|
#endif
|
|
}
|
|
|
|
ContentPrincipal::ContentPrincipal(ContentPrincipal* aOther,
|
|
const OriginAttributes& aOriginAttributes)
|
|
: BasePrincipal(aOther, aOriginAttributes),
|
|
mURI(aOther->mURI),
|
|
mDomain(aOther->mDomain),
|
|
mAddon(aOther->mAddon) {}
|
|
|
|
ContentPrincipal::~ContentPrincipal() = default;
|
|
|
|
nsresult ContentPrincipal::GetScriptLocation(nsACString& aStr) {
|
|
return mURI->GetSpec(aStr);
|
|
}
|
|
|
|
/* static */
|
|
nsresult ContentPrincipal::GenerateOriginNoSuffixFromURI(
|
|
nsIURI* aURI, nsACString& aOriginNoSuffix) {
|
|
if (!aURI) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
nsCOMPtr<nsIURI> origin = NS_GetInnermostURI(aURI);
|
|
if (!origin) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
MOZ_ASSERT(!NS_IsAboutBlankAllowQueryAndFragment(origin),
|
|
"The inner URI for about:blank must be moz-safe-about:blank");
|
|
|
|
// Handle non-strict file:// uris.
|
|
if (!nsScriptSecurityManager::GetStrictFileOriginPolicy() &&
|
|
NS_URIIsLocalFile(origin)) {
|
|
// If strict file origin policy is not in effect, all local files are
|
|
// considered to be same-origin, so return a known dummy origin here.
|
|
aOriginNoSuffix.AssignLiteral("file://UNIVERSAL_FILE_URI_ORIGIN");
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult rv;
|
|
// NB: This is only compiled for Thunderbird/Suite.
|
|
#if IS_ORIGIN_IS_FULL_SPEC_DEFINED
|
|
bool fullSpec = false;
|
|
rv = NS_URIChainHasFlags(origin, nsIProtocolHandler::ORIGIN_IS_FULL_SPEC,
|
|
&fullSpec);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
if (fullSpec) {
|
|
return origin->GetAsciiSpec(aOriginNoSuffix);
|
|
}
|
|
#endif
|
|
|
|
// We want the invariant that prinA.origin == prinB.origin i.f.f.
|
|
// prinA.equals(prinB). However, this requires that we impose certain
|
|
// constraints on the behavior and origin semantics of principals, and in
|
|
// particular, forbid creating origin strings for principals whose equality
|
|
// constraints are not expressible as strings (i.e. object equality).
|
|
// Moreover, we want to forbid URIs containing the magic "^" we use as a
|
|
// separating character for origin attributes.
|
|
//
|
|
// These constraints can generally be achieved by restricting .origin to
|
|
// nsIStandardURL-based URIs, but there are a few other URI schemes that we
|
|
// need to handle.
|
|
if (origin->SchemeIs("about") ||
|
|
(origin->SchemeIs("moz-safe-about") &&
|
|
// We generally consider two about:foo origins to be same-origin, but
|
|
// about:blank is special since it can be generated from different
|
|
// sources. We check for moz-safe-about:blank since origin is an
|
|
// innermost URI.
|
|
!StringBeginsWith(origin->GetSpecOrDefault(),
|
|
"moz-safe-about:blank"_ns))) {
|
|
rv = origin->GetAsciiSpec(aOriginNoSuffix);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
int32_t pos = aOriginNoSuffix.FindChar('?');
|
|
int32_t hashPos = aOriginNoSuffix.FindChar('#');
|
|
|
|
if (hashPos != kNotFound && (pos == kNotFound || hashPos < pos)) {
|
|
pos = hashPos;
|
|
}
|
|
|
|
if (pos != kNotFound) {
|
|
aOriginNoSuffix.Truncate(pos);
|
|
}
|
|
|
|
// These URIs could technically contain a '^', but they never should.
