2013-01-02 21:47:50 -08:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
|
|
|
|
/* vim: set ts=4 et sw=4 tw=80: */
|
2012-05-21 04:12:37 -07:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
#ifndef nsScriptSecurityManager_h__
|
|
|
|
#define nsScriptSecurityManager_h__
|
|
|
|
|
|
|
|
#include "nsIScriptSecurityManager.h"
|
|
|
|
#include "nsIPrincipal.h"
|
|
|
|
#include "nsIXPCSecurityManager.h"
|
|
|
|
#include "nsInterfaceHashtable.h"
|
|
|
|
#include "nsHashtable.h"
|
|
|
|
#include "nsCOMPtr.h"
|
|
|
|
#include "nsIChannelEventSink.h"
|
|
|
|
#include "nsIObserver.h"
|
|
|
|
#include "pldhash.h"
|
|
|
|
#include "plstr.h"
|
2010-04-11 06:55:24 -07:00
|
|
|
#include "nsIScriptExternalNameSet.h"
|
2013-08-27 19:59:14 -07:00
|
|
|
#include "js/TypeDecls.h"
|
2007-03-22 10:30:00 -07:00
|
|
|
|
2013-07-30 07:25:31 -07:00
|
|
|
#include <stdint.h>
|
2012-04-11 17:17:44 -07:00
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
class nsIDocShell;
|
|
|
|
class nsString;
|
|
|
|
class nsIClassInfo;
|
|
|
|
class nsIIOService;
|
|
|
|
class nsIStringBundle;
|
|
|
|
class nsSystemPrincipal;
|
|
|
|
struct ClassPolicy;
|
|
|
|
class ClassInfoData;
|
|
|
|
class DomainPolicy;
|
|
|
|
|
|
|
|
/////////////////////
|
|
|
|
// PrincipalKey //
|
|
|
|
/////////////////////
|
|
|
|
|
|
|
|
class PrincipalKey : public PLDHashEntryHdr
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
typedef const nsIPrincipal* KeyType;
|
|
|
|
typedef const nsIPrincipal* KeyTypePointer;
|
|
|
|
|
|
|
|
PrincipalKey(const nsIPrincipal* key)
|
2007-07-08 00:08:04 -07:00
|
|
|
: mKey(const_cast<nsIPrincipal*>(key))
|
2007-03-22 10:30:00 -07:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
PrincipalKey(const PrincipalKey& toCopy)
|
|
|
|
: mKey(toCopy.mKey)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
~PrincipalKey()
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
KeyType GetKey() const
|
|
|
|
{
|
|
|
|
return mKey;
|
|
|
|
}
|
|
|
|
|
2011-09-28 23:19:26 -07:00
|
|
|
bool KeyEquals(KeyTypePointer aKey) const
|
2007-03-22 10:30:00 -07:00
|
|
|
{
|
2011-09-28 23:19:26 -07:00
|
|
|
bool eq;
|
2007-07-08 00:08:04 -07:00
|
|
|
mKey->Equals(const_cast<nsIPrincipal*>(aKey),
|
2007-03-22 10:30:00 -07:00
|
|
|
&eq);
|
|
|
|
return eq;
|
|
|
|
}
|
|
|
|
|
|
|
|
static KeyTypePointer KeyToPointer(KeyType aKey)
|
|
|
|
{
|
|
|
|
return aKey;
|
|
|
|
}
|
|
|
|
|
|
|
|
static PLDHashNumber HashKey(KeyTypePointer aKey)
|
|
|
|
{
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t hash;
|
2007-07-08 00:08:04 -07:00
|
|
|
const_cast<nsIPrincipal*>(aKey)->GetHashValue(&hash);
|
2007-03-22 10:30:00 -07:00
|
|
|
return PLDHashNumber(hash);
|
|
|
|
}
|
|
|
|
|
2011-10-17 07:59:28 -07:00
|
|
|
enum { ALLOW_MEMMOVE = true };
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
private:
|
|
|
|
nsCOMPtr<nsIPrincipal> mKey;
|
|
|
|
};
|
|
|
|
|
|
|
|
////////////////////
|
|
|
|
// Policy Storage //
|
|
|
|
////////////////////
|
|
|
|
|
|
|
|
// Property Policy
|
|
|
|
union SecurityLevel
|
|
|
|
{
|
2012-04-11 17:17:44 -07:00
|
|
|
intptr_t level;
|
|
|
|
char* capability;
|
2007-03-22 10:30:00 -07:00
|
|
|
};
|
|
|
|
|
|
|
|
// Security levels
|
|
|
|
// These values all have the low bit set (except UNDEFINED_ACCESS)
|
|
|
|
// to distinguish them from pointer values, because no pointer
|
|
|
|
// to allocated memory ever has the low bit set. A SecurityLevel
|
|
|
|
// contains either one of these constants or a pointer to a string
|
|
|
|
// representing the name of a capability.
