2014-07-09 23:56:37 -07:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
2015-02-13 11:36:47 -08:00
|
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
2014-07-09 23:56:37 -07:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#include "mozilla/LoadInfo.h"
|
|
|
|
|
|
|
|
#include "mozilla/Assertions.h"
|
2015-07-19 19:11:03 -07:00
|
|
|
#include "mozilla/dom/ToJSValue.h"
|
2015-05-08 12:52:49 -07:00
|
|
|
#include "nsFrameLoader.h"
|
|
|
|
#include "nsIDocShell.h"
|
2014-07-16 13:16:12 -07:00
|
|
|
#include "nsIDocument.h"
|
|
|
|
#include "nsIDOMDocument.h"
|
2015-05-08 12:52:49 -07:00
|
|
|
#include "nsIFrameLoader.h"
|
2014-07-09 23:56:37 -07:00
|
|
|
#include "nsISupportsImpl.h"
|
|
|
|
#include "nsISupportsUtils.h"
|
2015-06-16 21:18:16 -07:00
|
|
|
#include "nsContentUtils.h"
|
2014-07-09 23:56:37 -07:00
|
|
|
|
|
|
|
namespace mozilla {
|
|
|
|
|
2014-11-14 08:55:59 -08:00
|
|
|
LoadInfo::LoadInfo(nsIPrincipal* aLoadingPrincipal,
|
|
|
|
nsIPrincipal* aTriggeringPrincipal,
|
2014-07-16 13:16:12 -07:00
|
|
|
nsINode* aLoadingContext,
|
|
|
|
nsSecurityFlags aSecurityFlags,
|
2015-08-19 10:43:30 -07:00
|
|
|
nsContentPolicyType aContentPolicyType)
|
2014-12-10 15:36:03 -08:00
|
|
|
: mLoadingPrincipal(aLoadingContext ?
|
|
|
|
aLoadingContext->NodePrincipal() : aLoadingPrincipal)
|
2014-11-14 08:55:59 -08:00
|
|
|
, mTriggeringPrincipal(aTriggeringPrincipal ?
|
2014-12-10 15:36:03 -08:00
|
|
|
aTriggeringPrincipal : mLoadingPrincipal.get())
|
2014-07-16 13:16:12 -07:00
|
|
|
, mLoadingContext(do_GetWeakReference(aLoadingContext))
|
|
|
|
, mSecurityFlags(aSecurityFlags)
|
2015-10-19 11:14:54 -07:00
|
|
|
, mInternalContentPolicyType(aContentPolicyType)
|
2015-10-22 11:07:32 -07:00
|
|
|
, mTainting(LoadTainting::Basic)
|
2015-07-10 13:57:55 -07:00
|
|
|
, mUpgradeInsecureRequests(false)
|
2015-05-08 12:52:49 -07:00
|
|
|
, mInnerWindowID(0)
|
|
|
|
, mOuterWindowID(0)
|
|
|
|
, mParentOuterWindowID(0)
|
2015-07-19 19:11:57 -07:00
|
|
|
, mEnforceSecurity(false)
|
|
|
|
, mInitialSecurityCheckDone(false)
|
2014-07-09 23:56:37 -07:00
|
|
|
{
|
2014-12-10 15:36:03 -08:00
|
|
|
MOZ_ASSERT(mLoadingPrincipal);
|
2014-11-14 08:55:59 -08:00
|
|
|
MOZ_ASSERT(mTriggeringPrincipal);
|
2014-12-10 15:36:03 -08:00
|
|
|
|
|
|
|
// if consumers pass both, aLoadingContext and aLoadingPrincipal
|
|
|
|
// then the loadingPrincipal must be the same as the node's principal
|
|
|
|
MOZ_ASSERT(!aLoadingContext || !aLoadingPrincipal ||
|
|
|
|
aLoadingContext->NodePrincipal() == aLoadingPrincipal);
|
|
|
|
|
2014-07-16 13:16:12 -07:00
|
|
|
// if the load is sandboxed, we can not also inherit the principal
|
|
|
|
if (mSecurityFlags & nsILoadInfo::SEC_SANDBOXED) {
|
|
|
|
mSecurityFlags ^= nsILoadInfo::SEC_FORCE_INHERIT_PRINCIPAL;
|
|
|
|
}
|
2015-05-08 12:52:49 -07:00
|
|
|
|
|
|
|
if (aLoadingContext) {
|
|
|
|
nsCOMPtr<nsPIDOMWindow> outerWindow;
|
|
|
|
|
|
|
|
// When the element being loaded is a frame, we choose the frame's window
|
|
|
|
// for the window ID and the frame element's window as the parent
|
|
|
|
// window. This is the behavior that Chrome exposes to add-ons.
