mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
Bug 768029 - Apply CSP Policy to trusted and certified apps. Temporarily using a overly permissive policy for certified apps until Gaia is updated to handle the desired policy. r=sicking Parts by sicking, r=mounir
This commit is contained in:
parent
45c2bff831
commit
59b413b8c8
@ -354,6 +354,10 @@ pref("browser.dom.window.dump.enabled", false);
|
|||||||
// installable apps or wifi support.
|
// installable apps or wifi support.
|
||||||
pref("security.fileuri.strict_origin_policy", false);
|
pref("security.fileuri.strict_origin_policy", false);
|
||||||
|
|
||||||
|
// Default Content Security Policy to apply to privileged and certified apps
|
||||||
|
pref("security.apps.privileged.CSP.default", "default-src *; script-src 'self'; object-src 'none'; style-src 'self' 'unsafe-inline'");
|
||||||
|
pref("security.apps.certified.CSP.default", "options inline-script eval-script; default-src *; script-src 'self'; object-src 'none'; style-src 'self'");
|
||||||
|
|
||||||
// Temporarily force-enable GL compositing. This is default-disabled
|
// Temporarily force-enable GL compositing. This is default-disabled
|
||||||
// deep within the bowels of the widgetry system. Remove me when GL
|
// deep within the bowels of the widgetry system. Remove me when GL
|
||||||
// compositing isn't default disabled in widget/android.
|
// compositing isn't default disabled in widget/android.
|
||||||
|
@ -29,6 +29,12 @@ _DEFAULT_HTTP_PORT = 8888
|
|||||||
_DEFAULT_SSL_PORT = 4443
|
_DEFAULT_SSL_PORT = 4443
|
||||||
_DEFAULT_WEBSOCKET_PORT = 9988
|
_DEFAULT_WEBSOCKET_PORT = 9988
|
||||||
|
|
||||||
|
# from nsIPrincipal.idl
|
||||||
|
_APP_STATUS_NOT_INSTALLED = 0
|
||||||
|
_APP_STATUS_INSTALLED = 1
|
||||||
|
_APP_STATUS_PRIVILEGED = 2
|
||||||
|
_APP_STATUS_CERTIFIED = 3
|
||||||
|
|
||||||
#expand _DIST_BIN = __XPC_BIN_PATH__
|
#expand _DIST_BIN = __XPC_BIN_PATH__
|
||||||
#expand _IS_WIN32 = len("__WIN32__") != 0
|
#expand _IS_WIN32 = len("__WIN32__") != 0
|
||||||
#expand _IS_MAC = __IS_MAC__ != 0
|
#expand _IS_MAC = __IS_MAC__ != 0
|
||||||
@ -297,7 +303,8 @@ class Automation(object):
|
|||||||
"receipt": null,
|
"receipt": null,
|
||||||
"installTime": 132333986000,
|
"installTime": 132333986000,
|
||||||
"manifestURL": "$manifestURL",
|
"manifestURL": "$manifestURL",
|
||||||
"localId": $localId
|
"localId": $localId,
|
||||||
|
"appStatus": $appStatus
|
||||||
}""")
|
}""")
|
||||||
|
|
||||||
manifestTemplate = Template("""{
|
manifestTemplate = Template("""{
|
||||||
@ -520,31 +527,50 @@ user_pref("camino.use_system_proxy_settings", false); // Camino-only, harmless t
|
|||||||
'name': 'http_example_org',
|
'name': 'http_example_org',
|
||||||
'origin': 'http://example.org',
|
'origin': 'http://example.org',
|
||||||
'manifestURL': 'http://example.org/manifest.webapp',
|
'manifestURL': 'http://example.org/manifest.webapp',
|
||||||
'description': 'http://example.org App'
|
'description': 'http://example.org App',
|
||||||
|
'appStatus': _APP_STATUS_INSTALLED
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
'name': 'https_example_com',
|
'name': 'https_example_com',
|
||||||
'origin': 'https://example.com',
|
'origin': 'https://example.com',
|
||||||
'manifestURL': 'https://example.com/manifest.webapp',
|
'manifestURL': 'https://example.com/manifest.webapp',
|
||||||
'description': 'https://example.com App'
|
'description': 'https://example.com App',
|
||||||
|
'appStatus': _APP_STATUS_INSTALLED
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
'name': 'http_test1_example_org',
|
'name': 'http_test1_example_org',
|
||||||
'origin': 'http://test1.example.org',
|
'origin': 'http://test1.example.org',
|
||||||
'manifestURL': 'http://test1.example.org/manifest.webapp',
|
'manifestURL': 'http://test1.example.org/manifest.webapp',
|
||||||
'description': 'http://test1.example.org App'
|
'description': 'http://test1.example.org App',
|
||||||
|
'appStatus': _APP_STATUS_INSTALLED
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
'name': 'http_test1_example_org_8000',
|
'name': 'http_test1_example_org_8000',
|
||||||
'origin': 'http://test1.example.org:8000',
|
'origin': 'http://test1.example.org:8000',
|
||||||
'manifestURL': 'http://test1.example.org:8000/manifest.webapp',
|
'manifestURL': 'http://test1.example.org:8000/manifest.webapp',
|
||||||
'description': 'http://test1.example.org:8000 App'
|
'description': 'http://test1.example.org:8000 App',
