2006-04-02 20:58:26 +00:00
|
|
|
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
2015-02-24 20:54:40 +00:00
|
|
|
/* vim: set sw=2 sts=2 ts=2 et tw=80: */
|
2012-05-21 11:12:37 +00:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2006-04-02 20:58:26 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* This is the principal that has no rights and can't be accessed by
|
|
|
|
* anything other than itself and chrome; null principals are not
|
|
|
|
* same-origin with anything but themselves.
|
|
|
|
*/
|
|
|
|
|
2013-12-09 02:52:54 +00:00
|
|
|
#include "mozilla/ArrayUtils.h"
|
2011-10-11 05:50:08 +00:00
|
|
|
|
2021-05-17 20:50:09 +00:00
|
|
|
#include "mozilla/dom/BlobURLProtocolHandler.h"
|
2021-07-06 08:23:11 +00:00
|
|
|
#include "mozilla/StaticPrefs_network.h"
|
2016-04-21 08:51:25 +00:00
|
|
|
#include "nsDocShell.h"
|
2017-03-22 10:38:40 +00:00
|
|
|
#include "NullPrincipal.h"
|
2021-07-06 08:23:11 +00:00
|
|
|
#include "DefaultURI.h"
|
|
|
|
#include "nsSimpleURI.h"
|
2006-04-02 20:58:26 +00:00
|
|
|
#include "nsIClassInfoImpl.h"
|
2006-05-11 16:06:35 +00:00
|
|
|
#include "nsNetCID.h"
|
2012-07-27 14:03:27 +00:00
|
|
|
#include "nsError.h"
|
2022-02-08 15:18:21 +00:00
|
|
|
#include "nsEscape.h"
|
2017-03-22 10:39:31 +00:00
|
|
|
#include "ContentPrincipal.h"
|
2008-02-27 03:45:29 +00:00
|
|
|
#include "nsScriptSecurityManager.h"
|
2013-07-11 20:21:45 +00:00
|
|
|
#include "pratom.h"
|
2021-05-17 20:50:09 +00:00
|
|
|
#include "nsIObjectInputStream.h"
|
2006-05-11 16:06:35 +00:00
|
|
|
|
2024-01-26 15:39:39 +00:00
|
|
|
#include "js/JSON.h"
|
|
|
|
#include "NullPrincipalJSONHandler.h"
|
|
|
|
|
2011-10-11 05:50:08 +00:00
|
|
|
using namespace mozilla;
|
|
|
|
|
2023-02-01 21:45:44 +00:00
|
|
|
NS_IMPL_CLASSINFO(NullPrincipal, nullptr, 0, NS_NULLPRINCIPAL_CID)
|
2021-05-17 20:50:09 +00:00
|
|
|
NS_IMPL_QUERY_INTERFACE_CI(NullPrincipal, nsIPrincipal)
|
|
|
|
NS_IMPL_CI_INTERFACE_GETTER(NullPrincipal, nsIPrincipal)
|
|
|
|
|
|
|
|
NullPrincipal::NullPrincipal(nsIURI* aURI, const nsACString& aOriginNoSuffix,
|
|
|
|
const OriginAttributes& aOriginAttributes)
|
|
|
|
: BasePrincipal(eNullPrincipal, aOriginNoSuffix, aOriginAttributes),
|
|
|
|
mURI(aURI) {}
|
2006-04-02 20:58:26 +00:00
|
|
|
|
2019-02-25 22:03:35 +00:00
|
|
|
/* static */
|
|
|
|
already_AddRefed<NullPrincipal> NullPrincipal::CreateWithInheritedAttributes(
|
|
|
|
nsIPrincipal* aInheritFrom) {
|
2018-10-30 00:13:29 +00:00
|
|
|
MOZ_ASSERT(aInheritFrom);
|
2022-09-20 23:29:08 +00:00
|
|
|
nsCOMPtr<nsIURI> uri = CreateURI(aInheritFrom);
|
|
|
|
return Create(Cast(aInheritFrom)->OriginAttributesRef(), uri);
|
2014-07-29 15:47:52 +00:00
|
|
|
}
|
|
|
|
|
2019-02-25 22:03:35 +00:00
|
|
|
/* static */
|
2022-09-20 23:29:08 +00:00
|
|
|
already_AddRefed<NullPrincipal> NullPrincipal::Create(
|
|
|
|
const OriginAttributes& aOriginAttributes, nsIURI* aNullPrincipalURI) {
|
|
|
|
nsCOMPtr<nsIURI> uri = aNullPrincipalURI;
|
|
|
|
if (!uri) {
