mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-23 21:01:08 +00:00
05c279a3d2
Differential Revision: https://phabricator.services.mozilla.com/D161450
402 lines
12 KiB
C++
402 lines
12 KiB
C++
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=2 sw=2 et tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "ExpandedPrincipal.h"
|
|
#include "nsIClassInfoImpl.h"
|
|
#include "nsIObjectInputStream.h"
|
|
#include "nsReadableUtils.h"
|
|
#include "mozilla/Base64.h"
|
|
#include "mozilla/extensions/WebExtensionPolicy.h"
|
|
#include "json/json.h"
|
|
|
|
using namespace mozilla;
|
|
|
|
NS_IMPL_CLASSINFO(ExpandedPrincipal, nullptr, 0, NS_EXPANDEDPRINCIPAL_CID)
|
|
NS_IMPL_QUERY_INTERFACE_CI(ExpandedPrincipal, nsIPrincipal,
|
|
nsIExpandedPrincipal)
|
|
NS_IMPL_CI_INTERFACE_GETTER(ExpandedPrincipal, nsIPrincipal,
|
|
nsIExpandedPrincipal)
|
|
|
|
ExpandedPrincipal::ExpandedPrincipal(
|
|
nsTArray<nsCOMPtr<nsIPrincipal>>&& aPrincipals,
|
|
const nsACString& aOriginNoSuffix, const OriginAttributes& aAttrs)
|
|
: BasePrincipal(eExpandedPrincipal, aOriginNoSuffix, aAttrs),
|
|
mPrincipals(std::move(aPrincipals)) {}
|
|
|
|
ExpandedPrincipal::~ExpandedPrincipal() = default;
|
|
|
|
already_AddRefed<ExpandedPrincipal> ExpandedPrincipal::Create(
|
|
const nsTArray<nsCOMPtr<nsIPrincipal>>& aAllowList,
|
|
const OriginAttributes& aAttrs) {
|
|
nsTArray<nsCOMPtr<nsIPrincipal>> principals;
|
|
for (size_t i = 0; i < aAllowList.Length(); ++i) {
|
|
principals.AppendElement(aAllowList[i]);
|
|
}
|
|
|
|
nsAutoCString origin;
|
|
origin.AssignLiteral("[Expanded Principal [");
|
|
StringJoinAppend(
|
|
origin, ", "_ns, principals,
|
|
[](nsACString& dest, const nsCOMPtr<nsIPrincipal>& principal) {
|
|
nsAutoCString subOrigin;
|
|
DebugOnly<nsresult> rv = principal->GetOrigin(subOrigin);
|
|
MOZ_ASSERT(NS_SUCCEEDED(rv));
|
|
dest.Append(subOrigin);
|
|
});
|
|
origin.AppendLiteral("]]");
|
|
|
|
RefPtr<ExpandedPrincipal> ep =
|
|
new ExpandedPrincipal(std::move(principals), origin, aAttrs);
|
|
return ep.forget();
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
ExpandedPrincipal::GetDomain(nsIURI** aDomain) {
|
|
*aDomain = nullptr;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
ExpandedPrincipal::SetDomain(nsIURI* aDomain) { return NS_OK; }
|
|
|
|
bool ExpandedPrincipal::SubsumesInternal(
|
|
nsIPrincipal* aOther,
|
|
BasePrincipal::DocumentDomainConsideration aConsideration) {
|
|
// If aOther is an ExpandedPrincipal too, we break it down into its component
|
|
// nsIPrincipals, and check subsumes on each one.
|
|
if (Cast(aOther)->Is<ExpandedPrincipal>()) {
|
|
auto* expanded = Cast(aOther)->As<ExpandedPrincipal>();
|
|
|
|
for (auto& other : expanded->AllowList()) {
|
|
// Use SubsumesInternal rather than Subsumes here, since OriginAttribute
|
|
// checks are only done between non-expanded sub-principals, and we don't
|
|
// need to incur the extra virtual call overhead.