|
||||||
|
'appStatus': _APP_STATUS_INSTALLED
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
'name': 'http_sub1_test1_example_org',
|
'name': 'http_sub1_test1_example_org',
|
||||||
'origin': 'http://sub1.test1.example.org',
|
'origin': 'http://sub1.test1.example.org',
|
||||||
'manifestURL': 'http://sub1.test1.example.org/manifest.webapp',
|
'manifestURL': 'http://sub1.test1.example.org/manifest.webapp',
|
||||||
'description': 'http://sub1.test1.example.org App'
|
'description': 'http://sub1.test1.example.org App',
|
||||||
|
'appStatus': _APP_STATUS_INSTALLED
|
||||||
|
},
|
||||||
|
{
|
||||||
|
'name': 'https_example_com_privileged',
|
||||||
|
'origin': 'https://example.com',
|
||||||
|
'manifestURL': 'https://example.com/manifest_priv.webapp',
|
||||||
|
'description': 'https://example.com Privileged App',
|
||||||
|
'appStatus': _APP_STATUS_PRIVILEGED
|
||||||
|
},
|
||||||
|
{
|
||||||
|
'name': 'https_example_com_certified',
|
||||||
|
'origin': 'https://example.com',
|
||||||
|
'manifestURL': 'https://example.com/manifest_cert.webapp',
|
||||||
|
'description': 'https://example.com Certified App',
|
||||||
|
'appStatus': _APP_STATUS_CERTIFIED
|
||||||
},
|
},
|
||||||
];
|
];
|
||||||
self.setupTestApps(profileDir, apps)
|
self.setupTestApps(profileDir, apps)
|
||||||
|
@ -21,7 +21,7 @@ interface nsIContentSecurityPolicy;
|
|||||||
[ptr] native JSPrincipals(JSPrincipals);
|
[ptr] native JSPrincipals(JSPrincipals);
|
||||||
[ptr] native PrincipalArray(nsTArray<nsCOMPtr<nsIPrincipal> >);
|
[ptr] native PrincipalArray(nsTArray<nsCOMPtr<nsIPrincipal> >);
|
||||||
|
|
||||||
[scriptable, uuid(825ffce8-962d-11e1-aef3-8f2b6188709b)]
|
[scriptable, uuid(115d1081-373e-4837-8d12-d0f4874f3467)]
|
||||||
interface nsIPrincipal : nsISerializable
|
interface nsIPrincipal : nsISerializable
|
||||||
{
|
{
|
||||||
/**
|
/**
|
||||||
@ -273,6 +273,13 @@ interface nsIPrincipal : nsISerializable
|
|||||||
* Returns true iif the principal is inside a browser element.
|
* Returns true iif the principal is inside a browser element.
|
||||||
*/
|
*/
|
||||||
readonly attribute boolean isInBrowserElement;
|
readonly attribute boolean isInBrowserElement;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns true if this principal has an unknown appId. This shouldn't
|
||||||
|
* generally be used. We only expose it due to not providing the correct
|
||||||
|
* appId everywhere where we construct principals.
|
||||||
|
*/
|
||||||
|
readonly attribute boolean unknownAppId;
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -131,6 +131,7 @@ public:
|
|||||||
NS_IMETHOD GetAppStatus(uint16_t* aAppStatus);
|
NS_IMETHOD GetAppStatus(uint16_t* aAppStatus);
|
||||||
NS_IMETHOD GetAppId(uint32_t* aAppStatus);
|
NS_IMETHOD GetAppId(uint32_t* aAppStatus);
|
||||||
NS_IMETHOD GetIsInBrowserElement(bool* aIsInBrowserElement);
|
NS_IMETHOD GetIsInBrowserElement(bool* aIsInBrowserElement);
|
||||||
|
NS_IMETHOD GetUnknownAppId(bool* aUnknownAppId);
|
||||||
#ifdef DEBUG
|
#ifdef DEBUG
|
||||||
virtual void dumpImpl();
|
virtual void dumpImpl();
|
||||||
#endif
|
#endif
|
||||||
@ -227,6 +228,7 @@ public:
|
|||||||
NS_IMETHOD GetAppStatus(uint16_t* aAppStatus);
|
NS_IMETHOD GetAppStatus(uint16_t* aAppStatus);
|
||||||
NS_IMETHOD GetAppId(uint32_t* aAppStatus);
|
NS_IMETHOD GetAppId(uint32_t* aAppStatus);
|
||||||
NS_IMETHOD GetIsInBrowserElement(bool* aIsInBrowserElement);
|
NS_IMETHOD GetIsInBrowserElement(bool* aIsInBrowserElement);
|
||||||
|
NS_IMETHOD GetUnknownAppId(bool* aUnknownAppId);
|
||||||
#ifdef DEBUG
|
#ifdef DEBUG
|
||||||
virtual void dumpImpl();
|
virtual void dumpImpl();
|
||||||
#endif
|
#endif
|
||||||
|
@ -360,6 +360,13 @@ nsNullPrincipal::GetIsInBrowserElement(bool* aIsInBrowserElement)
|
|||||||
return NS_OK;
|
return NS_OK;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
NS_IMETHODIMP
|
||||||
|
nsNullPrincipal::GetUnknownAppId(bool* aUnknownAppId)
|
||||||
|
{
|
||||||
|
*aUnknownAppId = false;
|
||||||
|
return NS_OK;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* nsISerializable implementation
|
* nsISerializable implementation
|
||||||
*/
|
*/
|
||||||
|
@ -1111,6 +1111,13 @@ nsPrincipal::GetIsInBrowserElement(bool* aIsInBrowserElement)
|
|||||||
return NS_OK;
|
return NS_OK;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
NS_IMETHODIMP
|
||||||
|
nsPrincipal::GetUnknownAppId(bool* aUnknownAppId)
|
||||||
|
{
|
||||||
|