|
|
|
|
uri = NullPrincipal::CreateURI(nullptr);
|
|
|
|
}
|
2018-10-30 00:13:29 +00:00
|
|
|
|
2022-09-20 23:29:08 +00:00
|
|
|
MOZ_RELEASE_ASSERT(uri->SchemeIs(NS_NULLPRINCIPAL_SCHEME));
|
2017-03-01 10:59:57 +00:00
|
|
|
|
2022-09-20 23:29:08 +00:00
|
|
|
nsAutoCString originNoSuffix;
|
|
|
|
DebugOnly<nsresult> rv = uri->GetSpec(originNoSuffix);
|
|
|
|
MOZ_ASSERT(NS_SUCCEEDED(rv));
|
2016-04-21 08:51:25 +00:00
|
|
|
|
2022-09-20 23:29:08 +00:00
|
|
|
RefPtr<NullPrincipal> nullPrin =
|
|
|
|
new NullPrincipal(uri, originNoSuffix, aOriginAttributes);
|
|
|
|
return nullPrin.forget();
|
2015-03-31 17:11:00 +00:00
|
|
|
}
|
2007-09-28 14:31:04 +00:00
|
|
|
|
2019-02-25 22:03:35 +00:00
|
|
|
/* static */
|
|
|
|
already_AddRefed<NullPrincipal> NullPrincipal::CreateWithoutOriginAttributes() {
|
2018-07-17 19:37:48 +00:00
|
|
|
return NullPrincipal::Create(OriginAttributes(), nullptr);
|
2018-03-22 18:36:20 +00:00
|
|
|
}
|
|
|
|
|
2022-03-28 15:12:36 +00:00
|
|
|
void NullPrincipal::EscapePrecursorQuery(nsACString& aPrecursorQuery) {
|
2022-02-08 15:18:21 +00:00
|
|
|
// origins should not contain existing escape sequences, so set `esc_Forced`
|
|
|
|
// to force any `%` in the input to be escaped in addition to non-ascii,
|
|
|
|
// control characters and DEL.
|
|
|
|
nsCString modified;
|
2022-03-28 15:12:36 +00:00
|
|
|
if (NS_EscapeURLSpan(aPrecursorQuery, esc_Query | esc_Forced, modified)) {
|
2022-02-08 15:18:21 +00:00
|
|
|
aPrecursorQuery.Assign(std::move(modified));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-28 15:12:36 +00:00
|
|
|
void NullPrincipal::UnescapePrecursorQuery(nsACString& aPrecursorQuery) {
|
2022-02-08 15:18:21 +00:00
|
|
|
nsCString modified;
|
|
|
|
if (NS_UnescapeURL(aPrecursorQuery.BeginReading(), aPrecursorQuery.Length(),
|
|
|
|
/* aFlags */ 0, modified)) {
|
|
|
|
aPrecursorQuery.Assign(std::move(modified));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-07-15 21:09:15 +00:00
|
|
|
already_AddRefed<nsIURI> NullPrincipal::CreateURI(
|
|
|
|
nsIPrincipal* aPrecursor, const nsID* aNullPrincipalID) {
|
2021-07-15 21:09:13 +00:00
|
|
|
nsCOMPtr<nsIURIMutator> iMutator;
|
2021-07-06 08:23:11 +00:00
|
|
|
if (StaticPrefs::network_url_useDefaultURI()) {
|
2021-07-15 21:09:13 +00:00
|
|
|
iMutator = new mozilla::net::DefaultURI::Mutator();
|
2021-07-06 08:23:11 +00:00
|
|
|
} else {
|
2021-07-15 21:09:13 +00:00
|
|
|
iMutator = new mozilla::net::nsSimpleURI::Mutator();
|
2021-07-06 08:23:11 +00:00
|
|
|
}
|
|
|
|
|
2021-11-04 08:55:46 +00:00
|
|
|
nsID uuid = aNullPrincipalID ? *aNullPrincipalID : nsID::GenerateUUID();
|
2021-07-06 08:23:11 +00:00
|
|
|
|
2021-07-15 21:09:13 +00:00
|
|
|
NS_MutateURI mutator(iMutator);
|
2021-11-04 08:55:46 +00:00
|
|
|
mutator.SetSpec(NS_NULLPRINCIPAL_SCHEME ":"_ns +
|
|
|
|
nsDependentCString(nsIDToCString(uuid).get()));
|
2021-07-15 21:09:13 +00:00
|
|
|
|
|
|
|
// If there's a precursor URI, encode it in the null principal URI's query.