|
|
|
|
|
|
|
|
#define SCRIPT_SECURITY_UNDEFINED_ACCESS 0
|
|
|
|
#define SCRIPT_SECURITY_ACCESS_IS_SET_BIT 1
|
|
|
|
#define SCRIPT_SECURITY_NO_ACCESS \
|
|
|
|
((1 << 0) | SCRIPT_SECURITY_ACCESS_IS_SET_BIT)
|
|
|
|
#define SCRIPT_SECURITY_SAME_ORIGIN_ACCESS \
|
|
|
|
((1 << 1) | SCRIPT_SECURITY_ACCESS_IS_SET_BIT)
|
|
|
|
#define SCRIPT_SECURITY_ALL_ACCESS \
|
|
|
|
((1 << 2) | SCRIPT_SECURITY_ACCESS_IS_SET_BIT)
|
|
|
|
|
|
|
|
#define SECURITY_ACCESS_LEVEL_FLAG(_sl) \
|
|
|
|
((_sl.level == 0) || \
|
|
|
|
(_sl.level & SCRIPT_SECURITY_ACCESS_IS_SET_BIT))
|
|
|
|
|
|
|
|
|
|
|
|
struct PropertyPolicy : public PLDHashEntryHdr
|
|
|
|
{
|
2010-07-14 23:19:36 -07:00
|
|
|
JSString *key; // interned string
|
2007-03-22 10:30:00 -07:00
|
|
|
SecurityLevel mGet;
|
|
|
|
SecurityLevel mSet;
|
|
|
|
};
|
|
|
|
|
2011-09-28 23:19:26 -07:00
|
|
|
static bool
|
2007-03-22 10:30:00 -07:00
|
|
|
InitPropertyPolicyEntry(PLDHashTable *table,
|
|
|
|
PLDHashEntryHdr *entry,
|
|
|
|
const void *key)
|
|
|
|
{
|
|
|
|
PropertyPolicy* pp = (PropertyPolicy*)entry;
|
2010-07-14 23:19:36 -07:00
|
|
|
pp->key = (JSString *)key;
|
2007-03-22 10:30:00 -07:00
|
|
|
pp->mGet.level = SCRIPT_SECURITY_UNDEFINED_ACCESS;
|
|
|
|
pp->mSet.level = SCRIPT_SECURITY_UNDEFINED_ACCESS;
|
2011-10-17 07:59:28 -07:00
|
|
|
return true;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
2008-10-10 08:04:34 -07:00
|
|
|
static void
|
2007-03-22 10:30:00 -07:00
|
|
|
ClearPropertyPolicyEntry(PLDHashTable *table, PLDHashEntryHdr *entry)
|
|
|
|
{
|
|
|
|
PropertyPolicy* pp = (PropertyPolicy*)entry;
|
2013-04-02 17:16:25 -07:00
|
|
|
pp->key = nullptr;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// Class Policy
|
|
|
|
#define NO_POLICY_FOR_CLASS (ClassPolicy*)1
|
|
|
|
|
|
|
|
struct ClassPolicy : public PLDHashEntryHdr
|
|
|
|
{
|
|
|
|
char* key;
|
|
|
|
PLDHashTable* mPolicy;
|
|
|
|
|
|
|
|
// Note: the DomainPolicy owns us, so if if dies we will too. Hence no
|
|
|
|
// need to refcount it here (and in fact, we'd probably leak if we tried).