*aUnknownAppId = mAppId == nsIScriptSecurityManager::UNKNOWN_APP_ID;
|
||||||
|
return NS_OK;
|
||||||
|
}
|
||||||
|
|
||||||
NS_IMETHODIMP
|
NS_IMETHODIMP
|
||||||
nsPrincipal::Read(nsIObjectInputStream* aStream)
|
nsPrincipal::Read(nsIObjectInputStream* aStream)
|
||||||
{
|
{
|
||||||
@ -1535,6 +1542,13 @@ nsExpandedPrincipal::GetIsInBrowserElement(bool* aIsInBrowserElement)
|
|||||||
return NS_ERROR_NOT_AVAILABLE;
|
return NS_ERROR_NOT_AVAILABLE;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
NS_IMETHODIMP
|
||||||
|
nsExpandedPrincipal::GetUnknownAppId(bool* aUnknownAppId)
|
||||||
|
{
|
||||||
|
*aUnknownAppId = false;
|
||||||
|
return NS_OK;
|
||||||
|
}
|
||||||
|
|
||||||
void
|
void
|
||||||
nsExpandedPrincipal::GetScriptLocation(nsACString& aStr)
|
nsExpandedPrincipal::GetScriptLocation(nsACString& aStr)
|
||||||
{
|
{
|
||||||
|
@ -265,6 +265,13 @@ nsSystemPrincipal::GetIsInBrowserElement(bool* aIsInBrowserElement)
|
|||||||
return NS_OK;
|
return NS_OK;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
NS_IMETHODIMP
|
||||||
|
nsSystemPrincipal::GetUnknownAppId(bool* aUnknownAppId)
|
||||||
|
{
|
||||||
|
*aUnknownAppId = false;
|
||||||
|
return NS_OK;
|
||||||
|
}
|
||||||
|
|
||||||
//////////////////////////////////////////
|
//////////////////////////////////////////
|
||||||
// Methods implementing nsISerializable //
|
// Methods implementing nsISerializable //
|
||||||
//////////////////////////////////////////
|
//////////////////////////////////////////
|
||||||
|
@ -2394,9 +2394,6 @@ nsDocument::StartDocumentLoad(const char* aCommand, nsIChannel* aChannel,
|
|||||||
mMayStartLayout = false;
|
mMayStartLayout = false;
|
||||||
|
|
||||||
mHaveInputEncoding = true;
|
mHaveInputEncoding = true;
|
||||||
nsCOMPtr<nsIContentSecurityPolicy> csp;
|
|
||||||
nsresult rv = InitCSP(aChannel, getter_AddRefs(csp));
|
|
||||||
NS_ENSURE_SUCCESS(rv, rv);
|
|
||||||
|
|
||||||
if (aReset) {
|
if (aReset) {
|
||||||
Reset(aChannel, aLoadGroup);
|
Reset(aChannel, aLoadGroup);
|
||||||
@ -2426,30 +2423,27 @@ nsDocument::StartDocumentLoad(const char* aCommand, nsIChannel* aChannel,
|
|||||||
NS_ENSURE_SUCCESS(rv, rv);
|
NS_ENSURE_SUCCESS(rv, rv);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (csp) {
|
nsresult rv = InitCSP(aChannel);
|
||||||
// Copy into principal
|
NS_ENSURE_SUCCESS(rv, rv);
|
||||||
nsIPrincipal* principal = GetPrincipal();
|
|
||||||
principal->SetCsp(csp);
|
|
||||||
#ifdef PR_LOGGING
|
|
||||||
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
|
|
||||||
("Inserted CSP into principal %p", principal));
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
|
|
||||||
return NS_OK;
|
return NS_OK;
|
||||||
}
|
}
|
||||||
|
|
||||||
nsresult
|
nsresult
|
||||||
nsDocument::InitCSP(nsIChannel* aChannel, nsIContentSecurityPolicy **aCSP)
|
nsDocument::InitCSP(nsIChannel* aChannel)
|
||||||
{
|
{
|
||||||
*aCSP = nullptr;
|
nsCOMPtr<nsIContentSecurityPolicy> csp;
|
||||||
if (CSPService::sCSPEnabled) {
|
if (!CSPService::sCSPEnabled) {
|
||||||
nsAutoCString tCspHeaderValue, tCspROHeaderValue;
|
#ifdef PR_LOGGING
|
||||||
nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(aChannel);
|
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
|
||||||
if (!httpChannel) {
|
("CSP is disabled, skipping CSP init for document %p", this));
|
||||||
// no CSP for non http channels
|
#endif
|
||||||
return NS_OK;
|
return NS_OK;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
nsAutoCString tCspHeaderValue, tCspROHeaderValue;
|
||||||
|
nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(aChannel);
|
||||||
|
if (httpChannel) {
|
||||||
httpChannel->GetResponseHeader(
|
httpChannel->GetResponseHeader(
|
||||||
NS_LITERAL_CSTRING("x-content-security-policy"),
|
NS_LITERAL_CSTRING("x-content-security-policy"),
|
||||||
tCspHeaderValue);
|
tCspHeaderValue);
|
||||||
@ -2457,45 +2451,115 @@ nsDocument::InitCSP(nsIChannel* aChannel, nsIContentSecurityPolicy **aCSP)
|
|||||||
httpChannel->GetResponseHeader(
|
httpChannel->GetResponseHeader(
|
||||||
NS_LITERAL_CSTRING("x-content-security-policy-report-only"),
|
NS_LITERAL_CSTRING("x-content-security-policy-report-only"),
|
||||||
tCspROHeaderValue);
|
tCspROHeaderValue);
|
||||||
NS_ConvertASCIItoUTF16 cspHeaderValue(tCspHeaderValue);
|
}
|
||||||
NS_ConvertASCIItoUTF16 cspROHeaderValue(tCspROHeaderValue);
|
NS_ConvertASCIItoUTF16 cspHeaderValue(tCspHeaderValue);
|
||||||
|