|
|
if (NS_WARN_IF(aOriginNoSuffix.FindChar('^', 0) != -1)) {
|
|
aOriginNoSuffix.Truncate();
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
// This URL can be a blobURL. In this case, we should use the 'parent'
|
|
// principal instead.
|
|
nsCOMPtr<nsIPrincipal> blobPrincipal;
|
|
if (dom::BlobURLProtocolHandler::GetBlobURLPrincipal(
|
|
origin, getter_AddRefs(blobPrincipal))) {
|
|
MOZ_ASSERT(blobPrincipal);
|
|
return blobPrincipal->GetOriginNoSuffix(aOriginNoSuffix);
|
|
}
|
|
|
|
// If we reached this branch, we can only create an origin if we have a
|
|
// nsIStandardURL. So, we query to a nsIStandardURL, and fail if we aren't
|
|
// an instance of an nsIStandardURL nsIStandardURLs have the good property
|
|
// of escaping the '^' character in their specs, which means that we can be
|
|
// sure that the caret character (which is reserved for delimiting the end
|
|
// of the spec, and the beginning of the origin attributes) is not present
|
|
// in the origin string
|
|
nsCOMPtr<nsIStandardURL> standardURL = do_QueryInterface(origin);
|
|
if (!standardURL) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
// See whether we have a useful hostPort. If we do, use that.
|
|
nsAutoCString hostPort;
|
|
if (!origin->SchemeIs("chrome")) {
|
|
rv = origin->GetAsciiHostPort(hostPort);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
}
|
|
if (!hostPort.IsEmpty()) {
|
|
rv = origin->GetScheme(aOriginNoSuffix);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
aOriginNoSuffix.AppendLiteral("://");
|
|
aOriginNoSuffix.Append(hostPort);
|
|
return NS_OK;
|
|
}
|
|
|
|
rv = aURI->GetAsciiSpec(aOriginNoSuffix);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
// The origin, when taken from the spec, should not contain the ref part of
|
|
// the URL.
|
|
|
|
int32_t pos = aOriginNoSuffix.FindChar('?');
|
|
int32_t hashPos = aOriginNoSuffix.FindChar('#');
|
|
|
|
if (hashPos != kNotFound && (pos == kNotFound || hashPos < pos)) {
|
|
pos = hashPos;
|
|
}
|
|
|
|
if (pos != kNotFound) {
|
|
aOriginNoSuffix.Truncate(pos);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
bool ContentPrincipal::SubsumesInternal(
|
|
nsIPrincipal* aOther,
|
|
BasePrincipal::DocumentDomainConsideration aConsideration) {
|
|
MOZ_ASSERT(aOther);
|
|
|
|
// For ContentPrincipal, Subsumes is equivalent to Equals.
|
|
if (aOther == this) {
|
|
return true;
|
|
}
|
|
|
|
// If either the subject or the object has changed its principal by
|
|
// explicitly setting document.domain then the other must also have
|
|
// done so in order to be considered the same origin. This prevents
|
|
// DNS spoofing based on document.domain (154930)
|
|
if (aConsideration == ConsiderDocumentDomain) {
|
|
// Get .domain on each principal.
|
|
nsCOMPtr<nsIURI> thisDomain, otherDomain;
|
|
GetDomain(getter_AddRefs(thisDomain));
|
|
aOther->GetDomain(getter_AddRefs(otherDomain));
|
|
|
|
// If either has .domain set, we have equality i.f.f. the domains match.
|
|
// Otherwise, we fall through to the non-document-domain-considering case.
|
|
if (thisDomain || otherDomain) {
|
|
bool isMatch =
|
|
nsScriptSecurityManager::SecurityCompareURIs(thisDomain, otherDomain);
|
|
#ifdef DEBUG
|
|
if (isMatch) {
|
|
nsAutoCString thisSiteOrigin, otherSiteOrigin;
|
|
MOZ_ALWAYS_SUCCEEDS(GetSiteOrigin(thisSiteOrigin));
|
|
MOZ_ALWAYS_SUCCEEDS(aOther->GetSiteOrigin(otherSiteOrigin));
|
|
MOZ_ASSERT(
|
|
thisSiteOrigin == otherSiteOrigin,
|
|
"SubsumesConsideringDomain passed with mismatched siteOrigin!");
|
|
}
|
|
#endif
|
|
return isMatch;
|
|
}
|
|
}
|
|
|
|
// Do a fast check (including origin attributes) or a slow uri comparison.