|
|
|
|
DomainPolicy* mDomainWeAreWildcardFor;
|
|
|
|
};
|
|
|
|
|
2008-10-10 08:04:34 -07:00
|
|
|
static void
|
2007-03-22 10:30:00 -07:00
|
|
|
ClearClassPolicyEntry(PLDHashTable *table, PLDHashEntryHdr *entry)
|
|
|
|
{
|
|
|
|
ClassPolicy* cp = (ClassPolicy *)entry;
|
|
|
|
if (cp->key)
|
|
|
|
{
|
|
|
|
PL_strfree(cp->key);
|
2012-07-30 07:20:58 -07:00
|
|
|
cp->key = nullptr;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
PL_DHashTableDestroy(cp->mPolicy);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Note: actual impl is going to be after the DomainPolicy class definition,
|
|
|
|
// since we need to access members of DomainPolicy in the impl
|
2008-10-10 08:04:34 -07:00
|
|
|
static void
|
2007-03-22 10:30:00 -07:00
|
|
|
MoveClassPolicyEntry(PLDHashTable *table,
|
|
|
|
const PLDHashEntryHdr *from,
|
|
|
|
PLDHashEntryHdr *to);
|
|
|
|
|
2011-09-28 23:19:26 -07:00
|
|
|
static bool
|
2007-03-22 10:30:00 -07:00
|
|
|
InitClassPolicyEntry(PLDHashTable *table,
|
|
|
|
PLDHashEntryHdr *entry,
|
|
|
|
const void *key)
|
|
|
|
{
|
|
|
|
static PLDHashTableOps classPolicyOps =
|
|
|
|
{
|
|
|
|
PL_DHashAllocTable,
|
|
|
|
PL_DHashFreeTable,
|
|
|
|
PL_DHashVoidPtrKeyStub,
|
|
|
|
PL_DHashMatchEntryStub,
|
|
|
|
PL_DHashMoveEntryStub,
|
|
|
|
ClearPropertyPolicyEntry,
|
|
|
|
PL_DHashFinalizeStub,
|
|
|
|
InitPropertyPolicyEntry
|
|
|
|
};
|
|
|
|
|
|
|
|
ClassPolicy* cp = (ClassPolicy*)entry;
|
2012-07-30 07:20:58 -07:00
|
|
|
cp->mDomainWeAreWildcardFor = nullptr;
|
2007-03-22 10:30:00 -07:00
|
|
|
cp->key = PL_strdup((const char*)key);
|
|
|
|
if (!cp->key)
|
2011-10-17 07:59:28 -07:00
|
|
|
return false;
|
2012-07-30 07:20:58 -07:00
|
|
|
cp->mPolicy = PL_NewDHashTable(&classPolicyOps, nullptr,
|
2007-03-22 10:30:00 -07:00
|
|
|
sizeof(PropertyPolicy), 16);
|
|
|
|
if (!cp->mPolicy) {
|
|
|
|
PL_strfree(cp->key);
|
2012-07-30 07:20:58 -07:00
|
|
|
cp->key = nullptr;
|
2011-10-17 07:59:28 -07:00
|
|
|
return false;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
2011-10-17 07:59:28 -07:00
|
|
|
return true;
|
2007-03-22 10:30:00 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// Domain Policy
|
|
|
|
class DomainPolicy : public PLDHashTable
|
|
|
|
{
|
|
|
|
public:
|
2012-07-30 07:20:58 -07:00
|
|
|
DomainPolicy() : mWildcardPolicy(nullptr),
|
2007-03-22 10:30:00 -07:00
|
|
|
mRefCount(0)
|
|
|
|
{
|
|
|
|
mGeneration = sGeneration;
|
|
|
|
}
|
|
|
|
|
2011-09-28 23:19:26 -07:00
|
|
|
bool Init()
|
2007-03-22 10:30:00 -07:00
|
|
|
{
|
|
|
|
static const PLDHashTableOps domainPolicyOps =
|
|
|
|
{
|
|
|
|
PL_DHashAllocTable,
|
|
|
|
PL_DHashFreeTable,
|
|
|
|
PL_DHashStringKey,
|
|
|
|
PL_DHashMatchStringKey,
|
|
|
|
MoveClassPolicyEntry,
|
|
|
|
ClearClassPolicyEntry,
|
|
|
|
PL_DHashFinalizeStub,
|
|
|
|
InitClassPolicyEntry
|
|
|
|
};
|
|
|
|
|
2012-07-30 07:20:58 -07:00
|
|
|
return PL_DHashTableInit(this, &domainPolicyOps, nullptr,
|
2007-03-22 10:30:00 -07:00
|
|
|
sizeof(ClassPolicy), 16);
|
|
|
|