NS_ConvertASCIItoUTF16 cspROHeaderValue(tCspROHeaderValue);
|
||||||
if (cspHeaderValue.IsEmpty() && cspROHeaderValue.IsEmpty()) {
|
|
||||||
// no CSP header present, stop processing
|
|
||||||
return NS_OK;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
// ----- Figure out if we need to apply an app default CSP
|
||||||
|
bool applyAppDefaultCSP = false;
|
||||||
|
nsIPrincipal* principal = NodePrincipal();
|
||||||
|
PRUint16 appStatus = nsIPrincipal::APP_STATUS_NOT_INSTALLED;
|
||||||
|
bool unknownAppId;
|
||||||
|
if (NS_SUCCEEDED(principal->GetUnknownAppId(&unknownAppId)) &&
|
||||||
|
!unknownAppId &&
|
||||||
|
NS_SUCCEEDED(principal->GetAppStatus(&appStatus))) {
|
||||||
|
applyAppDefaultCSP = ( appStatus == nsIPrincipal::APP_STATUS_PRIVILEGED ||
|
||||||
|
appStatus == nsIPrincipal::APP_STATUS_CERTIFIED);
|
||||||
|
}
|
||||||
#ifdef PR_LOGGING
|
#ifdef PR_LOGGING
|
||||||
PR_LOG(gCspPRLog, PR_LOG_DEBUG, ("CSP header specified for document %p", this));
|
else
|
||||||
|
PR_LOG(gCspPRLog, PR_LOG_DEBUG, ("Failed to get app status from principal"));
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
nsresult rv;
|
// If there's no CSP to apply go ahead and return early
|
||||||
nsCOMPtr<nsIContentSecurityPolicy> csp;
|
if (!applyAppDefaultCSP &&
|
||||||
csp = do_CreateInstance("@mozilla.org/contentsecuritypolicy;1", &rv);
|
cspHeaderValue.IsEmpty() &&
|
||||||
|
cspROHeaderValue.IsEmpty()) {
|
||||||
if (NS_FAILED(rv)) {
|
|
||||||
#ifdef PR_LOGGING
|
#ifdef PR_LOGGING
|
||||||
PR_LOG(gCspPRLog, PR_LOG_DEBUG, ("Failed to create CSP object: %x", rv));
|
|
||||||
#endif
|
|
||||||
return rv;
|
|
||||||
}
|
|
||||||
|
|
||||||
// Store the request context for violation reports
|
|
||||||
csp->ScanRequestData(httpChannel);
|
|
||||||
|
|
||||||
// Start parsing the policy
|
|
||||||
nsCOMPtr<nsIURI> chanURI;
|
nsCOMPtr<nsIURI> chanURI;
|
||||||
aChannel->GetURI(getter_AddRefs(chanURI));
|
aChannel->GetURI(getter_AddRefs(chanURI));
|
||||||
|
nsAutoCString aspec;
|
||||||
|
chanURI->GetAsciiSpec(aspec);
|
||||||
|
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
|
||||||
|
("no CSP for document, %s, %s",
|
||||||
|
aspec.get(),
|
||||||
|
applyAppDefaultCSP ? "is app" : "not an app"));
|
||||||
|
#endif
|
||||||
|
return NS_OK;
|
||||||
|
}
|
||||||
|
|
||||||
#ifdef PR_LOGGING
|
#ifdef PR_LOGGING
|
||||||
PR_LOG(gCspPRLog, PR_LOG_DEBUG, ("CSP Loaded"));
|
PR_LOG(gCspPRLog, PR_LOG_DEBUG, ("Document is an app or CSP header specified %p", this));
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
// ReportOnly mode is enabled *only* if there are no regular-strength CSP
|
nsresult rv;
|
||||||
// headers present. If there are, then we ignore the ReportOnly mode and
|
csp = do_CreateInstance("@mozilla.org/contentsecuritypolicy;1", &rv);
|
||||||
// toss a warning into the error console, proceeding with enforcing the
|
|
||||||
// regular-strength CSP.
|
if (NS_FAILED(rv)) {
|
||||||
if (cspHeaderValue.IsEmpty()) {
|
#ifdef PR_LOGGING
|
||||||
|
PR_LOG(gCspPRLog, PR_LOG_DEBUG, ("Failed to create CSP object: %x", rv));
|
||||||
|
#endif
|
||||||
|
return rv;
|
||||||
|
}
|
||||||
|
|
||||||
|
// used as a "self" identifier for the CSP.
|
||||||
|
nsCOMPtr<nsIURI> chanURI;
|
||||||
|
aChannel->GetURI(getter_AddRefs(chanURI));
|
||||||
|
|
||||||
|
// Store the request context for violation reports
|
||||||
|
csp->ScanRequestData(httpChannel);
|
||||||
|
|
||||||
|
// ----- process the app default policy, if necessary
|
||||||
|
if (applyAppDefaultCSP) {
|
||||||
|
nsAdoptingString appCSP;
|
||||||
|
if (appStatus == nsIPrincipal::APP_STATUS_PRIVILEGED) {
|
||||||
|
appCSP = Preferences::GetString("security.apps.privileged.CSP.default");
|
||||||
|
NS_ASSERTION(appCSP, "App, but no default CSP in security.apps.privileged.CSP.default");
|
||||||
|
} else if (appStatus == nsIPrincipal::APP_STATUS_CERTIFIED) {
|
||||||
|
appCSP = Preferences::GetString("security.apps.certified.CSP.default");
|
||||||
|
NS_ASSERTION(appCSP, "App, but no default CSP in security.apps.certified.CSP.default");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (appCSP)
|
||||||
|
csp->RefinePolicy(appCSP, chanURI);
|
||||||
|
}
|
||||||
|
|
||||||
|
// ----- if there's a full-strength CSP header, apply it.
|
||||||
|
if (!cspHeaderValue.IsEmpty()) {
|
||||||
|
// Need to tokenize the header value since multiple headers could be
|
||||||
|
// concatenated into one comma-separated list of policies.