|
|
return FastEquals(aOther) || aOther->IsSameOrigin(mURI);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
ContentPrincipal::GetURI(nsIURI** aURI) {
|
|
*aURI = do_AddRef(mURI).take();
|
|
return NS_OK;
|
|
}
|
|
|
|
bool ContentPrincipal::MayLoadInternal(nsIURI* aURI) {
|
|
MOZ_ASSERT(aURI);
|
|
|
|
#if defined(MOZ_THUNDERBIRD) || defined(MOZ_SUITE)
|
|
nsCOMPtr<nsIURIWithSpecialOrigin> uriWithSpecialOrigin =
|
|
do_QueryInterface(aURI);
|
|
if (uriWithSpecialOrigin) {
|
|
nsCOMPtr<nsIURI> origin;
|
|
nsresult rv = uriWithSpecialOrigin->GetOrigin(getter_AddRefs(origin));
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return false;
|
|
}
|
|
MOZ_ASSERT(origin);
|
|
OriginAttributes attrs;
|
|
RefPtr<BasePrincipal> principal =
|
|
BasePrincipal::CreateContentPrincipal(origin, attrs);
|
|
return nsIPrincipal::Subsumes(principal);
|
|
}
|
|
#endif
|
|
|
|
nsCOMPtr<nsIPrincipal> blobPrincipal;
|
|
if (dom::BlobURLProtocolHandler::GetBlobURLPrincipal(
|
|
aURI, getter_AddRefs(blobPrincipal))) {
|
|
MOZ_ASSERT(blobPrincipal);
|
|
return nsIPrincipal::Subsumes(blobPrincipal);
|
|
}
|
|
|
|
// If this principal is associated with an addon, check whether that addon
|
|
// has been given permission to load from this domain.
|
|
if (AddonAllowsLoad(aURI)) {
|
|
return true;
|
|
}
|
|
|
|
if (nsScriptSecurityManager::SecurityCompareURIs(mURI, aURI)) {
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
uint32_t ContentPrincipal::GetHashValue() {
|
|
MOZ_ASSERT(mURI, "Need a principal URI");
|
|
|
|
nsCOMPtr<nsIURI> uri;
|
|
GetDomain(getter_AddRefs(uri));
|
|
if (!uri) {
|
|
GetURI(getter_AddRefs(uri));
|
|
};
|
|
return NS_SecurityHashURI(uri);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
ContentPrincipal::GetDomain(nsIURI** aDomain) {
|
|
if (!GetHasExplicitDomain()) {
|
|
*aDomain = nullptr;
|
|
return NS_OK;
|
|
}
|
|
|
|
mozilla::MutexAutoLock lock(mMutex);
|
|
NS_ADDREF(*aDomain = mDomain);
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
ContentPrincipal::SetDomain(nsIURI* aDomain) {
|
|
AssertIsOnMainThread();
|
|
MOZ_ASSERT(aDomain);
|
|
|
|
{
|
|
mozilla::MutexAutoLock lock(mMutex);
|
|
mDomain = aDomain;
|
|
SetHasExplicitDomain();
|
|
}
|
|
|
|
// Set the changed-document-domain flag on compartments containing realms
|
|
// using this principal.