}
|
|
|
|
|
|
|
|
~DomainPolicy()
|
|
|
|
{
|
|
|
|
PL_DHashTableFinish(this);
|
|
|
|
NS_ASSERTION(mRefCount == 0, "Wrong refcount in DomainPolicy dtor");
|
|
|
|
}
|
|
|
|
|
|
|
|
void Hold()
|
|
|
|
{
|
|
|
|
mRefCount++;
|
|
|
|
}
|
|
|
|
|
|
|
|
void Drop()
|
|
|
|
{
|
|
|
|
if (--mRefCount == 0)
|
|
|
|
delete this;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void InvalidateAll()
|
|
|
|
{
|
|
|
|
sGeneration++;
|
|
|
|
}
|
|
|
|
|
2011-09-28 23:19:26 -07:00
|
|
|
bool IsInvalid()
|
2007-03-22 10:30:00 -07:00
|
|
|
{
|
|
|
|
return mGeneration != sGeneration;
|
|
|
|
}
|
|
|
|
|
|
|
|
ClassPolicy* mWildcardPolicy;
|
|
|
|
|
|
|
|
private:
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t mRefCount;
|
|
|
|
uint32_t mGeneration;
|
|
|
|
static uint32_t sGeneration;
|
2007-03-22 10:30:00 -07:00
|
|
|
};
|
|
|
|
|
2008-10-10 08:04:34 -07:00
|
|
|
static void
|
2007-03-22 10:30:00 -07:00
|
|
|
MoveClassPolicyEntry(PLDHashTable *table,
|
|
|
|
const PLDHashEntryHdr *from,
|
|
|
|
PLDHashEntryHdr *to)
|
|
|
|
{
|
|
|
|
memcpy(to, from, table->entrySize);
|
|
|
|
|
|
|
|
// Now update the mDefaultPolicy pointer that points to us, if any.
|
2007-07-08 00:08:04 -07:00
|
|
|
ClassPolicy* cp = static_cast<ClassPolicy*>(to);
|
2007-03-22 10:30:00 -07:00
|
|
|
if (cp->mDomainWeAreWildcardFor) {
|
|
|
|
NS_ASSERTION(cp->mDomainWeAreWildcardFor->mWildcardPolicy ==
|
2007-07-08 00:08:04 -07:00
|
|
|
static_cast<const ClassPolicy*>(from),
|
2007-03-22 10:30:00 -07:00
|
|
|
"Unexpected wildcard policy on mDomainWeAreWildcardFor");
|
|
|
|
cp->mDomainWeAreWildcardFor->mWildcardPolicy = cp;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/////////////////////////////
|
|
|
|
// nsScriptSecurityManager //
|
|
|
|
/////////////////////////////
|
|
|
|
#define NS_SCRIPTSECURITYMANAGER_CID \
|
|
|
|
{ 0x7ee2a4c0, 0x4b93, 0x17d3, \
|
|
|
|
{ 0xba, 0x18, 0x00, 0x60, 0xb0, 0xf1, 0x99, 0xa2 }}
|
|
|
|
|
|
|
|
class nsScriptSecurityManager : public nsIScriptSecurityManager,
|
|
|
|
public nsIChannelEventSink,
|
|
|
|
public nsIObserver
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
static void Shutdown();
|
|
|
|
|
|
|
|
NS_DEFINE_STATIC_CID_ACCESSOR(NS_SCRIPTSECURITYMANAGER_CID)
|
|
|
|
|
|
|
|
NS_DECL_ISUPPORTS
|
|
|
|
NS_DECL_NSISCRIPTSECURITYMANAGER
|
|
|
|
NS_DECL_NSIXPCSECURITYMANAGER
|
|
|
|
NS_DECL_NSICHANNELEVENTSINK
|
|
|
|
NS_DECL_NSIOBSERVER
|
|
|
|
|
|
|
|
static nsScriptSecurityManager*
|
|
|
|
GetScriptSecurityManager();
|
|
|
|
|
|
|
|
static nsSystemPrincipal*
|
|
|
|
SystemPrincipalSingletonConstructor();
|
|
|
|
|
|
|
|
JSContext* GetCurrentJSContext();
|
|
|
|
|
|
|
|
JSContext* GetSafeJSContext();
|
|
|
|
|
2008-02-26 19:45:29 -08:00
|
|
|
/**
|
|
|
|
* Utility method for comparing two URIs. For security purposes, two URIs
|
|
|
|
* are equivalent if their schemes, hosts, and ports (if any) match. This
|
|
|
|
* method returns true if aSubjectURI and aObjectURI have the same origin,
|
|
|
|
* false otherwise.