|
|
|
|
nsCOMPtr<nsIFrameLoaderOwner> frameLoaderOwner = do_QueryInterface(aLoadingContext);
|
|
|
|
if (frameLoaderOwner) {
|
|
|
|
nsCOMPtr<nsIFrameLoader> fl = frameLoaderOwner->GetFrameLoader();
|
|
|
|
nsCOMPtr<nsIDocShell> docShell;
|
|
|
|
if (fl && NS_SUCCEEDED(fl->GetDocShell(getter_AddRefs(docShell))) && docShell) {
|
|
|
|
outerWindow = do_GetInterface(docShell);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
outerWindow = aLoadingContext->OwnerDoc()->GetWindow();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (outerWindow) {
|
|
|
|
nsCOMPtr<nsPIDOMWindow> inner = outerWindow->GetCurrentInnerWindow();
|
|
|
|
mInnerWindowID = inner ? inner->WindowID() : 0;
|
|
|
|
mOuterWindowID = outerWindow->WindowID();
|
|
|
|
|
2015-10-29 14:18:54 -07:00
|
|
|
nsCOMPtr<nsPIDOMWindow> parent = outerWindow->GetScriptableParent();
|
2015-10-26 14:37:32 -07:00
|
|
|
mParentOuterWindowID = parent->WindowID();
|
2015-05-08 12:52:49 -07:00
|
|
|
}
|
2015-07-10 13:57:55 -07:00
|
|
|
|
|
|
|
mUpgradeInsecureRequests = aLoadingContext->OwnerDoc()->GetUpgradeInsecureRequests();
|
2015-05-08 12:52:49 -07:00
|
|
|
}
|
2015-10-21 14:47:00 -07:00
|
|
|
|
|
|
|
mOriginAttributes = BasePrincipal::Cast(mLoadingPrincipal)->OriginAttributesRef();
|
2014-07-09 23:56:37 -07:00
|
|
|
}
|
|
|
|
|
2015-09-24 13:42:02 -07:00
|
|
|
LoadInfo::LoadInfo(const LoadInfo& rhs)
|
|
|
|
: mLoadingPrincipal(rhs.mLoadingPrincipal)
|
|
|
|
, mTriggeringPrincipal(rhs.mTriggeringPrincipal)
|
|
|
|
, mLoadingContext(rhs.mLoadingContext)
|
|
|
|
, mSecurityFlags(rhs.mSecurityFlags)
|
2015-10-19 11:14:54 -07:00
|
|
|
, mInternalContentPolicyType(rhs.mInternalContentPolicyType)
|
2015-10-31 15:20:48 -07:00
|
|
|
, mTainting(rhs.mTainting)
|
2015-09-24 13:42:02 -07:00
|
|
|
, mUpgradeInsecureRequests(rhs.mUpgradeInsecureRequests)
|
|
|
|
, mInnerWindowID(rhs.mInnerWindowID)
|
|
|
|
, mOuterWindowID(rhs.mOuterWindowID)
|
|
|
|
, mParentOuterWindowID(rhs.mParentOuterWindowID)
|
2015-10-31 15:20:48 -07:00
|
|
|
, mEnforceSecurity(rhs.mEnforceSecurity)
|
|
|
|
, mInitialSecurityCheckDone(rhs.mInitialSecurityCheckDone)
|
|
|
|
, mOriginAttributes(rhs.mOriginAttributes)
|
|
|
|
, mRedirectChainIncludingInternalRedirects(
|
|
|
|
rhs.mRedirectChainIncludingInternalRedirects)
|
|
|
|
, mRedirectChain(rhs.mRedirectChain)
|
2015-09-24 13:42:02 -07:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2015-01-07 15:51:20 -08:00
|
|
|
LoadInfo::LoadInfo(nsIPrincipal* aLoadingPrincipal,
|
|
|
|
nsIPrincipal* aTriggeringPrincipal,
|
|
|
|
nsSecurityFlags aSecurityFlags,
|
|
|
|
nsContentPolicyType aContentPolicyType,
|
2015-07-10 13:57:55 -07:00
|
|
|
bool aUpgradeInsecureRequests,
|
2015-05-08 12:52:49 -07:00
|
|
|
uint64_t aInnerWindowID,
|
|
|
|
uint64_t aOuterWindowID,
|
2015-07-19 19:11:03 -07:00
|
|
|
uint64_t aParentOuterWindowID,
|
2015-07-19 19:11:57 -07:00
|
|
|
bool aEnforceSecurity,
|
|
|
|
bool aInitialSecurityCheckDone,
|
2015-10-21 14:47:00 -07:00
|
|
|
const OriginAttributes& aOriginAttributes,