|
|
auto cb = [](JSContext*, void*, JS::Realm* aRealm,
|
|
const JS::AutoRequireNoGC& nogc) {
|
|
JS::Compartment* comp = JS::GetCompartmentForRealm(aRealm);
|
|
xpc::SetCompartmentChangedDocumentDomain(comp);
|
|
};
|
|
JSPrincipals* principals =
|
|
nsJSPrincipals::get(static_cast<nsIPrincipal*>(this));
|
|
|
|
dom::AutoJSAPI jsapi;
|
|
jsapi.Init();
|
|
JS::IterateRealmsWithPrincipals(jsapi.cx(), principals, nullptr, cb);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
static nsresult GetSpecialBaseDomain(const nsCOMPtr<nsIURI>& aURI,
|
|
bool* aHandled, nsACString& aBaseDomain) {
|
|
*aHandled = false;
|
|
|
|
// Special handling for a file URI.
|
|
if (NS_URIIsLocalFile(aURI)) {
|
|
// If strict file origin policy is not in effect, all local files are
|
|
// considered to be same-origin, so return a known dummy domain here.
|
|
if (!nsScriptSecurityManager::GetStrictFileOriginPolicy()) {
|
|
*aHandled = true;
|
|
aBaseDomain.AssignLiteral("UNIVERSAL_FILE_URI_ORIGIN");
|
|
return NS_OK;
|
|
}
|
|
|
|
// Otherwise, we return the file path.
|
|
nsCOMPtr<nsIURL> url = do_QueryInterface(aURI);
|
|
|
|
if (url) {
|
|
*aHandled = true;
|
|
return url->GetFilePath(aBaseDomain);
|
|
}
|
|
}
|
|
|
|
bool hasNoRelativeFlag;
|
|
nsresult rv = NS_URIChainHasFlags(aURI, nsIProtocolHandler::URI_NORELATIVE,
|
|
&hasNoRelativeFlag);
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return rv;
|
|
}
|
|
|
|
// In case of FTP we want to get base domain via TLD service even if FTP
|
|
// protocol handler is disabled and the scheme is handled by external protocol
|
|
// handler which returns URI_NORELATIVE flag.
|
|
if (hasNoRelativeFlag && !aURI->SchemeIs("ftp")) {
|
|
*aHandled = true;
|
|
return aURI->GetSpec(aBaseDomain);
|
|
}
|
|
|
|
// For local resources we can't get a meaningful base domain.
|
|
bool isUIResource = false;
|
|
if (NS_SUCCEEDED(NS_URIChainHasFlags(
|
|
aURI, nsIProtocolHandler::URI_IS_UI_RESOURCE, &isUIResource)) &&
|
|
isUIResource) {
|
|
*aHandled = true;
|
|
return aURI->GetPrePath(aBaseDomain);
|
|
}
|
|
|
|
if (aURI->SchemeIs("indexeddb")) {
|
|
*aHandled = true;
|
|
return aURI->GetSpec(aBaseDomain);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
ContentPrincipal::GetBaseDomain(nsACString& aBaseDomain) {
|
|
// Handle some special URIs first.
|
|
bool handled;
|
|
nsresult rv = GetSpecialBaseDomain(mURI, &handled, aBaseDomain);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
if (handled) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// For everything else, we ask the TLD service via the ThirdPartyUtil.
|
|
nsCOMPtr<mozIThirdPartyUtil> thirdPartyUtil =
|
|
do_GetService(THIRDPARTYUTIL_CONTRACTID);
|
|
if (!thirdPartyUtil) {
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
return thirdPartyUtil->GetBaseDomain(mURI, aBaseDomain);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
ContentPrincipal::GetSiteOriginNoSuffix(nsACString& aSiteOrigin) {
|
|
nsresult rv = GetOriginNoSuffix(aSiteOrigin);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
// The originNoSuffix is already normalized when being generated by
|
|
// GenerateOriginNoSuffixFromURI. Avoid re-parsing the URI here.
|
|
//
|
|
// For all URIs which are not http(s), the site-origin matches the full
|
|
// origin, so can immediately return.
|
|
int32_t schemeEnd = aSiteOrigin.Find("://");
|
|
if (schemeEnd == kNotFound) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// Check for a http(s) scheme. For all URIs which are not http(s), the
|
|
// site-origin matches the full origin, so we can immediately return.