|
|
if (!SubsumesInternal(other, aConsideration)) {
|
|
return false;
|
|
}
|
|
}
|
|
return true;
|
|
}
|
|
|
|
// We're dealing with a regular principal. One of our principals must subsume
|
|
// it.
|
|
for (uint32_t i = 0; i < mPrincipals.Length(); ++i) {
|
|
if (Cast(mPrincipals[i])->Subsumes(aOther, aConsideration)) {
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
bool ExpandedPrincipal::MayLoadInternal(nsIURI* uri) {
|
|
for (uint32_t i = 0; i < mPrincipals.Length(); ++i) {
|
|
if (BasePrincipal::Cast(mPrincipals[i])->MayLoadInternal(uri)) {
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
uint32_t ExpandedPrincipal::GetHashValue() {
|
|
MOZ_CRASH("extended principal should never be used as key in a hash map");
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
ExpandedPrincipal::GetURI(nsIURI** aURI) {
|
|
*aURI = nullptr;
|
|
return NS_OK;
|
|
}
|
|
|
|
const nsTArray<nsCOMPtr<nsIPrincipal>>& ExpandedPrincipal::AllowList() {
|
|
return mPrincipals;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
ExpandedPrincipal::GetBaseDomain(nsACString& aBaseDomain) {
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
ExpandedPrincipal::GetAddonId(nsAString& aAddonId) {
|
|
aAddonId.Truncate();
|
|
return NS_OK;
|
|
};
|
|
|
|
bool ExpandedPrincipal::AddonHasPermission(const nsAtom* aPerm) {
|
|
for (size_t i = 0; i < mPrincipals.Length(); ++i) {
|
|
if (BasePrincipal::Cast(mPrincipals[i])->AddonHasPermission(aPerm)) {
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool ExpandedPrincipal::AddonAllowsLoad(nsIURI* aURI,
|
|
bool aExplicit /* = false */) {
|
|
for (const auto& principal : mPrincipals) {
|
|
if (Cast(principal)->AddonAllowsLoad(aURI, aExplicit)) {
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
void ExpandedPrincipal::SetCsp(nsIContentSecurityPolicy* aCSP) {
|
|
AssertIsOnMainThread();
|
|
mCSP = new nsMainThreadPtrHolder<nsIContentSecurityPolicy>(
|
|
"ExpandedPrincipal::mCSP", aCSP);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
ExpandedPrincipal::GetCsp(nsIContentSecurityPolicy** aCsp) {
|
|
AssertIsOnMainThread();
|
|
NS_IF_ADDREF(*aCsp = mCSP);
|
|
return NS_OK;
|
|
}
|
|
|
|
nsIPrincipal* ExpandedPrincipal::PrincipalToInherit(nsIURI* aRequestedURI) {
|
|
if (aRequestedURI) {
|
|
// If a given sub-principal subsumes the given URI, use that principal for
|
|
// inheritance. In general, this only happens with certain CORS modes, loads
|
|
// with forced principal inheritance, and creation of XML documents from
|
|
// XMLHttpRequests or fetch requests. For URIs that normally inherit a
|
|
// principal (such as data: URIs), we fall back to the last principal in the
|
|
// allowlist.
|
|
for (const auto& principal : mPrincipals) {
|
|
if (Cast(principal)->MayLoadInternal(aRequestedURI)) {
|
|
return principal;
|
|
}
|
|
}
|
|
}
|
|
return mPrincipals.LastElement();
|
|
}
|
|
|
|
nsresult ExpandedPrincipal::GetScriptLocation(nsACString& aStr) {
|
|
aStr.AssignLiteral("[Expanded Principal [");
|
|
for (size_t i = 0; i < mPrincipals.Length(); ++i) {
|
|
if (i != 0) {
|
|
aStr.AppendLiteral(", ");
|
|
}
|
|
|
|
nsAutoCString spec;
|
|
nsresult rv =
|
|
nsJSPrincipals::get(mPrincipals.ElementAt(i))->GetScriptLocation(spec);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
aStr.Append(spec);
|
|
}
|
|
aStr.AppendLiteral("]]");
|
|
return NS_OK;
|
|
}
|
|
|
|
//////////////////////////////////////////
|
|
// Methods implementing nsISerializable //
|
|
//////////////////////////////////////////
|
|
|
|
// We've had way too many issues with unversioned serializations, so
|
|
// explicitly version this one.