|
||||||
|
// See RFC2616 section 4.2 (last paragraph)
|
||||||
|
nsCharSeparatedTokenizer tokenizer(cspHeaderValue, ',');
|
||||||
|
while (tokenizer.hasMoreTokens()) {
|
||||||
|
const nsSubstring& policy = tokenizer.nextToken();
|
||||||
|
csp->RefinePolicy(policy, chanURI);
|
||||||
|
#ifdef PR_LOGGING
|
||||||
|
{
|
||||||
|
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
|
||||||
|
("CSP refined with policy: \"%s\"",
|
||||||
|
NS_ConvertUTF16toUTF8(policy).get()));
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ----- if there's a report-only CSP header, apply it
|
||||||
|
if (!cspROHeaderValue.IsEmpty()) {
|
||||||
|
// post a warning and skip report-only CSP when both read only and regular
|
||||||
|
// CSP policies are present since CSP only allows one policy and it can't
|
||||||
|
// be partially report-only.
|
||||||
|
if (applyAppDefaultCSP || !cspHeaderValue.IsEmpty()) {
|
||||||
|
nsContentUtils::ReportToConsole(nsIScriptError::warningFlag,
|
||||||
|
"CSP", this,
|
||||||
|
nsContentUtils::eDOM_PROPERTIES,
|
||||||
|
"ReportOnlyCSPIgnored");
|
||||||
|
#ifdef PR_LOGGING
|
||||||
|
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
|
||||||
|
("Skipped report-only CSP init for document %p because another, enforced policy is set", this));
|
||||||
|
#endif
|
||||||
|
} else {
|
||||||
|
// we can apply the report-only policy because there's no other CSP
|
||||||
|
// applied.
|
||||||
csp->SetReportOnlyMode(true);
|
csp->SetReportOnlyMode(true);
|
||||||
|
|
||||||
// Need to tokenize the header value since multiple headers could be
|
// Need to tokenize the header value since multiple headers could be
|
||||||
@ -2508,58 +2572,43 @@ nsDocument::InitCSP(nsIChannel* aChannel, nsIContentSecurityPolicy **aCSP)
|
|||||||
#ifdef PR_LOGGING
|
#ifdef PR_LOGGING
|
||||||
{
|
{
|
||||||
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
|
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
|
||||||
("CSP (report only) refined with policy: \"%s\"",
|
("CSP (report-only) refined with policy: \"%s\"",
|
||||||
NS_ConvertUTF16toUTF8(policy).get()));
|
NS_ConvertUTF16toUTF8(policy).get()));
|
||||||
}
|
}
|
||||||
#endif
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
//XXX(sstamm): maybe we should post a warning when both read only and regular
|
|
||||||
// CSP headers are present.
|
|
||||||
|
|
||||||
// Need to tokenize the header value since multiple headers could be
|
|
||||||
// concatenated into one comma-separated list of policies.
|
|
||||||
// See RFC2616 section 4.2 (last paragraph)
|
|
||||||
nsCharSeparatedTokenizer tokenizer(cspHeaderValue, ',');
|
|
||||||
while (tokenizer.hasMoreTokens()) {
|
|
||||||
const nsSubstring& policy = tokenizer.nextToken();
|
|
||||||
csp->RefinePolicy(policy, chanURI);
|
|
||||||
#ifdef PR_LOGGING
|
|
||||||
{
|
|
||||||
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
|
|
||||||
("CSP refined with policy: \"%s\"",
|
|
||||||
NS_ConvertUTF16toUTF8(policy).get()));
|
|
||||||
}
|
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check for frame-ancestor violation
|
|
||||||
nsCOMPtr<nsIDocShell> docShell = do_QueryReferent(mDocumentContainer);
|
|
||||||
if (docShell) {
|
|
||||||
bool safeAncestry = false;
|
|
||||||
|
|
||||||
// PermitsAncestry sends violation reports when necessary
|
|
||||||
rv = csp->PermitsAncestry(docShell, &safeAncestry);
|
|
||||||
NS_ENSURE_SUCCESS(rv, rv);
|
|
||||||
|
|
||||||
if (!safeAncestry) {
|
|
||||||
#ifdef PR_LOGGING
|
|
||||||
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
|
|
||||||
("CSP doesn't like frame's ancestry, not loading."));
|
|
||||||
#endif
|
|
||||||
// stop! ERROR page!
|
|
||||||
aChannel->Cancel(NS_ERROR_CSP_FRAME_ANCESTOR_VIOLATION);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
csp.forget(aCSP);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ----- Enforce frame-ancestor policy on any applied policies
|
||||||
|
nsCOMPtr<nsIDocShell> docShell = do_QueryReferent(mDocumentContainer);
|
||||||
|
if (docShell) {
|
||||||
|
bool safeAncestry = false;
|
||||||
|
|
||||||
|
// PermitsAncestry sends violation reports when necessary
|
||||||
|
rv = csp->PermitsAncestry(docShell, &safeAncestry);
|
||||||
|
NS_ENSURE_SUCCESS(rv, rv);
|
||||||
|
|
||||||
|
if (!safeAncestry) {
|
||||||
|
#ifdef PR_LOGGING
|
||||||
|
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
|
||||||
|
("CSP doesn't like frame's ancestry, not loading."));
|
||||||
|
#endif
|
||||||
|
// stop! ERROR page!
|
||||||
|
aChannel->Cancel(NS_ERROR_CSP_FRAME_ANCESTOR_VIOLATION);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (csp) {
|
||||||
|
// Copy into principal
|
||||||
|
nsIPrincipal* principal = GetPrincipal();
|
||||||
|
principal->SetCsp(csp);
|
||||||
#ifdef PR_LOGGING
|
#ifdef PR_LOGGING
|
||||||
else { //CSP was not enabled!