|
|
|
|
*/
|
2011-09-28 23:19:26 -07:00
|
|
|
static bool SecurityCompareURIs(nsIURI* aSourceURI, nsIURI* aTargetURI);
|
2012-08-22 08:56:38 -07:00
|
|
|
static uint32_t SecurityHashURI(nsIURI* aURI);
|
2008-02-26 19:45:29 -08:00
|
|
|
|
|
|
|
static nsresult
|
|
|
|
ReportError(JSContext* cx, const nsAString& messageTag,
|
|
|
|
nsIURI* aSource, nsIURI* aTarget);
|
2008-10-08 06:16:27 -07:00
|
|
|
|
2008-03-18 14:14:49 -07:00
|
|
|
static nsresult
|
|
|
|
CheckSameOriginPrincipal(nsIPrincipal* aSubject,
|
2010-02-02 02:29:15 -08:00
|
|
|
nsIPrincipal* aObject);
|
2012-08-22 08:56:38 -07:00
|
|
|
static uint32_t
|
2008-10-08 06:16:27 -07:00
|
|
|
HashPrincipalByOrigin(nsIPrincipal* aPrincipal);
|
2008-03-22 09:50:47 -07:00
|
|
|
|
2011-09-28 23:19:26 -07:00
|
|
|
static bool
|
2008-03-22 09:50:47 -07:00
|
|
|
GetStrictFileOriginPolicy()
|
|
|
|
{
|
|
|
|
return sStrictFileOriginPolicy;
|
|
|
|
}
|
|
|
|
|
2012-10-24 10:50:25 -07:00
|
|
|
/**
|
|
|
|
* Returns true if the two principals share the same app attributes.
|
|
|
|
*
|
|
|
|
* App attributes are appId and the inBrowserElement flag.
|
|
|
|
* Two principals have the same app attributes if those information are
|
|
|
|
* equals.
|
|
|
|
* This method helps keeping principals from different apps isolated from
|
|
|
|
* each other. Also, it helps making sure mozbrowser (web views) and their
|
|
|
|
* parent are isolated from each other. All those entities do not share the
|
|
|
|
* same data (cookies, IndexedDB, localStorage, etc.) so we shouldn't allow
|
|
|
|
* violating that principle.
|
|
|
|
*/
|
|
|
|
static bool
|
|
|
|
AppAttributesEqual(nsIPrincipal* aFirst,
|
|
|
|
nsIPrincipal* aSecond);
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
private:
|
|
|
|
|
|
|
|
// GetScriptSecurityManager is the only call that can make one
|
|
|
|
nsScriptSecurityManager();
|
|
|
|
virtual ~nsScriptSecurityManager();
|
|
|
|
|
2012-10-21 23:29:55 -07:00
|
|
|
bool SubjectIsPrivileged();
|
|
|
|
|
2013-08-08 15:53:04 -07:00
|
|
|
static bool
|
2013-06-21 06:12:46 -07:00
|
|
|
CheckObjectAccess(JSContext *cx, JS::Handle<JSObject*> obj,
|
|
|
|
JS::Handle<jsid> id, JSAccessMode mode,
|
2013-06-19 03:32:27 -07:00
|
|
|
JS::MutableHandle<JS::Value> vp);
|
2012-03-09 01:48:50 -08:00
|
|
|
|
2010-03-08 00:24:50 -08:00
|
|
|
// Decides, based on CSP, whether or not eval() and stuff can be executed.
|
2013-08-08 15:53:04 -07:00
|
|
|
static bool
|
2010-03-08 00:24:50 -08:00
|
|
|
ContentSecurityPolicyPermitsJSAction(JSContext *cx);
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
// Returns null if a principal cannot be found; generally callers
|
|
|
|
// should error out at that point.
|
2013-11-12 16:43:35 -08:00
|
|
|
static nsIPrincipal* doGetObjectPrincipal(JSObject* obj);
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
// Returns null if a principal cannot be found. Note that rv can be NS_OK
|
|
|
|
// when this happens -- this means that there was no JS running.
