gecko-dev/dom/ipc/WindowGlobalActor.cpp
Paul Zuehlcke 547f195fc5 Bug 1679512 - Move contentBlockingAllowListPrincipal to WindowGlobalParent. r=timhuang,nika
We only use the contentBlockingAllowListPrincipal for excluding sites from content
blocking for top level documents. We don't need it in the content process and should
not compute it for every document.

Differential Revision: https://phabricator.services.mozilla.com/D100781
2021-01-14 20:37:35 +00:00

170 lines
6.1 KiB
C++

/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim:set ts=2 sw=2 sts=2 et cindent: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "mozilla/dom/WindowGlobalActor.h"
#include "AutoplayPolicy.h"
#include "nsContentUtils.h"
#include "mozJSComponentLoader.h"
#include "mozilla/ContentBlockingAllowList.h"
#include "mozilla/Logging.h"
#include "mozilla/dom/Document.h"
#include "mozilla/dom/JSActorService.h"
#include "mozilla/dom/JSWindowActorParent.h"
#include "mozilla/dom/JSWindowActorChild.h"
#include "mozilla/dom/JSWindowActorProtocol.h"
#include "mozilla/dom/PopupBlocker.h"
#include "mozilla/net/CookieJarSettings.h"
#include "mozilla/dom/WindowGlobalChild.h"
#include "mozilla/dom/WindowGlobalParent.h"
#include "nsGlobalWindowInner.h"
#include "nsNetUtil.h"
namespace mozilla::dom {
// CORPP 3.1.3 https://mikewest.github.io/corpp/#integration-html
static nsILoadInfo::CrossOriginEmbedderPolicy InheritedPolicy(
dom::BrowsingContext* aBrowsingContext) {
WindowContext* inherit = aBrowsingContext->GetParentWindowContext();
if (inherit) {
return inherit->GetEmbedderPolicy();
}
return nsILoadInfo::EMBEDDER_POLICY_NULL;
}
// Common WindowGlobalInit creation code used by both `AboutBlankInitializer`
// and `WindowInitializer`.
WindowGlobalInit WindowGlobalActor::BaseInitializer(
dom::BrowsingContext* aBrowsingContext, uint64_t aInnerWindowId,
uint64_t aOuterWindowId) {
MOZ_DIAGNOSTIC_ASSERT(aBrowsingContext);
WindowGlobalInit init;
auto& ctx = init.context();
ctx.mInnerWindowId = aInnerWindowId;
ctx.mOuterWindowId = aOuterWindowId;
ctx.mBrowsingContextId = aBrowsingContext->Id();
// If any synced fields need to be initialized from our BrowsingContext, we
// can initialize them here.
auto& fields = ctx.mFields;
fields.mEmbedderPolicy = InheritedPolicy(aBrowsingContext);
fields.mAutoplayPermission = nsIPermissionManager::UNKNOWN_ACTION;
return init;
}
WindowGlobalInit WindowGlobalActor::AboutBlankInitializer(
dom::BrowsingContext* aBrowsingContext, nsIPrincipal* aPrincipal) {
WindowGlobalInit init =
BaseInitializer(aBrowsingContext, nsContentUtils::GenerateWindowId(),
nsContentUtils::GenerateWindowId());
init.principal() = aPrincipal;
Unused << NS_NewURI(getter_AddRefs(init.documentURI()), "about:blank");
return init;
}
WindowGlobalInit WindowGlobalActor::WindowInitializer(
nsGlobalWindowInner* aWindow) {
WindowGlobalInit init =
BaseInitializer(aWindow->GetBrowsingContext(), aWindow->WindowID(),
aWindow->GetOuterWindow()->WindowID());
init.principal() = aWindow->GetPrincipal();
init.documentURI() = aWindow->GetDocumentURI();
Document* doc = aWindow->GetDocument();
init.blockAllMixedContent() = doc->GetBlockAllMixedContent(false);
init.upgradeInsecureRequests() = doc->GetUpgradeInsecureRequests(false);
init.sandboxFlags() = doc->GetSandboxFlags();
net::CookieJarSettings::Cast(doc->CookieJarSettings())
->Serialize(init.cookieJarSettings());
init.httpsOnlyStatus() = doc->HttpsOnlyStatus();
auto& fields = init.context().mFields;
fields.mCookieBehavior = Some(doc->CookieJarSettings()->GetCookieBehavior());
fields.mIsOnContentBlockingAllowList =
doc->CookieJarSettings()->GetIsOnContentBlockingAllowList();
fields.mIsThirdPartyWindow = doc->HasThirdPartyChannel();
fields.mIsThirdPartyTrackingResourceWindow =
nsContentUtils::IsThirdPartyTrackingResourceWindow(aWindow);
fields.mIsSecureContext = aWindow->IsSecureContext();
// Initialze permission fields
fields.mAutoplayPermission =
AutoplayPolicy::GetSiteAutoplayPermission(init.principal());
fields.mPopupPermission = PopupBlocker::GetPopupPermission(init.principal());
// Initialize top level permission fields
if (aWindow->GetBrowsingContext()->IsTop()) {
fields.mShortcutsPermission =
nsGlobalWindowInner::GetShortcutsPermission(init.principal());
}
auto policy = doc->GetEmbedderPolicy();
if (policy.isSome()) {
fields.mEmbedderPolicy = *policy;
}
// Init Mixed Content Fields
nsCOMPtr<nsIURI> innerDocURI = NS_GetInnermostURI(doc->GetDocumentURI());
if (innerDocURI) {
fields.mIsSecure = innerDocURI->SchemeIs("https");
}
nsCOMPtr<nsIChannel> mixedChannel;
aWindow->GetDocShell()->GetMixedContentChannel(getter_AddRefs(mixedChannel));
// A non null mixedContent channel on the docshell indicates,
// that the user has overriden mixed content to allow mixed
// content loads to happen.
if (mixedChannel && (mixedChannel == doc->GetChannel())) {
fields.mAllowMixedContent = true;
}
nsCOMPtr<nsITransportSecurityInfo> securityInfo;
if (nsCOMPtr<nsIChannel> channel = doc->GetChannel()) {
nsCOMPtr<nsILoadInfo> loadInfo(channel->LoadInfo());
fields.mIsOriginalFrameSource = loadInfo->GetOriginalFrameSrcLoad();
nsCOMPtr<nsISupports> securityInfoSupports;
channel->GetSecurityInfo(getter_AddRefs(securityInfoSupports));
securityInfo = do_QueryInterface(securityInfoSupports);
}
init.securityInfo() = securityInfo;
fields.mIsLocalIP = init.principal()->GetIsLocalIpAddress();
// Most data here is specific to the Document, which can change without
// creating a new WindowGlobal. Anything new added here which fits that
// description should also be synchronized in
// WindowGlobalChild::OnNewDocument.
return init;
}
already_AddRefed<JSActorProtocol> WindowGlobalActor::MatchingJSActorProtocol(
JSActorService* aActorSvc, const nsACString& aName, ErrorResult& aRv) {
RefPtr<JSWindowActorProtocol> proto =
aActorSvc->GetJSWindowActorProtocol(aName);
if (!proto) {
aRv.ThrowNotFoundError(nsPrintfCString("No such JSWindowActor '%s'",
PromiseFlatCString(aName).get()));
return nullptr;
}
if (!proto->Matches(BrowsingContext(), GetDocumentURI(), GetRemoteType(),
aRv)) {
MOZ_ASSERT(aRv.Failed());
return nullptr;
}
MOZ_ASSERT(!aRv.Failed());
return proto.forget();
}
} // namespace mozilla::dom