|
|
||||||
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
|
PR_LOG(gCspPRLog, PR_LOG_DEBUG,
|
||||||
("CSP is disabled, skipping CSP init for document %p", this));
|
("Inserted CSP into principal %p", principal));
|
||||||
}
|
|
||||||
#endif
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
return NS_OK;
|
return NS_OK;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1274,7 +1274,7 @@ private:
|
|||||||
void DoUnblockOnload();
|
void DoUnblockOnload();
|
||||||
|
|
||||||
nsresult CheckFrameOptions();
|
nsresult CheckFrameOptions();
|
||||||
nsresult InitCSP(nsIChannel* aChannel, nsIContentSecurityPolicy **aCSP);
|
nsresult InitCSP(nsIChannel* aChannel);
|
||||||
|
|
||||||
// Sets aElement to be the pending pointer lock element. Once this document's
|
// Sets aElement to be the pending pointer lock element. Once this document's
|
||||||
// node principal's URI is granted the "fullscreen" permission, the pointer
|
// node principal's URI is granted the "fullscreen" permission, the pointer
|
||||||
|
@ -367,6 +367,8 @@ MOCHITEST_FILES_B = \
|
|||||||
file_CSP_evalscript_main.html \
|
file_CSP_evalscript_main.html \
|
||||||
file_CSP_evalscript_main.html^headers^ \
|
file_CSP_evalscript_main.html^headers^ \
|
||||||
file_CSP_evalscript_main.js \
|
file_CSP_evalscript_main.js \
|
||||||
|
file_csp_bug768029.html \
|
||||||
|
file_csp_bug768029.sjs \
|
||||||
test_bug540854.html \
|
test_bug540854.html \
|
||||||
bug540854.sjs \
|
bug540854.sjs \
|
||||||
test_bug548463.html \
|
test_bug548463.html \
|
||||||
|
@ -46,6 +46,7 @@ MOCHITEST_CHROME_FILES = \
|
|||||||
test_bug682305.html \
|
test_bug682305.html \
|
||||||
test_bug780199.xul \
|
test_bug780199.xul \
|
||||||
test_bug780529.xul \
|
test_bug780529.xul \
|
||||||
|
test_csp_bug768029.html \
|
||||||
$(NULL)
|
$(NULL)
|
||||||
|
|
||||||
include $(topsrcdir)/config/rules.mk
|
include $(topsrcdir)/config/rules.mk
|
||||||
|
221
content/base/test/chrome/test_csp_bug768029.html
Normal file
221
content/base/test/chrome/test_csp_bug768029.html
Normal file
@ -0,0 +1,221 @@
|
|||||||
|
<!DOCTYPE HTML>
|
||||||
|
<html>
|
||||||
|
<!--
|
||||||
|
https://bugzilla.mozilla.org/show_bug.cgi?id=768029
|
||||||
|
-->
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<title>Test for CSP on trusted/certified apps -- bug 768029</title>
|
||||||
|
<script type="application/javascript" src="chrome://mochikit/content/tests/SimpleTest/SimpleTest.js"></script>
|
||||||
|
<link rel="stylesheet" type="text/css" href="chrome://mochikit/content/tests/SimpleTest/test.css"/>
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
<a target="_blank" href="https://bugzilla.mozilla.org/show_bug.cgi?id=768029">Mozilla Bug 768029</a>
|
||||||
|
<p id="display"></p>
|
||||||
|
<div id="content">
|
||||||
|
|
||||||
|
</div>
|
||||||
|
<pre id="test">
|
||||||
|
<script type="application/javascript;version=1.7">
|
||||||
|
|
||||||
|
Components.utils.import("resource://gre/modules/Services.jsm");
|
||||||
|
|
||||||
|
/** Test for Bug 768029 **/
|
||||||
|
|
||||||
|
// Note: we don't have to inspect all the different operations of CSP,
|
||||||
|
// we're just looking for specific differences in behavior that indicate
|
||||||
|
// a default CSP got applied.
|
||||||
|
const DEFAULT_CSP_PRIV = "default-src *; script-src 'self'; style-src 'self' 'unsafe-inline'; object-src 'none'";
|
||||||
|
const DEFAULT_CSP_CERT = "default-src *; script-src 'self'; style-src 'self'; object-src 'none'";
|
||||||
|
|
||||||
|
SimpleTest.waitForExplicitFinish();
|
||||||
|
|
||||||
|
var gData = [
|
||||||
|
{
|
||||||
|
app: "https://example.com/manifest.webapp",
|
||||||
|
appStatus: Components.interfaces.nsIPrincipal.APP_STATUS_INSTALLED,
|
||||||
|
origin: "https://example.com",
|
||||||
|
uri: "https://example.com/tests/content/base/test/file_csp_bug768029.html",
|
||||||
|
statusString: "installed app",
|
||||||
|
expectedTestResults: {
|
||||||
|
max_tests: 7, /* number of bools below plus one for the status check */
|
||||||
|
cross_origin: { img: true, script: true, style: true },
|
||||||
|
same_origin: { img: true, script: true, style: true },
|
||||||
|
},
|
||||||
|
},
|
||||||
|
|
||||||
|
{
|
||||||
|
app: "https://example.com/manifest_priv.webapp",
|
||||||
|
appStatus: Components.interfaces.nsIPrincipal.APP_STATUS_PRIVILEGED,
|
||||||
|
origin: "https://example.com",
|
||||||
|
uri: "https://example.com/tests/content/base/test/file_csp_bug768029.html",
|
||||||
|
statusString: "privileged app",
|
||||||
|
expectedTestResults: {
|
||||||
|
max_tests: 7, /* number of bools below plus one for the status check */
|
||||||
|
cross_origin: { img: true, script: false, style: false },
|
||||||
|
same_origin: { img: true, script: true, style: true },
|
||||||
|
},
|
||||||
|
},
|
||||||
|
|
||||||
|
{
|
||||||
|
app: "https://example.com/manifest_cert.webapp",
|
||||||
|
appStatus: Components.interfaces.nsIPrincipal.APP_STATUS_CERTIFIED,
|
||||||
|
origin: "https://example.com",
|
||||||
|
uri: "https://example.com/tests/content/base/test/file_csp_bug768029.html",
|
||||||
|
statusString: "certified app",
|
||||||
|
expectedTestResults: {
|
||||||
|
max_tests: 7, /* number of bools below plus one for the status check */
|
||||||
|
cross_origin: { img: true, script: false, style: false },
|
||||||
|
same_origin: { img: true, script: true, style: true },
|
||||||
|
},
|
||||||
|
},
|
||||||
|
];
|
||||||
|
|
||||||
|
// Observer for watching allowed loads and blocked attempts
|
||||||
|
function ThingyListener(app, iframe) {
|
||||||
|
Services.obs.addObserver(this, "csp-on-violate-policy", false);
|
||||||
|
Services.obs.addObserver(this, "http-on-modify-request", false);
|
||||||
|
dump("added observers\n");
|
||||||
|
// keep track of which app ID this test is monitoring.