|
|
|
|
nsIPrincipal*
|
|
|
|
doGetSubjectPrincipal(nsresult* rv);
|
|
|
|
|
|
|
|
nsresult
|
2012-08-22 08:56:38 -07:00
|
|
|
CheckPropertyAccessImpl(uint32_t aAction,
|
2008-01-15 07:50:57 -08:00
|
|
|
nsAXPCNativeCallContext* aCallContext,
|
2007-03-22 10:30:00 -07:00
|
|
|
JSContext* cx, JSObject* aJSObject,
|
2012-07-17 22:28:47 -07:00
|
|
|
nsISupports* aObj,
|
2007-03-22 10:30:00 -07:00
|
|
|
nsIClassInfo* aClassInfo,
|
2010-07-14 23:19:36 -07:00
|
|
|
const char* aClassName, jsid aProperty,
|
2007-03-22 10:30:00 -07:00
|
|
|
void** aCachedClassPolicy);
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
CheckSameOriginDOMProp(nsIPrincipal* aSubject,
|
|
|
|
nsIPrincipal* aObject,
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t aAction);
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
nsresult
|
2013-06-20 11:05:32 -07:00
|
|
|
LookupPolicy(nsIPrincipal* principal,
|
2013-08-23 08:51:40 -07:00
|
|
|
ClassInfoData& aClassData,
|
|
|
|
JS::Handle<jsid> aProperty,
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t aAction,
|
2007-03-22 10:30:00 -07:00
|
|
|
ClassPolicy** aCachedClassPolicy,
|
|
|
|
SecurityLevel* result);
|
|
|
|
|
2012-07-19 20:28:08 -07:00
|
|
|
nsresult
|
2012-08-22 08:56:38 -07:00
|
|
|
GetCodebasePrincipalInternal(nsIURI* aURI, uint32_t aAppId,
|
2012-07-21 00:29:40 -07:00
|
|
|
bool aInMozBrowser,
|
|
|
|
nsIPrincipal** result);
|
2012-07-19 20:28:08 -07:00
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
nsresult
|
2012-08-22 08:56:38 -07:00
|
|
|
CreateCodebasePrincipal(nsIURI* aURI, uint32_t aAppId, bool aInMozBrowser,
|
2012-07-19 15:32:08 -07:00
|
|
|
nsIPrincipal** result);
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
// Returns null if a principal cannot be found. Note that rv can be NS_OK
|
|
|
|
// when this happens -- this means that there was no script for the
|
|
|
|
// context. Callers MUST pass in a non-null rv here.
|
2009-08-21 18:20:20 -07:00
|
|
|
nsIPrincipal*
|
2007-03-22 10:30:00 -07:00
|
|
|
GetSubjectPrincipal(JSContext* cx, nsresult* rv);
|
|
|
|
|
2009-05-13 15:01:01 -07:00
|
|
|
/**
|
|
|
|
* Check capability levels for an |aObj| that implements
|
|
|
|
* nsISecurityCheckedComponent.
|
|
|
|
*
|
|
|
|
* NB: This function also checks to see if aObj is a plugin and the user
|
|
|
|
* has set the "security.xpconnect.plugin.unrestricted" pref to allow
|
|
|
|
* anybody to script plugin objects from anywhere.
|
|
|
|
*
|
2009-08-06 20:26:33 -07:00
|
|
|
* @param cx The context we're running on.
|
|
|
|
* NB: If null, "sameOrigin" does not have any effect.
|
2009-05-13 15:01:01 -07:00
|
|
|
* @param aObj The nsISupports representation of the object in question
|
|
|
|
* object, possibly null.
|
2009-08-06 20:26:33 -07:00
|
|
|
* @param aJSObject The JSObject representation of the object in question
|
|
|
|
* if |cx| is non-null and |aObjectSecurityLevel| is
|
|
|
|
* "sameOrigin". If null will be calculated from aObj (if
|
|
|
|
* non-null) if and only if aObj is an XPCWrappedJS. The
|
|
|
|
* rationale behind this is that if we're creating a JS
|
|
|
|
* wrapper for an XPCWrappedJS, this object definitely
|
|
|
|
* expects to be exposed to JS.