|
|
|
|
if (aPrecursor) {
|
|
|
|
nsAutoCString precursorOrigin;
|
|
|
|
switch (BasePrincipal::Cast(aPrecursor)->Kind()) {
|
2022-02-08 15:18:21 +00:00
|
|
|
case eNullPrincipal: {
|
2021-07-15 21:09:13 +00:00
|
|
|
// If the precursor null principal has a precursor, inherit it.
|
|
|
|
if (nsCOMPtr<nsIURI> nullPrecursorURI = aPrecursor->GetURI()) {
|
|
|
|
MOZ_ALWAYS_SUCCEEDS(nullPrecursorURI->GetQuery(precursorOrigin));
|
|
|
|
}
|
|
|
|
break;
|
2022-02-08 15:18:21 +00:00
|
|
|
}
|
|
|
|
case eContentPrincipal: {
|
2021-07-15 21:09:13 +00:00
|
|
|
MOZ_ALWAYS_SUCCEEDS(aPrecursor->GetOriginNoSuffix(precursorOrigin));
|
2022-02-08 15:18:21 +00:00
|
|
|
#ifdef DEBUG
|
|
|
|
nsAutoCString original(precursorOrigin);
|
|
|
|
#endif
|
|
|
|
EscapePrecursorQuery(precursorOrigin);
|
|
|
|
#ifdef DEBUG
|
|
|
|
nsAutoCString unescaped(precursorOrigin);
|
|
|
|
UnescapePrecursorQuery(unescaped);
|
|
|
|
MOZ_ASSERT(unescaped == original,
|
|
|
|
"cannot recover original precursor origin after escape");
|
|
|
|
#endif
|
2021-07-15 21:09:13 +00:00
|
|
|
break;
|
2022-02-08 15:18:21 +00:00
|
|
|
}
|
2021-07-15 21:09:13 +00:00
|
|
|
|
|
|
|
// For now, we won't track expanded or system principal precursors. We may
|
|
|
|
// want to track expanded principal precursors in the future, but it's
|
|
|
|
// unlikely we'll want to track system principal precursors.