|
2015-10-31 15:18:59 -07:00
|
|
|
nsTArray<nsCOMPtr<nsIPrincipal>>& aRedirectChainIncludingInternalRedirects,
|
2015-07-19 19:11:03 -07:00
|
|
|
nsTArray<nsCOMPtr<nsIPrincipal>>& aRedirectChain)
|
2015-01-07 15:51:20 -08:00
|
|
|
: mLoadingPrincipal(aLoadingPrincipal)
|
|
|
|
, mTriggeringPrincipal(aTriggeringPrincipal)
|
|
|
|
, mSecurityFlags(aSecurityFlags)
|
2015-10-19 11:14:54 -07:00
|
|
|
, mInternalContentPolicyType(aContentPolicyType)
|
2015-07-10 13:57:55 -07:00
|
|
|
, mUpgradeInsecureRequests(aUpgradeInsecureRequests)
|
2015-01-07 15:51:20 -08:00
|
|
|
, mInnerWindowID(aInnerWindowID)
|
2015-05-08 12:52:49 -07:00
|
|
|
, mOuterWindowID(aOuterWindowID)
|
|
|
|
, mParentOuterWindowID(aParentOuterWindowID)
|
2015-07-19 19:11:57 -07:00
|
|
|
, mEnforceSecurity(aEnforceSecurity)
|
|
|
|
, mInitialSecurityCheckDone(aInitialSecurityCheckDone)
|
2015-10-21 14:47:00 -07:00
|
|
|
, mOriginAttributes(aOriginAttributes)
|
2015-01-07 15:51:20 -08:00
|
|
|
{
|
|
|
|
MOZ_ASSERT(mLoadingPrincipal);
|
|
|
|
MOZ_ASSERT(mTriggeringPrincipal);
|
2015-07-19 19:11:03 -07:00
|
|
|
|
2015-10-31 15:18:59 -07:00
|
|
|
mRedirectChainIncludingInternalRedirects.SwapElements(
|
|
|
|
aRedirectChainIncludingInternalRedirects);
|
|
|
|
|
2015-07-19 19:11:03 -07:00
|
|
|
mRedirectChain.SwapElements(aRedirectChain);
|
2015-01-07 15:51:20 -08:00
|
|
|
}
|
|
|
|
|
2014-07-09 23:56:37 -07:00
|
|
|
LoadInfo::~LoadInfo()
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMPL_ISUPPORTS(LoadInfo, nsILoadInfo)
|
|
|
|
|
2015-09-24 13:42:02 -07:00
|
|
|
already_AddRefed<nsILoadInfo>
|
|
|
|
LoadInfo::Clone() const
|
|
|
|
{
|
2015-10-17 22:24:48 -07:00
|
|
|
RefPtr<LoadInfo> copy(new LoadInfo(*this));
|
2015-09-24 13:42:02 -07:00
|
|
|
return copy.forget();
|
|
|
|
}
|
|
|
|
|
2015-10-31 15:20:48 -07:00
|
|
|
already_AddRefed<nsILoadInfo>
|
|
|
|
LoadInfo::CloneForNewRequest() const
|
|
|
|
{
|
|
|
|
RefPtr<LoadInfo> copy(new LoadInfo(*this));
|
|
|
|
copy->mEnforceSecurity = false;
|
|
|
|
copy->mInitialSecurityCheckDone = false;
|
|
|
|
copy->mRedirectChainIncludingInternalRedirects.Clear();
|
|
|
|
copy->mRedirectChain.Clear();
|
|
|
|
return copy.forget();
|
|
|
|
}
|
|
|
|
|
2014-07-09 23:56:37 -07:00
|
|
|
NS_IMETHODIMP
|
2014-11-14 08:55:59 -08:00
|
|
|
LoadInfo::GetLoadingPrincipal(nsIPrincipal** aLoadingPrincipal)
|
2014-07-09 23:56:37 -07:00
|
|
|
{
|
2014-11-14 08:55:59 -08:00
|
|
|
NS_ADDREF(*aLoadingPrincipal = mLoadingPrincipal);
|
2014-07-09 23:56:37 -07:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsIPrincipal*
|
|
|
|
LoadInfo::LoadingPrincipal()
|
|
|
|
{
|
2014-11-14 08:55:59 -08:00
|
|
|
return mLoadingPrincipal;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::GetTriggeringPrincipal(nsIPrincipal** aTriggeringPrincipal)
|
|
|
|
{
|
|
|
|
NS_ADDREF(*aTriggeringPrincipal = mTriggeringPrincipal);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsIPrincipal*
|
|
|
|
LoadInfo::TriggeringPrincipal()
|
|
|
|
{
|
|
|
|
return mTriggeringPrincipal;