|
2009-05-13 15:01:01 -07:00
|
|
|
* @param aSubjectPrincipal The nominal subject principal used when
|
2009-08-06 20:26:33 -07:00
|
|
|
* aObjectSecurityLevel is "sameOrigin". If null,
|
|
|
|
* this is calculated if it's needed.
|
2009-05-13 15:01:01 -07:00
|
|
|
* @param aObjectSecurityLevel Can be one of three values:
|
|
|
|
* - allAccess: Allow access no matter what.
|
|
|
|
* - noAccess: Deny access no matter what.
|
2009-08-06 20:26:33 -07:00
|
|
|
* - sameOrigin: If |cx| is null, behave like noAccess.
|
|
|
|
* Otherwise, possibly compute a subject
|
|
|
|
* and object principal and return true if
|
|
|
|
* and only if the subject has greater than
|
|
|
|
* or equal privileges to the object.
|
2009-05-13 15:01:01 -07:00
|
|
|
*/
|
2007-03-22 10:30:00 -07:00
|
|
|
nsresult
|
2009-08-06 20:26:33 -07:00
|
|
|
CheckXPCPermissions(JSContext* cx,
|
|
|
|
nsISupports* aObj, JSObject* aJSObject,
|
2009-05-13 15:01:01 -07:00
|
|
|
nsIPrincipal* aSubjectPrincipal,
|
2007-03-22 10:30:00 -07:00
|
|
|
const char* aObjectSecurityLevel);
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
Init();
|
2009-05-13 15:01:01 -07:00
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
nsresult
|
|
|
|
InitPrefs();
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
InitPolicies();
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
InitDomainPolicy(JSContext* cx, const char* aPolicyName,
|
|
|
|
DomainPolicy* aDomainPolicy);
|
|
|
|
|
|
|
|
inline void
|
2007-09-06 00:02:57 -07:00
|
|
|
ScriptSecurityPrefChanged();
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
nsObjectHashtable* mOriginToPolicyMap;
|
|
|
|
DomainPolicy* mDefaultPolicy;
|
|
|
|
nsObjectHashtable* mCapabilities;
|
|
|
|
|
|
|
|
nsCOMPtr<nsIPrincipal> mSystemPrincipal;
|
2011-09-28 23:19:26 -07:00
|
|
|
bool mPrefInitialized;
|
|
|
|
bool mIsJavaScriptEnabled;
|
|
|
|
bool mPolicyPrefsChanged;
|
2008-02-26 19:45:29 -08:00
|
|
|
|
2011-09-28 23:19:26 -07:00
|
|
|
static bool sStrictFileOriginPolicy;
|
2007-03-22 10:30:00 -07:00
|
|
|
|
|
|
|
static nsIIOService *sIOService;
|
|
|
|
static nsIStringBundle *sStrBundle;
|
|
|
|
static JSRuntime *sRuntime;
|
|
|
|
};
|
|
|
|
|
2010-04-11 06:55:24 -07:00
|
|
|
#define NS_SECURITYNAMESET_CID \
|
|
|
|
{ 0x7c02eadc, 0x76, 0x4d03, \
|
|
|
|
{ 0x99, 0x8d, 0x80, 0xd7, 0x79, 0xc4, 0x85, 0x89 } }
|
|
|
|
#define NS_SECURITYNAMESET_CONTRACTID "@mozilla.org/security/script/nameset;1"
|
|
|
|
|
|
|
|
class nsSecurityNameSet : public nsIScriptExternalNameSet
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
nsSecurityNameSet();
|
|
|
|
virtual ~nsSecurityNameSet();
|
|
|
|
|
|
|
|
NS_DECL_ISUPPORTS
|
|
|
|
|
|
|
|
NS_IMETHOD InitializeNameSet(nsIScriptContext* aScriptContext);
|
|
|
|
};
|
|
|
|
|
2012-07-19 22:44:03 -07:00
|
|
|
namespace mozilla {
|
|
|
|
|
|
|
|
void
|
2013-09-10 21:18:36 -07:00
|
|
|
GetJarPrefix(uint32_t aAppid,
|
|
|
|
bool aInMozBrowser,
|
|
|
|
nsACString& aJarPrefix);
|
2012-07-19 22:44:03 -07:00
|
|
|
|
|
|
|
} // namespace mozilla
|
|
|
|
|
2007-03-22 10:30:00 -07:00
|
|
|
#endif // nsScriptSecurityManager_h__
|