|
|
|
|
case eExpandedPrincipal:
|
|
|
|
case eSystemPrincipal:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (!precursorOrigin.IsEmpty()) {
|
|
|
|
mutator.SetQuery(precursorOrigin);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-07-06 08:23:11 +00:00
|
|
|
nsCOMPtr<nsIURI> uri;
|
2021-07-15 21:09:13 +00:00
|
|
|
MOZ_ALWAYS_SUCCEEDS(mutator.Finalize(getter_AddRefs(uri)));
|
2021-07-06 08:23:11 +00:00
|
|
|
return uri.forget();
|
2017-04-10 10:45:36 +00:00
|
|
|
}
|
|
|
|
|
2017-03-22 10:38:40 +00:00
|
|
|
nsresult NullPrincipal::GetScriptLocation(nsACString& aStr) {
|
2016-08-30 04:22:04 +00:00
|
|
|
return mURI->GetSpec(aStr);
|
2015-02-24 20:54:40 +00:00
|
|
|
}
|
|
|
|
|
2006-04-02 20:58:26 +00:00
|
|
|
/**
|
|
|
|
* nsIPrincipal implementation
|
|
|
|
*/
|
|
|
|
|
2018-11-20 01:17:52 +00:00
|
|
|
uint32_t NullPrincipal::GetHashValue() { return (NS_PTR_TO_INT32(this) >> 2); }
|
2006-04-02 20:58:26 +00:00
|
|
|
|
2015-06-04 18:51:57 +00:00
|
|
|
NS_IMETHODIMP
|
2017-03-22 10:38:40 +00:00
|
|
|
NullPrincipal::GetURI(nsIURI** aURI) {
|
2018-05-09 16:21:24 +00:00
|
|
|
nsCOMPtr<nsIURI> uri = mURI;
|
|
|
|
uri.forget(aURI);
|
|
|
|
return NS_OK;
|
2006-04-02 20:58:26 +00:00
|
|
|
}
|
2019-12-05 16:04:53 +00:00
|
|
|
NS_IMETHODIMP
|
|
|
|
NullPrincipal::GetIsOriginPotentiallyTrustworthy(bool* aResult) {
|
|
|
|
*aResult = false;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
2006-04-02 20:58:26 +00:00
|
|
|
|
|
|
|
NS_IMETHODIMP
|
2017-03-22 10:38:40 +00:00
|
|
|
NullPrincipal::GetDomain(nsIURI** aDomain) {
|
2018-05-09 16:21:24 +00:00
|
|
|
nsCOMPtr<nsIURI> uri = mURI;
|
|
|
|
uri.forget(aDomain);
|
|
|
|
return NS_OK;
|
2006-04-02 20:58:26 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
2017-03-22 10:38:40 +00:00
|
|
|
NullPrincipal::SetDomain(nsIURI* aDomain) {
|
2006-04-02 20:58:26 +00:00
|
|
|
// I think the right thing to do here is to just throw... Silently failing
|
|
|
|
// seems counterproductive.
|
|
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
|
|
}
|
|
|
|
|
2017-03-22 10:38:40 +00:00
|
|
|
bool NullPrincipal::MayLoadInternal(nsIURI* aURI) {
|
2014-09-30 08:09:36 +00:00
|
|
|
// Also allow the load if we are the principal of the URI being checked.
|
2018-07-24 20:15:57 +00:00
|
|
|
nsCOMPtr<nsIPrincipal> blobPrincipal;
|
|
|
|
if (dom::BlobURLProtocolHandler::GetBlobURLPrincipal(
|
|
|
|
aURI, getter_AddRefs(blobPrincipal))) {
|
2019-02-11 18:03:12 +00:00
|
|
|
MOZ_ASSERT(blobPrincipal);
|
|
|
|
return SubsumesInternal(blobPrincipal,
|
|
|
|
BasePrincipal::ConsiderDocumentDomain);
|
2012-08-20 18:34:33 +00:00
|
|
|
}
|
|
|
|
|
2015-10-01 03:03:36 +00:00
|
|
|
return false;
|
2008-02-27 03:45:29 +00:00
|
|
|
}
|
|
|
|
|
2013-01-08 21:53:32 +00:00
|
|
|
NS_IMETHODIMP
|
2017-03-22 10:38:40 +00:00
|
|
|
NullPrincipal::GetBaseDomain(nsACString& aBaseDomain) {
|
2013-01-08 21:53:32 +00:00
|
|
|
// For a null principal, we use our unique uuid as the base domain.