|
2014-07-09 23:56:37 -07:00
|
|
|
}
|
|
|
|
|
2014-07-16 13:16:12 -07:00
|
|
|
NS_IMETHODIMP
|
2015-02-13 11:36:37 -08:00
|
|
|
LoadInfo::GetLoadingDocument(nsIDOMDocument** aResult)
|
2014-07-16 13:16:12 -07:00
|
|
|
{
|
|
|
|
nsCOMPtr<nsINode> node = do_QueryReferent(mLoadingContext);
|
|
|
|
if (node) {
|
|
|
|
nsCOMPtr<nsIDOMDocument> context = do_QueryInterface(node->OwnerDoc());
|
2015-02-13 11:36:37 -08:00
|
|
|
context.forget(aResult);
|
2014-07-16 13:16:12 -07:00
|
|
|
}
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsINode*
|
|
|
|
LoadInfo::LoadingNode()
|
|
|
|
{
|
|
|
|
nsCOMPtr<nsINode> node = do_QueryReferent(mLoadingContext);
|
|
|
|
return node;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
2015-02-13 11:36:37 -08:00
|
|
|
LoadInfo::GetSecurityFlags(nsSecurityFlags* aResult)
|
2014-07-16 13:16:12 -07:00
|
|
|
{
|
2015-02-13 11:36:37 -08:00
|
|
|
*aResult = mSecurityFlags;
|
2014-07-16 13:16:12 -07:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-10-19 11:14:54 -07:00
|
|
|
void
|
|
|
|
LoadInfo::SetWithCredentialsSecFlag()
|
|
|
|
{
|
|
|
|
MOZ_ASSERT(!mEnforceSecurity,
|
|
|
|
"Request should not have been opened yet");
|
|
|
|
mSecurityFlags |= nsILoadInfo::SEC_REQUIRE_CORS_WITH_CREDENTIALS;
|
|
|
|
}
|
|
|
|
|
2015-07-19 19:11:57 -07:00
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::GetSecurityMode(uint32_t *aFlags)
|
|
|
|
{
|
|
|
|
*aFlags = (mSecurityFlags &
|
|
|
|
(nsILoadInfo::SEC_REQUIRE_SAME_ORIGIN_DATA_INHERITS |
|
|
|
|
nsILoadInfo::SEC_REQUIRE_SAME_ORIGIN_DATA_IS_BLOCKED |
|
|
|
|
nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_DATA_INHERITS |
|
|
|
|
nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_DATA_IS_NULL |
|
|
|
|
nsILoadInfo::SEC_REQUIRE_CORS_DATA_INHERITS));
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::GetRequireCorsWithCredentials(bool* aResult)
|
|
|
|
{
|
|
|
|
*aResult =
|
|
|
|
(mSecurityFlags & nsILoadInfo::SEC_REQUIRE_CORS_WITH_CREDENTIALS);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2014-07-09 23:56:37 -07:00
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::GetForceInheritPrincipal(bool* aInheritPrincipal)
|
|
|
|
{
|
2015-02-13 11:36:37 -08:00
|
|
|
*aInheritPrincipal =
|
|
|
|
(mSecurityFlags & nsILoadInfo::SEC_FORCE_INHERIT_PRINCIPAL);
|
2014-07-09 23:56:37 -07:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::GetLoadingSandboxed(bool* aLoadingSandboxed)
|
|
|
|
{
|
2014-07-16 13:16:12 -07:00
|
|
|
*aLoadingSandboxed = (mSecurityFlags & nsILoadInfo::SEC_SANDBOXED);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-07-19 19:11:57 -07:00
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::GetAboutBlankInherits(bool* aResult)
|
|
|
|
{
|
|
|
|
*aResult =
|
|
|
|
(mSecurityFlags & nsILoadInfo::SEC_ABOUT_BLANK_INHERITS);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-09-14 18:59:35 -07:00
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::GetAllowChrome(bool* aResult)
|
|
|
|
{
|
|
|
|
*aResult =
|
|
|
|