|
|
static const uint32_t kSerializationVersion = 1;
|
|
|
|
NS_IMETHODIMP
|
|
ExpandedPrincipal::Deserializer::Read(nsIObjectInputStream* aStream) {
|
|
uint32_t version;
|
|
nsresult rv = aStream->Read32(&version);
|
|
if (version != kSerializationVersion) {
|
|
MOZ_ASSERT(false,
|
|
"We really need to add handling of the old(?) version here");
|
|
return NS_ERROR_UNEXPECTED;
|
|
}
|
|
|
|
uint32_t count;
|
|
rv = aStream->Read32(&count);
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
nsTArray<nsCOMPtr<nsIPrincipal>> principals;
|
|
if (!principals.SetCapacity(count, fallible)) {
|
|
return NS_ERROR_OUT_OF_MEMORY;
|
|
}
|
|
|
|
for (uint32_t i = 0; i < count; ++i) {
|
|
nsCOMPtr<nsISupports> read;
|
|
rv = aStream->ReadObject(true, getter_AddRefs(read));
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
|
|
nsCOMPtr<nsIPrincipal> principal = do_QueryInterface(read);
|
|
if (!principal) {
|
|
return NS_ERROR_UNEXPECTED;
|
|
}
|
|
|
|
principals.AppendElement(std::move(principal));
|
|
}
|
|
|
|
mPrincipal = ExpandedPrincipal::Create(principals, OriginAttributes());
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult ExpandedPrincipal::GetSiteIdentifier(SiteIdentifier& aSite) {
|
|
// Call GetSiteIdentifier on each of our principals and return a new
|
|
// ExpandedPrincipal.
|
|
|
|
nsTArray<nsCOMPtr<nsIPrincipal>> allowlist;
|
|
for (const auto& principal : mPrincipals) {
|
|
SiteIdentifier site;
|
|
nsresult rv = Cast(principal)->GetSiteIdentifier(site);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
allowlist.AppendElement(site.GetPrincipal());
|
|
}
|
|
|
|
RefPtr<ExpandedPrincipal> expandedPrincipal =
|
|
ExpandedPrincipal::Create(allowlist, OriginAttributesRef());
|
|
MOZ_ASSERT(expandedPrincipal, "ExpandedPrincipal::Create returned nullptr?");
|
|
|
|
aSite.Init(expandedPrincipal);
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult ExpandedPrincipal::PopulateJSONObject(Json::Value& aObject) {
|
|
Json::Value& principalList =
|
|
aObject[Json::StaticString(JSONEnumKeyString<eSpecs>())] =
|
|
Json::arrayValue;
|
|
for (const auto& principal : mPrincipals) {
|
|
Json::Value object = Json::objectValue;
|
|
nsresult rv = BasePrincipal::Cast(principal)->ToJSON(object);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
principalList.append(std::move(object));
|
|
}
|
|
|
|
nsAutoCString suffix;
|
|
OriginAttributesRef().CreateSuffix(suffix);
|
|
if (suffix.Length() > 0) {
|
|
SetJSONValue<eSuffix>(aObject, suffix);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
already_AddRefed<BasePrincipal> ExpandedPrincipal::FromProperties(
|
|
nsTArray<ExpandedPrincipal::KeyVal>& aFields) {
|
|
MOZ_ASSERT(aFields.Length() == eMax + 1, "Must have all the keys");
|
|
nsTArray<nsCOMPtr<nsIPrincipal>> allowList;
|
|
OriginAttributes attrs;
|
|
// The odd structure here is to make the code to not compile
|
|
// if all the switch enum cases haven't been codified
|
|
|
|
for (const auto& field : aFields) {
|
|
switch (field.key) {
|
|
case ExpandedPrincipal::eSpecs:
|
|
if (!field.valueWasSerialized) {