|
2017-07-29 11:50:21 +00:00
|
|
|
return mURI->GetPathQueryRef(aBaseDomain);
|
2013-01-08 21:53:32 +00:00
|
|
|
}
|
|
|
|
|
2016-11-06 05:38:17 +00:00
|
|
|
NS_IMETHODIMP
|
2017-03-22 10:38:40 +00:00
|
|
|
NullPrincipal::GetAddonId(nsAString& aAddonId) {
|
2016-11-06 05:38:17 +00:00
|
|
|
aAddonId.Truncate();
|
|
|
|
return NS_OK;
|
|
|
|
};
|
|
|
|
|
2006-04-02 20:58:26 +00:00
|
|
|
/**
|
|
|
|
* nsISerializable implementation
|
|
|
|
*/
|
|
|
|
NS_IMETHODIMP
|
2021-05-17 20:50:09 +00:00
|
|
|
NullPrincipal::Deserializer::Read(nsIObjectInputStream* aStream) {
|
2017-02-23 13:30:23 +00:00
|
|
|
nsAutoCString spec;
|
|
|
|
nsresult rv = aStream->ReadCString(spec);
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
nsCOMPtr<nsIURI> uri;
|
|
|
|
rv = NS_NewURI(getter_AddRefs(uri), spec);
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
2015-06-04 18:51:57 +00:00
|
|
|
nsAutoCString suffix;
|
2017-02-23 13:30:23 +00:00
|
|
|
rv = aStream->ReadCString(suffix);
|
2015-06-04 18:51:57 +00:00
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
2017-02-23 13:30:23 +00:00
|
|
|
OriginAttributes attrs;
|
|
|
|
bool ok = attrs.PopulateFromSuffix(suffix);
|
2015-06-04 18:51:57 +00:00
|
|
|
NS_ENSURE_TRUE(ok, NS_ERROR_FAILURE);
|
|
|
|
|
2021-05-17 20:50:09 +00:00
|
|
|
mPrincipal = NullPrincipal::Create(attrs, uri);
|
|
|
|
NS_ENSURE_TRUE(mPrincipal, NS_ERROR_FAILURE);
|
2006-04-02 20:58:26 +00:00
|
|
|
|
2019-06-03 12:37:12 +00:00
|
|
|
return NS_OK;
|
|
|
|
}
|
2017-02-23 13:30:23 +00:00
|
|
|
|
2024-01-26 15:39:38 +00:00
|
|
|
nsresult NullPrincipal::WriteJSONInnerProperties(JSONWriter& aWriter) {
|
2019-07-08 16:37:45 +00:00
|
|
|
nsAutoCString principalURI;
|
|
|
|
nsresult rv = mURI->GetSpec(principalURI);
|
2017-02-23 13:30:23 +00:00
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
2024-01-26 15:39:38 +00:00
|
|
|
WriteJSONProperty<eSpec>(aWriter, principalURI);
|
2017-02-23 13:30:23 +00:00
|
|
|
|
2015-06-04 18:51:57 +00:00
|
|
|
nsAutoCString suffix;
|
|
|
|
OriginAttributesRef().CreateSuffix(suffix);
|
2019-06-03 12:37:12 +00:00
|
|
|
if (suffix.Length() > 0) {
|
2024-01-26 15:39:38 +00:00
|
|
|
WriteJSONProperty<eSuffix>(aWriter, suffix);
|
2019-06-03 12:37:12 +00:00
|
|
|
}
|
2015-06-04 18:51:57 +00:00
|
|
|
|
2006-04-02 20:58:26 +00:00
|
|
|
return NS_OK;
|
|
|
|
}
|
2019-06-03 12:37:12 +00:00
|
|
|
|
2021-07-15 21:09:15 +00:00
|
|
|
NS_IMETHODIMP
|
|
|
|
NullPrincipal::GetPrecursorPrincipal(nsIPrincipal** aPrincipal) {
|
|
|
|
*aPrincipal = nullptr;
|
|
|
|
|
|
|
|
nsAutoCString query;
|
|
|
|
if (NS_FAILED(mURI->GetQuery(query)) || query.IsEmpty()) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
2022-02-08 15:18:21 +00:00
|
|
|
UnescapePrecursorQuery(query);
|
2021-07-15 21:09:15 +00:00
|
|
|
|
|
|
|
nsCOMPtr<nsIURI> precursorURI;
|
|
|
|
if (NS_FAILED(NS_NewURI(getter_AddRefs(precursorURI), query))) {
|
|
|
|
MOZ_ASSERT_UNREACHABLE(
|
|
|
|
"Failed to parse precursor from nullprincipal query");
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If our precursor is another null principal, re-construct it. This can
|
|
|
|
// happen if a null principal without a precursor causes another principal to
|
|
|
|
// be created.