(mSecurityFlags & nsILoadInfo::SEC_ALLOW_CHROME);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2014-07-16 13:16:12 -07:00
|
|
|
NS_IMETHODIMP
|
2015-10-19 11:14:54 -07:00
|
|
|
LoadInfo::GetExternalContentPolicyType(nsContentPolicyType* aResult)
|
2014-07-16 13:16:12 -07:00
|
|
|
{
|
2015-10-19 11:14:54 -07:00
|
|
|
*aResult = nsContentUtils::InternalContentPolicyTypeToExternal(mInternalContentPolicyType);
|
2014-07-09 23:56:37 -07:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-06-16 21:18:16 -07:00
|
|
|
nsContentPolicyType
|
|
|
|
LoadInfo::InternalContentPolicyType()
|
|
|
|
{
|
2015-10-19 11:14:54 -07:00
|
|
|
return mInternalContentPolicyType;
|
2015-06-16 21:18:16 -07:00
|
|
|
}
|
|
|
|
|
2015-07-10 13:57:55 -07:00
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::GetUpgradeInsecureRequests(bool* aResult)
|
|
|
|
{
|
|
|
|
*aResult = mUpgradeInsecureRequests;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-01-07 15:51:20 -08:00
|
|
|
NS_IMETHODIMP
|
2015-05-08 12:52:49 -07:00
|
|
|
LoadInfo::GetInnerWindowID(uint64_t* aResult)
|
2015-01-07 15:51:20 -08:00
|
|
|
{
|
2015-02-13 11:36:37 -08:00
|
|
|
*aResult = mInnerWindowID;
|
2015-01-07 15:51:20 -08:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-05-08 12:52:49 -07:00
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::GetOuterWindowID(uint64_t* aResult)
|
|
|
|
{
|
|
|
|
*aResult = mOuterWindowID;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::GetParentOuterWindowID(uint64_t* aResult)
|
|
|
|
{
|
|
|
|
*aResult = mParentOuterWindowID;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-10-21 14:47:00 -07:00
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::GetScriptableOriginAttributes(JSContext* aCx,
|
|
|
|
JS::MutableHandle<JS::Value> aOriginAttributes)
|
|
|
|
{
|
|
|
|
if (NS_WARN_IF(!ToJSValue(aCx, mOriginAttributes, aOriginAttributes))) {
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::SetScriptableOriginAttributes(JSContext* aCx,
|
|
|
|
JS::Handle<JS::Value> aOriginAttributes)
|
|
|
|
{
|
|
|
|
OriginAttributes attrs;
|
|
|
|
if (!aOriginAttributes.isObject() || !attrs.Init(aCx, aOriginAttributes)) {
|
|
|
|
return NS_ERROR_INVALID_ARG;
|
|
|
|
}
|
|
|
|
|
|
|
|
mOriginAttributes = attrs;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
LoadInfo::GetOriginAttributes(mozilla::OriginAttributes* aOriginAttributes)
|
|
|
|
{
|
|
|
|
NS_ENSURE_ARG(aOriginAttributes);
|
|
|
|
*aOriginAttributes = mOriginAttributes;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult
|
|
|
|
LoadInfo::SetOriginAttributes(const mozilla::OriginAttributes& aOriginAttributes)
|
|
|
|
{
|
|
|
|
mOriginAttributes = aOriginAttributes;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-07-19 19:11:57 -07:00
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::SetEnforceSecurity(bool aEnforceSecurity)
|
|
|
|
{
|
|
|
|
// Indicates whether the channel was openend using AsyncOpen2. Once set
|
|
|
|
// to true, it must remain true throughout the lifetime of the channel.