|
|
nsDependentCSubstring scheme(aSiteOrigin, 0, schemeEnd);
|
|
if (scheme != "http"_ns && scheme != "https"_ns) {
|
|
return NS_OK;
|
|
}
|
|
|
|
// The site-origin never includes a port (:[0-9]*), so remove it.
|
|
// NOTE: This avoids using RFindChar to avoid false-positives.
|
|
const char* portStart = aSiteOrigin.EndReading() - 1;
|
|
while ('0' <= *portStart && *portStart <= '9') {
|
|
--portStart;
|
|
}
|
|
if (*portStart == ':') {
|
|
aSiteOrigin.Truncate(portStart - aSiteOrigin.BeginReading());
|
|
}
|
|
|
|
nsCOMPtr<nsIEffectiveTLDService> tldService =
|
|
do_GetService(NS_EFFECTIVETLDSERVICE_CONTRACTID);
|
|
if (!tldService) {
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
// Get the base-domain from the host. We use the "fromHost" variant to avoid
|
|
// unnecessary changes to the site-origin.
|
|
nsAutoCString baseDomain;
|
|
int32_t hostStart = schemeEnd + 3;
|
|
nsDependentCSubstring host(aSiteOrigin, hostStart);
|
|
rv = tldService->GetBaseDomainFromHost(host, 0, baseDomain);
|
|
if (NS_FAILED(rv)) {
|
|
// If this is an IP address or something like "localhost", there's nothing
|
|
// else to be done.
|
|
if (rv != NS_ERROR_HOST_IS_IP_ADDRESS &&
|
|
rv != NS_ERROR_INSUFFICIENT_DOMAIN_LEVELS &&
|
|
rv != NS_ERROR_INVALID_ARG) {
|
|
return rv;
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
// Replace the host in aSiteOrigin with baseDomain.
|
|
if (baseDomain != host) {
|
|
aSiteOrigin.Replace(hostStart, aSiteOrigin.Length() - hostStart,
|
|
baseDomain);
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult ContentPrincipal::GetSiteIdentifier(SiteIdentifier& aSite) {
|
|
nsCString siteOrigin;
|
|
nsresult rv = GetSiteOrigin(siteOrigin);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
RefPtr<BasePrincipal> principal = CreateContentPrincipal(siteOrigin);
|
|
if (!principal) {
|
|
NS_WARNING("could not instantiate content principal");
|
|
return NS_ERROR_FAILURE;
|
|
}
|
|
|
|
aSite.Init(principal);
|
|
return NS_OK;
|
|
}
|
|
|
|
RefPtr<extensions::WebExtensionPolicyCore> ContentPrincipal::AddonPolicyCore() {
|
|
mozilla::MutexAutoLock lock(mMutex);
|
|
if (!mAddon.isSome()) {
|
|
NS_ENSURE_TRUE(mURI, nullptr);
|
|
|
|
RefPtr<extensions::WebExtensionPolicyCore> core;
|
|
if (mURI->SchemeIs("moz-extension")) {
|
|
nsCString host;
|
|
NS_ENSURE_SUCCESS(mURI->GetHost(host), nullptr);
|
|
core = ExtensionPolicyService::GetCoreByHost(host);
|
|
}
|
|
|
|
mAddon.emplace(core);
|
|
}
|
|
return *mAddon;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
ContentPrincipal::GetAddonId(nsAString& aAddonId) {
|
|
if (RefPtr<extensions::WebExtensionPolicyCore> policy = AddonPolicyCore()) {
|
|
policy->Id()->ToString(aAddonId);
|
|
} else {
|
|
aAddonId.Truncate();
|
|
}
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
ContentPrincipal::Deserializer::Read(nsIObjectInputStream* aStream) {
|
|
MOZ_ASSERT(!mPrincipal);
|
|
|
|
nsCOMPtr<nsISupports> supports;
|
|
nsCOMPtr<nsIURI> principalURI;
|
|
nsresult rv = NS_ReadOptionalObject(aStream, true, getter_AddRefs(supports));
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
principalURI = do_QueryInterface(supports);
|
|
// Enforce re-parsing about: URIs so that if they change, we continue to use
|
|
// their new principals correctly.
