mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-12-11 16:32:59 +00:00
5b2b8bc288
Apparently the esc_NonASCIIOnly and esc_Forced flags to NS_EscapeURL are incompatible, meaning that the escaping and unescaping code was not handling existing escape sequences properly. This patch adds an explicit gtest to make sure sequences round-trip correctly, and switches serialization to use `esc_Query | esc_Forced` instead, which may escape more aggressively than required but should work correctly. Differential Revision: https://phabricator.services.mozilla.com/D142111
137 lines
5.0 KiB
C++
137 lines
5.0 KiB
C++
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
/**
|
|
* This is the principal that has no rights and can't be accessed by
|
|
* anything other than itself and chrome; null principals are not
|
|
* same-origin with anything but themselves.
|
|
*/
|
|
|
|
#ifndef mozilla_NullPrincipal_h
|
|
#define mozilla_NullPrincipal_h
|
|
|
|
#include "nsIPrincipal.h"
|
|
#include "nsJSPrincipals.h"
|
|
#include "nsCOMPtr.h"
|
|
|
|
#include "mozilla/BasePrincipal.h"
|
|
#include "gtest/MozGtestFriend.h"
|
|
|
|
class nsIDocShell;
|
|
class nsIURI;
|
|
namespace Json {
|
|
class Value;
|
|
}
|
|
|
|
#define NS_NULLPRINCIPAL_CID \
|
|
{ \
|
|
0xbd066e5f, 0x146f, 0x4472, { \
|
|
0x83, 0x31, 0x7b, 0xfd, 0x05, 0xb1, 0xed, 0x90 \
|
|
} \
|
|
}
|
|
|
|
#define NS_NULLPRINCIPAL_SCHEME "moz-nullprincipal"
|
|
|
|
namespace mozilla {
|
|
|
|
class NullPrincipal final : public BasePrincipal {
|
|
public:
|
|
static PrincipalKind Kind() { return eNullPrincipal; }
|
|
|
|
NS_IMETHOD QueryInterface(REFNSIID aIID, void** aInstancePtr) override;
|
|
uint32_t GetHashValue() override;
|
|
NS_IMETHOD GetURI(nsIURI** aURI) override;
|
|
NS_IMETHOD GetIsOriginPotentiallyTrustworthy(bool* aResult) override;
|
|
NS_IMETHOD GetDomain(nsIURI** aDomain) override;
|
|
NS_IMETHOD SetDomain(nsIURI* aDomain) override;
|
|
NS_IMETHOD GetBaseDomain(nsACString& aBaseDomain) override;
|
|
NS_IMETHOD GetAddonId(nsAString& aAddonId) override;
|
|
NS_IMETHOD GetPrecursorPrincipal(nsIPrincipal** aPrecursor) override;
|
|
|
|
static already_AddRefed<NullPrincipal> CreateWithInheritedAttributes(
|
|
nsIPrincipal* aInheritFrom);
|
|
|
|
// Create NullPrincipal with origin attributes from docshell.
|
|
// If aIsFirstParty is true, and the pref 'privacy.firstparty.isolate' is also
|
|
// enabled, the mFirstPartyDomain value of the origin attributes will be set
|
|
// to an unique value.
|
|
static already_AddRefed<NullPrincipal> CreateWithInheritedAttributes(
|
|
nsIDocShell* aDocShell, bool aIsFirstParty = false);
|
|
static already_AddRefed<NullPrincipal> CreateWithInheritedAttributes(
|
|
const OriginAttributes& aOriginAttributes, bool aIsFirstParty = false);
|
|
|
|
static already_AddRefed<NullPrincipal> Create(
|
|
const OriginAttributes& aOriginAttributes, nsIURI* aURI = nullptr);
|
|
|
|
static already_AddRefed<NullPrincipal> CreateWithoutOriginAttributes();
|
|
|
|
// Generates a new unique `moz-nullprincipal:` URI. If `aPrecursor` is
|
|
// specified, it will be included in the generated URI as the null principal's
|
|
// precursor.
|
|
//
|
|
// The `aPrincipalID` attribute is used to force the creation of a
|
|
// deterministic NullPrincipal in situations where that is required. Avoid
|
|
// using this parameter unless absolutely necessary.
|
|
static already_AddRefed<nsIURI> CreateURI(nsIPrincipal* aPrecursor = nullptr,
|
|
const nsID* aPrincipalID = nullptr);
|
|
|
|
virtual nsresult GetScriptLocation(nsACString& aStr) override;
|
|
|
|
nsresult GetSiteIdentifier(SiteIdentifier& aSite) override {
|
|
aSite.Init(this);
|
|
return NS_OK;
|
|
}
|
|
|
|
virtual nsresult PopulateJSONObject(Json::Value& aObject) override;
|
|
|
|
// Serializable keys are the valid enum fields the serialization supports
|
|
enum SerializableKeys : uint8_t { eSpec = 0, eSuffix, eMax = eSuffix };
|
|
typedef mozilla::BasePrincipal::KeyValT<SerializableKeys> KeyVal;
|
|
|
|
static already_AddRefed<BasePrincipal> FromProperties(
|
|
nsTArray<NullPrincipal::KeyVal>& aFields);
|
|
|
|
class Deserializer : public BasePrincipal::Deserializer {
|
|
public:
|
|
NS_IMETHOD Read(nsIObjectInputStream* aStream) override;
|
|
};
|
|
|
|
protected:
|
|
NullPrincipal(nsIURI* aURI, const nsACString& aOriginNoSuffix,
|
|
const OriginAttributes& aOriginAttributes);
|
|
|
|
virtual ~NullPrincipal() = default;
|
|
|
|
bool SubsumesInternal(nsIPrincipal* aOther,
|
|
DocumentDomainConsideration aConsideration) override {
|
|
MOZ_ASSERT(aOther);
|
|
return FastEquals(aOther);
|
|
}
|
|
|
|
bool MayLoadInternal(nsIURI* aURI) override;
|
|
|
|
const nsCOMPtr<nsIURI> mURI;
|
|
|
|
private:
|
|
FRIEND_TEST(OriginAttributes, NullPrincipal);
|
|
FRIEND_TEST(NullPrincipalPrecursor, EscapingRoundTrips);
|
|
|
|
static void EscapePrecursorQuery(nsACString& aPrecursorQuery);
|
|
static void UnescapePrecursorQuery(nsACString& aPrecursorQuery);
|
|
|
|
// If aIsFirstParty is true, this NullPrincipal will be initialized based on
|
|
// the aOriginAttributes with FirstPartyDomain set to a unique value. This
|
|
// value is generated from mURI.filePath, with ".mozilla" appended at the end.
|
|
// aURI is used for testing purpose to assign a specific UUID rather than a
|
|
// randomly generated one.
|
|
static already_AddRefed<NullPrincipal> CreateInternal(
|
|
const OriginAttributes& aOriginAttributes, bool aIsFirstParty,
|
|
nsIURI* aURI = nullptr, nsIPrincipal* aPrecursor = nullptr);
|
|
};
|
|
|
|
} // namespace mozilla
|
|
|
|
#endif // mozilla_NullPrincipal_h
|