|
|
|
|
// Setting it to anything else than true will be discarded.
|
|
|
|
MOZ_ASSERT(aEnforceSecurity, "aEnforceSecurity must be true");
|
|
|
|
mEnforceSecurity = mEnforceSecurity || aEnforceSecurity;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::GetEnforceSecurity(bool* aResult)
|
|
|
|
{
|
|
|
|
*aResult = mEnforceSecurity;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::SetInitialSecurityCheckDone(bool aInitialSecurityCheckDone)
|
|
|
|
{
|
|
|
|
// Indicates whether the channel was ever evaluated by the
|
|
|
|
// ContentSecurityManager. Once set to true, this flag must
|
|
|
|
// remain true throughout the lifetime of the channel.
|
|
|
|
// Setting it to anything else than true will be discarded.
|
|
|
|
MOZ_ASSERT(aInitialSecurityCheckDone, "aInitialSecurityCheckDone must be true");
|
|
|
|
mInitialSecurityCheckDone = mInitialSecurityCheckDone || aInitialSecurityCheckDone;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::GetInitialSecurityCheckDone(bool* aResult)
|
|
|
|
{
|
|
|
|
*aResult = mInitialSecurityCheckDone;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-07-19 19:11:03 -07:00
|
|
|
NS_IMETHODIMP
|
2015-10-31 15:18:59 -07:00
|
|
|
LoadInfo::AppendRedirectedPrincipal(nsIPrincipal* aPrincipal, bool aIsInternalRedirect)
|
2015-07-19 19:11:03 -07:00
|
|
|
{
|
|
|
|
NS_ENSURE_ARG(aPrincipal);
|
2015-10-31 15:22:01 -07:00
|
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
|
2015-10-31 15:18:59 -07:00
|
|
|
mRedirectChainIncludingInternalRedirects.AppendElement(aPrincipal);
|
|
|
|
if (!aIsInternalRedirect) {
|
|
|
|
mRedirectChain.AppendElement(aPrincipal);
|
|
|
|
}
|
2015-07-19 19:11:03 -07:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2015-10-31 15:18:59 -07:00
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::GetRedirectChainIncludingInternalRedirects(JSContext* aCx, JS::MutableHandle<JS::Value> aChain)
|
|
|
|
{
|
|
|
|
if (!ToJSValue(aCx, mRedirectChainIncludingInternalRedirects, aChain)) {
|
|
|
|
return NS_ERROR_OUT_OF_MEMORY;
|
|
|
|
}
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
const nsTArray<nsCOMPtr<nsIPrincipal>>&
|
|
|
|
LoadInfo::RedirectChainIncludingInternalRedirects()
|
|
|
|
{
|
|
|
|
return mRedirectChainIncludingInternalRedirects;
|
|
|
|
}
|
|
|
|
|
2015-07-19 19:11:03 -07:00
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::GetRedirectChain(JSContext* aCx, JS::MutableHandle<JS::Value> aChain)
|
|
|
|
{
|
|
|
|
if (!ToJSValue(aCx, mRedirectChain, aChain)) {
|
|
|
|
return NS_ERROR_OUT_OF_MEMORY;
|
|
|
|
}
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
const nsTArray<nsCOMPtr<nsIPrincipal>>&
|
|
|
|
LoadInfo::RedirectChain()
|
|
|
|
{
|
|
|
|
return mRedirectChain;
|
|
|
|
}
|
|
|
|
|
2015-10-22 11:07:32 -07:00
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::GetTainting(uint32_t* aTaintingOut)
|
|
|
|
{
|
|
|
|
MOZ_ASSERT(aTaintingOut);
|
|
|
|
*aTaintingOut = static_cast<uint32_t>(mTainting);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
LoadInfo::MaybeIncreaseTainting(uint32_t aTainting)
|
|
|
|
{
|
|
|
|
NS_ENSURE_ARG(aTainting <= TAINTING_OPAQUE);
|
|
|
|
LoadTainting tainting = static_cast<LoadTainting>(aTainting);
|
|
|
|
if (tainting > mTainting) {
|
|
|
|
mTainting = tainting;
|
|
|
|
}
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2014-07-09 23:56:37 -07:00
|
|
|
} // namespace mozilla
|