|
|
MOZ_ASSERT(false,
|
|
"Expanded principals require specs in serialized JSON");
|
|
return nullptr;
|
|
}
|
|
for (const nsACString& each : field.value.Split(',')) {
|
|
nsAutoCString result;
|
|
nsresult rv;
|
|
rv = Base64Decode(each, result);
|
|
MOZ_ASSERT(NS_SUCCEEDED(rv), "failed to decode");
|
|
|
|
NS_ENSURE_SUCCESS(rv, nullptr);
|
|
nsCOMPtr<nsIPrincipal> principal = BasePrincipal::FromJSON(result);
|
|
allowList.AppendElement(principal);
|
|
}
|
|
break;
|
|
case ExpandedPrincipal::eSuffix:
|
|
if (field.valueWasSerialized) {
|
|
bool ok = attrs.PopulateFromSuffix(field.value);
|
|
if (!ok) {
|
|
return nullptr;
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (allowList.Length() == 0) {
|
|
return nullptr;
|
|
}
|
|
|
|
RefPtr<ExpandedPrincipal> expandedPrincipal =
|
|
ExpandedPrincipal::Create(allowList, attrs);
|
|
|
|
return expandedPrincipal.forget();
|
|
}
|
|
|
|
/* static */
|
|
already_AddRefed<BasePrincipal> ExpandedPrincipal::FromProperties(
|
|
const Json::Value& aJSON) {
|
|
MOZ_ASSERT(aJSON.size() <= eMax + 1, "Must have at most, all the properties");
|
|
const std::string specs = std::to_string(eSpecs);
|
|
const std::string suffix = std::to_string(eSuffix);
|
|
MOZ_ASSERT(aJSON.isMember(specs), "The eSpecs member is required");
|
|
MOZ_ASSERT(aJSON.size() == 1 || aJSON.isMember(suffix),
|
|
"eSuffix is optional");
|
|
|
|
const auto* specsValue =
|
|
aJSON.find(specs.c_str(), specs.c_str() + specs.length());
|
|
if (!specsValue) {
|
|
MOZ_ASSERT(false, "Expanded principals require specs in serialized JSON");
|
|
return nullptr;
|
|
}
|
|
|
|
nsTArray<nsCOMPtr<nsIPrincipal>> allowList;
|
|
for (const auto& principalJSON : *specsValue) {
|
|
if (nsCOMPtr<nsIPrincipal> principal =
|
|
BasePrincipal::FromJSON(principalJSON)) {
|
|
allowList.AppendElement(principal);
|
|
}
|
|
}
|
|
|
|
if (allowList.Length() == 0) {
|
|
return nullptr;
|
|
}
|
|
|
|
OriginAttributes attrs;
|
|
if (aJSON.isMember(suffix)) {
|
|
const auto& value = aJSON[suffix];
|
|
if (!value.isString()) {
|
|
return nullptr;
|
|
}
|
|
|
|
bool ok = attrs.PopulateFromSuffix(nsDependentCString(value.asCString()));
|
|
if (!ok) {
|
|
return nullptr;
|
|
}
|
|
}
|
|
|
|
RefPtr<ExpandedPrincipal> expandedPrincipal =
|
|
ExpandedPrincipal::Create(allowList, attrs);
|
|
|
|
return expandedPrincipal.forget();
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
ExpandedPrincipal::IsThirdPartyURI(nsIURI* aURI, bool* aRes) {
|
|
// ExpandedPrincipal for extension content scripts consist of two principals,
|
|
// the document's principal and the extension's principal.
|
|
// To make sure that the third-party check behaves like the web page on which
|
|
// the content script is running, ignore the extension's principal.
|
|
|
|
for (const auto& principal : mPrincipals) {
|
|
if (!Cast(principal)->AddonPolicyCore()) {
|
|
return Cast(principal)->IsThirdPartyURI(aURI, aRes);
|
|
}
|
|
}
|
|
|
|
if (mPrincipals.IsEmpty()) {
|
|
*aRes = true;
|
|
return NS_OK;
|
|
}
|
|
|
|
return Cast(mPrincipals[0])->IsThirdPartyURI(aURI, aRes);
|
|
}
|