|
||||||
|
this._testData = app;
|
||||||
|
this._expectedResults = app.expectedTestResults;
|
||||||
|
this._resultsRecorded = { cross_origin: {}, same_origin: {}};
|
||||||
|
this._iframe = iframe;
|
||||||
|
this._countedTests = 0;
|
||||||
|
}
|
||||||
|
ThingyListener.prototype = {
|
||||||
|
|
||||||
|
observe: function(subject, topic, data) {
|
||||||
|
// make sure to only observe app-generated calls to the helper for this test.
|
||||||
|
var testpat = new RegExp("file_csp_bug768029\\.sjs");
|
||||||
|
|
||||||
|
// used to extract which kind of load this is (img, script, etc).
|
||||||
|
var typepat = new RegExp("type=([\\_a-z0-9]+)");
|
||||||
|
|
||||||
|
// used to identify whether it's cross-origin or same-origin loads
|
||||||
|
// (the applied CSP allows same-origin loads).
|
||||||
|
var originpat = new RegExp("origin=([\\_a-z0-9]+)");
|
||||||
|
|
||||||
|
if (topic === "http-on-modify-request") {
|
||||||
|
// Matching requests on this topic were allowed by the csp
|
||||||
|
var chan = subject.QueryInterface(Components.interfaces.nsIHttpChannel);
|
||||||
|
var uri = chan.URI;
|
||||||
|
// ignore irrelevent URIs
|
||||||
|
if (!testpat.test(uri.asciiSpec)) return;
|
||||||
|
|
||||||
|
var loadType = typepat.exec(uri.asciiSpec)[1];
|
||||||
|
var originType = originpat.exec(uri.asciiSpec)[1];
|
||||||
|
|
||||||
|
// skip duplicate hits to this topic (potentially document loads
|
||||||
|
// may generate duplicate loads.
|
||||||
|
if (this._resultsRecorded[originType] &&
|
||||||
|
this._resultsRecorded[originType][loadType]) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
var message = originType + " : " + loadType + " should be " +
|
||||||
|
(this._expectedResults[originType][loadType] ? "allowed" : "blocked");
|
||||||
|
ok(this._expectedResults[originType][loadType] == true, message);
|
||||||
|
this._resultsRecorded[originType][loadType] = true;
|
||||||
|
this._countedTests++;
|
||||||
|
}
|
||||||
|
else if (topic === "csp-on-violate-policy") {
|
||||||
|
// Matching hits on this topic were blocked by the csp
|
||||||
|
var uri = subject.QueryInterface(Components.interfaces.nsIURI);
|
||||||
|
// ignore irrelevent URIs
|
||||||
|
if (!testpat.test(uri.asciiSpec)) return;
|
||||||
|
|
||||||
|
var loadType = typepat.exec(uri.asciiSpec)[1];
|
||||||
|
var originType = originpat.exec(uri.asciiSpec)[1];
|
||||||
|
|
||||||
|
// skip duplicate hits to this topic (potentially document loads
|
||||||
|
// may generate duplicate loads.
|
||||||
|
if (this._resultsRecorded[originType] &&
|
||||||
|
this._resultsRecorded[originType][loadType]) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
var message = originType + " : " + loadType + " should be " +
|
||||||
|
(this._expectedResults[originType][loadType] ? "allowed" : "blocked");
|
||||||
|
ok(this._expectedResults[originType][loadType] == false, message);
|
||||||
|
this._resultsRecorded[originType][loadType] = true;
|
||||||
|
this._countedTests++;
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
// wrong topic! Nothing to do.
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
this._checkForFinish();
|
||||||
|
},
|
||||||
|
|
||||||
|
_checkForFinish: function() {
|
||||||
|
// check to see if there are load tests still pending.
|
||||||
|
// (All requests triggered by the app should hit one of the
|
||||||
|
// two observer topics.)