|
|
if (principalURI->SchemeIs("about")) {
|
|
nsAutoCString spec;
|
|
principalURI->GetSpec(spec);
|
|
NS_ENSURE_SUCCESS(NS_NewURI(getter_AddRefs(principalURI), spec),
|
|
NS_ERROR_FAILURE);
|
|
}
|
|
|
|
nsCOMPtr<nsIURI> domain;
|
|
rv = NS_ReadOptionalObject(aStream, true, getter_AddRefs(supports));
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
domain = do_QueryInterface(supports);
|
|
|
|
nsAutoCString suffix;
|
|
rv = aStream->ReadCString(suffix);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
OriginAttributes attrs;
|
|
bool ok = attrs.PopulateFromSuffix(suffix);
|
|
NS_ENSURE_TRUE(ok, NS_ERROR_FAILURE);
|
|
|
|
// Since Bug 965637 we do not serialize the CSP within the
|
|
// Principal anymore. Nevertheless there might still be
|
|
// serialized Principals that do have a serialized CSP.
|
|
// For now, we just read the CSP here but do not actually
|
|
// consume it. Please note that we deliberately ignore
|
|
// the return value to avoid CSP deserialization problems.
|
|
// After Bug 1508939 we will have a new serialization for
|
|
// Principals which allows us to update the code here.
|
|
// Additionally, the format for serialized CSPs changed
|
|
// within Bug 965637 which also can cause failures within
|
|
// the CSP deserialization code.
|
|
Unused << NS_ReadOptionalObject(aStream, true, getter_AddRefs(supports));
|
|
|
|
nsAutoCString originNoSuffix;
|
|
rv = GenerateOriginNoSuffixFromURI(principalURI, originNoSuffix);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
mPrincipal =
|
|
new ContentPrincipal(principalURI, attrs, originNoSuffix, domain);
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult ContentPrincipal::WriteJSONInnerProperties(JSONWriter& aWriter) {
|
|
nsAutoCString principalURI;
|
|
nsresult rv = mURI->GetSpec(principalURI);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
// We turn each int enum field into a JSON string key of the object, aWriter
|
|
// is set up to be inside of the inner object that has stringified enum keys
|
|
// An example inner object might be:
|
|
//
|
|
// eURI eSuffix
|
|
// | |
|
|
// {"0": "https://mozilla.com", "2": "^privateBrowsingId=1"}
|
|
// | | | |
|
|
// ----------------------------- |
|
|
// | | |
|
|
// Key ----------------------
|
|
// |
|
|
// Value
|
|
WriteJSONProperty<eURI>(aWriter, principalURI);
|
|
|
|
if (GetHasExplicitDomain()) {
|
|
nsAutoCString domainStr;
|
|
{
|
|
MutexAutoLock lock(mMutex);
|
|
rv = mDomain->GetSpec(domainStr);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
}
|
|
WriteJSONProperty<eDomain>(aWriter, domainStr);
|
|
}
|
|
|
|
nsAutoCString suffix;
|
|
OriginAttributesRef().CreateSuffix(suffix);
|
|
if (suffix.Length() > 0) {
|
|
WriteJSONProperty<eSuffix>(aWriter, suffix);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
bool ContentPrincipalJSONHandler::startObject() {
|
|
switch (mState) {
|
|
case State::Init:
|
|
mState = State::StartObject;
|
|
break;
|
|
default:
|
|
NS_WARNING("Unexpected object value");
|
|
mState = State::Error;
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool ContentPrincipalJSONHandler::propertyName(const JS::Latin1Char* name,
