mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-25 22:01:30 +00:00
993f2ff09e
The WindowGlobalChild for a window will be null after it's been destroyed (such as by a frame being removed), so we need to null check and fail safe. Differential Revision: https://phabricator.services.mozilla.com/D106023
155 lines
4.8 KiB
C++
155 lines
4.8 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "mozilla/dom/CredentialsContainer.h"
|
|
#include "mozilla/dom/Promise.h"
|
|
#include "mozilla/dom/WebAuthnManager.h"
|
|
#include "mozilla/dom/WindowGlobalChild.h"
|
|
#include "mozilla/dom/WindowContext.h"
|
|
#include "nsContentUtils.h"
|
|
#include "nsFocusManager.h"
|
|
#include "nsIDocShell.h"
|
|
|
|
namespace mozilla::dom {
|
|
|
|
NS_IMPL_CYCLE_COLLECTION_WRAPPERCACHE(CredentialsContainer, mParent, mManager)
|
|
NS_IMPL_CYCLE_COLLECTING_ADDREF(CredentialsContainer)
|
|
NS_IMPL_CYCLE_COLLECTING_RELEASE(CredentialsContainer)
|
|
NS_INTERFACE_MAP_BEGIN_CYCLE_COLLECTION(CredentialsContainer)
|
|
NS_WRAPPERCACHE_INTERFACE_MAP_ENTRY
|
|
NS_INTERFACE_MAP_ENTRY(nsISupports)
|
|
NS_INTERFACE_MAP_END
|
|
|
|
already_AddRefed<Promise> CreateAndReject(nsPIDOMWindowInner* aParent,
|
|
ErrorResult& aRv) {
|
|
MOZ_ASSERT(aParent);
|
|
|
|
nsCOMPtr<nsIGlobalObject> global = do_QueryInterface(aParent);
|
|
if (NS_WARN_IF(!global)) {
|
|
aRv.Throw(NS_ERROR_FAILURE);
|
|
return nullptr;
|
|
}
|
|
|
|
RefPtr<Promise> promise = Promise::Create(global, aRv);
|
|
if (NS_WARN_IF(aRv.Failed())) {
|
|
return nullptr;
|
|
}
|
|
|
|
promise->MaybeReject(NS_ERROR_DOM_NOT_ALLOWED_ERR);
|
|
return promise.forget();
|
|
}
|
|
|
|
static bool IsInActiveTab(nsPIDOMWindowInner* aParent) {
|
|
// Returns whether aParent is an inner window somewhere in the active tab.
|
|
// The active tab is the selected (i.e. visible) tab in the focused window.
|
|
MOZ_ASSERT(aParent);
|
|
|
|
RefPtr<Document> doc = aParent->GetExtantDoc();
|
|
if (NS_WARN_IF(!doc)) {
|
|
return false;
|
|
}
|
|
|
|
return IsInActiveTab(doc);
|
|
}
|
|
|
|
static bool IsSameOriginWithAncestors(nsPIDOMWindowInner* aParent) {
|
|
// This method returns true if aParent is either not in a frame / iframe, or
|
|
// is in a frame or iframe and all ancestors for aParent are the same origin.
|
|
// This is useful for Credential Management because we need to prohibit
|
|
// iframes, but not break mochitests (which use iframes to embed the tests).
|
|
MOZ_ASSERT(aParent);
|
|
|
|
WindowGlobalChild* wgc = aParent->GetWindowGlobalChild();
|
|
|
|
// If there's no WindowGlobalChild, the inner window has already been
|
|
// destroyed, so fail safe and return false.
|
|
if (!wgc) {
|
|
return false;
|
|
}
|
|
|
|
// Check that all ancestors are the same origin, repeating until we find a
|
|
// null parent
|
|
for (WindowContext* parentContext =
|
|
wgc->WindowContext()->GetParentWindowContext();
|
|
parentContext; parentContext = parentContext->GetParentWindowContext()) {
|
|
if (!wgc->IsSameOriginWith(parentContext)) {
|
|
// same-origin policy is violated
|
|
return false;
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
CredentialsContainer::CredentialsContainer(nsPIDOMWindowInner* aParent)
|
|
: mParent(aParent) {
|
|
MOZ_ASSERT(aParent);
|
|
}
|
|
|
|
CredentialsContainer::~CredentialsContainer() = default;
|
|
|
|
void CredentialsContainer::EnsureWebAuthnManager() {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
if (!mManager) {
|
|
mManager = new WebAuthnManager(mParent);
|
|
}
|
|
}
|
|
|
|
JSObject* CredentialsContainer::WrapObject(JSContext* aCx,
|
|
JS::Handle<JSObject*> aGivenProto) {
|
|
return CredentialsContainer_Binding::Wrap(aCx, this, aGivenProto);
|
|
}
|
|
|
|
already_AddRefed<Promise> CredentialsContainer::Get(
|
|
const CredentialRequestOptions& aOptions, ErrorResult& aRv) {
|
|
if (!IsSameOriginWithAncestors(mParent) || !IsInActiveTab(mParent)) {
|
|
return CreateAndReject(mParent, aRv);
|
|
}
|
|
|
|
EnsureWebAuthnManager();
|
|
return mManager->GetAssertion(aOptions.mPublicKey, aOptions.mSignal);
|
|
}
|
|
|
|
already_AddRefed<Promise> CredentialsContainer::Create(
|
|
const CredentialCreationOptions& aOptions, ErrorResult& aRv) {
|
|
if (!IsSameOriginWithAncestors(mParent) || !IsInActiveTab(mParent)) {
|
|
return CreateAndReject(mParent, aRv);
|
|
}
|
|
|
|
EnsureWebAuthnManager();
|
|
return mManager->MakeCredential(aOptions.mPublicKey, aOptions.mSignal);
|
|
}
|
|
|
|
already_AddRefed<Promise> CredentialsContainer::Store(
|
|
const Credential& aCredential, ErrorResult& aRv) {
|
|
if (!IsSameOriginWithAncestors(mParent) || !IsInActiveTab(mParent)) {
|
|
return CreateAndReject(mParent, aRv);
|
|
}
|
|
|
|
EnsureWebAuthnManager();
|
|
return mManager->Store(aCredential);
|
|
}
|
|
|
|
already_AddRefed<Promise> CredentialsContainer::PreventSilentAccess(
|
|
ErrorResult& aRv) {
|
|
nsCOMPtr<nsIGlobalObject> global = do_QueryInterface(mParent);
|
|
if (NS_WARN_IF(!global)) {
|
|
aRv.Throw(NS_ERROR_FAILURE);
|
|
return nullptr;
|
|
}
|
|
|
|
RefPtr<Promise> promise = Promise::Create(global, aRv);
|
|
if (NS_WARN_IF(aRv.Failed())) {
|
|
return nullptr;
|
|
}
|
|
|
|
promise->MaybeResolveWithUndefined();
|
|
return promise.forget();
|
|
}
|
|
|
|
} // namespace mozilla::dom
|