|
|
|
|
if (precursorURI->SchemeIs(NS_NULLPRINCIPAL_SCHEME)) {
|
|
|
|
#ifdef DEBUG
|
|
|
|
nsAutoCString precursorQuery;
|
|
|
|
precursorURI->GetQuery(precursorQuery);
|
|
|
|
MOZ_ASSERT(precursorQuery.IsEmpty(),
|
|
|
|
"Null principal with nested precursors?");
|
|
|
|
#endif
|
|
|
|
*aPrincipal =
|
|
|
|
NullPrincipal::Create(OriginAttributesRef(), precursorURI).take();
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
RefPtr<BasePrincipal> contentPrincipal =
|
|
|
|
BasePrincipal::CreateContentPrincipal(precursorURI,
|
|
|
|
OriginAttributesRef());
|
|
|
|
// If `CreateContentPrincipal` failed, it will create a new NullPrincipal and
|
|
|
|
// return that instead. We only want to return real content principals here.
|
|
|
|
if (!contentPrincipal || !contentPrincipal->Is<ContentPrincipal>()) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
contentPrincipal.forget(aPrincipal);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
2024-01-26 15:39:39 +00:00
|
|
|
|
|
|
|
bool NullPrincipalJSONHandler::startObject() {
|
|
|
|
switch (mState) {
|
|
|
|
case State::Init:
|
|
|
|
mState = State::StartObject;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
NS_WARNING("Unexpected object value");
|
|
|
|
mState = State::Error;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool NullPrincipalJSONHandler::propertyName(const JS::Latin1Char* name,
|
|
|
|
size_t length) {
|
|
|
|
switch (mState) {
|
|
|
|
case State::StartObject:
|
|
|
|
case State::AfterPropertyValue: {
|
|
|
|
if (length != 1) {
|
|
|
|
NS_WARNING(
|
|
|
|
nsPrintfCString("Unexpected property name length: %zu", length)
|
|
|
|
.get());
|
|
|
|
mState = State::Error;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
char key = char(name[0]);
|
|
|
|
switch (key) {
|
|
|
|
case NullPrincipal::SpecKey:
|
|
|
|
mState = State::SpecKey;
|
|
|
|
break;
|
|
|
|
case NullPrincipal::SuffixKey:
|
|
|
|
mState = State::SuffixKey;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
NS_WARNING(
|
|
|
|
nsPrintfCString("Unexpected property name: '%c'", key).get());
|
|
|
|
mState = State::Error;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
NS_WARNING("Unexpected property name");
|
|
|
|
mState = State::Error;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool NullPrincipalJSONHandler::endObject() {
|
|
|
|
switch (mState) {
|
|
|
|
case State::AfterPropertyValue:
|
|
|
|
MOZ_ASSERT(mUri);
|
|
|
|
|
|
|
|
mPrincipal = NullPrincipal::Create(mAttrs, mUri);
|
|
|
|
MOZ_ASSERT(mPrincipal);
|
|
|
|
|
|
|
|
mState = State::EndObject;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
NS_WARNING("Unexpected end of object");
|
|
|
|
mState = State::Error;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool NullPrincipalJSONHandler::stringValue(const JS::Latin1Char* str,
|
|
|
|
size_t length) {
|
|
|
|
switch (mState) {
|
|
|
|
case State::SpecKey: {
|
|
|
|
nsDependentCSubstring spec(reinterpret_cast<const char*>(str), length);
|
|
|
|
nsresult rv = NS_NewURI(getter_AddRefs(mUri), spec);
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
mState = State::Error;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
mState = State::AfterPropertyValue;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case State::SuffixKey: {
|
|
|
|
nsDependentCSubstring attrs(reinterpret_cast<const char*>(str), length);
|
|
|
|
if (!mAttrs.PopulateFromSuffix(attrs)) {
|
|
|
|
mState = State::Error;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
mState = State::AfterPropertyValue;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
NS_WARNING("Unexpected string value");
|
|
|
|
mState = State::Error;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|