|
|
size_t length) {
|
|
switch (mState) {
|
|
case State::StartObject:
|
|
case State::AfterPropertyValue: {
|
|
if (length != 1) {
|
|
NS_WARNING(
|
|
nsPrintfCString("Unexpected property name length: %zu", length)
|
|
.get());
|
|
mState = State::Error;
|
|
return false;
|
|
}
|
|
|
|
char key = char(name[0]);
|
|
switch (key) {
|
|
case ContentPrincipal::URIKey:
|
|
mState = State::URIKey;
|
|
break;
|
|
case ContentPrincipal::DomainKey:
|
|
mState = State::DomainKey;
|
|
break;
|
|
case ContentPrincipal::SuffixKey:
|
|
mState = State::SuffixKey;
|
|
break;
|
|
default:
|
|
NS_WARNING(
|
|
nsPrintfCString("Unexpected property name: '%c'", key).get());
|
|
mState = State::Error;
|
|
return false;
|
|
}
|
|
break;
|
|
}
|
|
default:
|
|
NS_WARNING("Unexpected property name");
|
|
mState = State::Error;
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool ContentPrincipalJSONHandler::endObject() {
|
|
switch (mState) {
|
|
case State::AfterPropertyValue: {
|
|
MOZ_ASSERT(mPrincipalURI);
|
|
// NOTE: mDomain is optional.
|
|
|
|
nsAutoCString originNoSuffix;
|
|
nsresult rv = ContentPrincipal::GenerateOriginNoSuffixFromURI(
|
|
mPrincipalURI, originNoSuffix);
|
|
if (NS_FAILED(rv)) {
|
|
mState = State::Error;
|
|
return false;
|
|
}
|
|
|
|
mPrincipal =
|
|
new ContentPrincipal(mPrincipalURI, mAttrs, originNoSuffix, mDomain);
|
|
MOZ_ASSERT(mPrincipal);
|
|
|
|
mState = State::EndObject;
|
|
break;
|
|
}
|
|
default:
|
|
NS_WARNING("Unexpected end of object");
|
|
mState = State::Error;
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool ContentPrincipalJSONHandler::stringValue(const JS::Latin1Char* str,
|
|
size_t length) {
|
|
switch (mState) {
|
|
case State::URIKey: {
|
|
nsDependentCSubstring spec(reinterpret_cast<const char*>(str), length);
|
|
|
|
nsresult rv = NS_NewURI(getter_AddRefs(mPrincipalURI), spec);
|
|
if (NS_FAILED(rv)) {
|
|
mState = State::Error;
|
|
return false;
|
|
}
|
|
|
|
{
|
|
// Enforce re-parsing about: URIs so that if they change, we
|
|
// continue to use their new principals correctly.
|
|
if (mPrincipalURI->SchemeIs("about")) {
|
|
nsAutoCString spec;
|
|
mPrincipalURI->GetSpec(spec);
|
|
rv = NS_NewURI(getter_AddRefs(mPrincipalURI), spec);
|
|
if (NS_FAILED(rv)) {
|
|
mState = State::Error;
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
|
|
mState = State::AfterPropertyValue;
|
|
break;
|
|
}
|
|
case State::DomainKey: {
|
|
nsDependentCSubstring spec(reinterpret_cast<const char*>(str), length);
|
|
|
|
nsresult rv = NS_NewURI(getter_AddRefs(mDomain), spec);
|
|
if (NS_FAILED(rv)) {
|
|
mState = State::Error;
|
|
return false;
|
|
}
|
|
|
|
mState = State::AfterPropertyValue;
|
|
break;
|
|
}
|
|
case State::SuffixKey: {
|
|
nsDependentCSubstring attrs(reinterpret_cast<const char*>(str), length);
|
|
if (!mAttrs.PopulateFromSuffix(attrs)) {
|
|
mState = State::Error;
|
|
return false;
|
|
}
|
|
|
|
mState = State::AfterPropertyValue;
|
|
break;
|
|
}
|
|
default:
|
|
NS_WARNING("Unexpected string value");
|
|
mState = State::Error;
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|