|
||||||
|
if (this._countedTests == this._expectedResults.max_tests) {
|
||||||
|
Services.obs.removeObserver(this, "csp-on-violate-policy");
|
||||||
|
Services.obs.removeObserver(this, "http-on-modify-request");
|
||||||
|
dump("removed observers\n");
|
||||||
|
checkedCount++;
|
||||||
|
if (checkedCount == checksTodo) {
|
||||||
|
SpecialPowers.removePermission("browser", "https://example.com");
|
||||||
|
SimpleTest.finish();
|
||||||
|
} else {
|
||||||
|
gTestRunner.next();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
|
||||||
|
// verify the status of the app
|
||||||
|
checkAppStatus: function() {
|
||||||
|
var principal = this._iframe.contentDocument.nodePrincipal;
|
||||||
|
if (this._testData.app) {
|
||||||
|
is(principal.appStatus, this._testData.appStatus,
|
||||||
|
"iframe principal's app status doesn't match the expected app status.");
|
||||||
|
this._countedTests++;
|
||||||
|
this._checkForFinish();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var content = document.getElementById('content');
|
||||||
|
var checkedCount = 0; // number of apps checked
|
||||||
|
var checksTodo = gData.length;
|
||||||
|
|
||||||
|
// quick check to make sure we can test apps:
|
||||||
|
is('appStatus' in document.nodePrincipal, true,
|
||||||
|
'appStatus should be present in nsIPrincipal, if not the rest of this test will fail');
|
||||||
|
|
||||||
|
function runTest() {
|
||||||
|
for (var i = 0; i < gData.length; i++) {
|
||||||
|
let data = gData[i];
|
||||||
|
var iframe = document.createElement('iframe');
|
||||||
|
|
||||||
|
// watch for successes and failures
|
||||||
|
var examiner = new ThingyListener(data, iframe);
|
||||||
|
|
||||||
|
iframe.setAttribute('mozapp', data.app);
|
||||||
|
iframe.setAttribute('mozbrowser', 'true');
|
||||||
|
iframe.addEventListener('load', examiner.checkAppStatus.bind(examiner));
|
||||||
|
iframe.src = data.uri;
|
||||||
|
|
||||||
|
content.appendChild(iframe);
|
||||||
|
|
||||||
|
yield;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var gTestRunner = runTest();
|
||||||
|
|
||||||
|
// load the default CSP and pref it on
|
||||||
|
SpecialPowers.addPermission("browser", true, "https://example.com");
|
||||||
|
SpecialPowers.pushPrefEnv({'set': [["dom.mozBrowserFramesEnabled", true],
|
||||||
|
["security.apps.privileged.CSP.default", DEFAULT_CSP_PRIV],
|
||||||
|
["security.apps.certified.CSP.default", DEFAULT_CSP_CERT]]},
|
||||||
|
function() { gTestRunner.next(); });
|
||||||
|
|
||||||
|
|
||||||
|
</script>
|
||||||
|
</pre>
|
||||||
|
</body>
|
||||||
|
</html>
|
25
content/base/test/file_csp_bug768029.html
Normal file
25
content/base/test/file_csp_bug768029.html
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
<!DOCTYPE HTML>
|
||||||
|
<html>
|
||||||
|
<!--
|
||||||
|
https://bugzilla.mozilla.org/show_bug.cgi?id=768029
|
||||||
|
-->
|
||||||
|
<head>
|
||||||
|
<meta charset="utf-8">
|
||||||
|
<title>This is an app for testing</title>
|
||||||
|
|
||||||
|
<link rel="stylesheet" type="text/css"
|
||||||
|
href="file_csp_bug768029.sjs?type=style&origin=same_origin" />
|
||||||
|
<link rel="stylesheet" type="text/css"
|
||||||
|
href="http://example.com/tests/content/base/test/file_csp_bug768029.sjs?type=style&origin=cross_origin" />
|
||||||
|
</head>
|
||||||
|
<body>
|
||||||
|
|
||||||
|
<script src="file_csp_bug768029.sjs?type=script&origin=same_origin"></script>
|
||||||
|
<script src="http://example.com/tests/content/base/test/file_csp_bug768029.sjs?type=script&origin=cross_origin"></script>
|
||||||
|
<img src="file_csp_bug768029.sjs?type=img&origin=same_origin" />
|
||||||
|
<img src="http://example.com/tests/content/base/test/file_csp_bug768029.sjs?type=img&origin=cross_origin" />
|
||||||
|
|
||||||
|
Test for CSP applied to (simulated) app.
|
||||||
|
|
||||||
|
</body>
|
||||||
|
</html>
|
29
content/base/test/file_csp_bug768029.sjs
Normal file
29
content/base/test/file_csp_bug768029.sjs
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
function handleRequest(request, response) {
|
||||||
|
|
||||||
|
var query = {};
|
||||||
|
|
||||||
|
request.queryString.split('&').forEach(function(val) {
|
||||||
|
var [name, value] = val.split('=');
|
||||||
|
query[name] = unescape(value);
|
||||||
|
});
|
||||||
|
response.setHeader("Cache-Control", "no-cache", false);
|
||||||
|
|
||||||
|
if ("type" in query) {
|
||||||
|
switch (query.type) {
|
||||||
|
case "script":
|
||||||
|
response.setHeader("Content-Type", "application/javascript");
|
||||||
|
response.write("\n\ndocument.write('<pre>script loaded\\n</pre>');\n\n");
|
||||||
|
return;
|
||||||
|
case "style":
|
||||||
|
response.setHeader("Content-Type", "text/css");
|
||||||
|
response.write("\n\n.cspfoo { color:red; }\n\n");
|
||||||
|
return;
|
||||||
|
case "img":
|
||||||
|
response.setHeader("Content-Type", "image/png");
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
response.setHeader("Content-Type", "text/plain");
|
||||||
|
response.write("ohnoes!");
|
||||||
|
}
|
@ -105,6 +105,7 @@ FocusedWindowedPluginWhileFullScreen=Exited full-screen because windowed plugin
|
|||||||
HTMLMultipartXHRWarning=HTML parsing in XMLHttpRequest is not supported for multipart responses.
|
HTMLMultipartXHRWarning=HTML parsing in XMLHttpRequest is not supported for multipart responses.
|
||||||
HTMLSyncXHRWarning=HTML parsing in XMLHttpRequest is not supported in the synchronous mode.
|
HTMLSyncXHRWarning=HTML parsing in XMLHttpRequest is not supported in the synchronous mode.
|
||||||
InvalidRedirectChannelWarning=Unable to redirect to %S because the channel doesn't implement nsIWritablePropertyBag2.
|
InvalidRedirectChannelWarning=Unable to redirect to %S because the channel doesn't implement nsIWritablePropertyBag2.
|
||||||
|
ReportOnlyCSPIgnored=Report-only CSP policy will be ignored because there are other non-report-only CSP policies applied.
|
||||||
ResponseTypeSyncXHRWarning=Use of XMLHttpRequest's responseType attribute is no longer supported in the synchronous mode in window context.
|
ResponseTypeSyncXHRWarning=Use of XMLHttpRequest's responseType attribute is no longer supported in the synchronous mode in window context.
|
||||||
WithCredentialsSyncXHRWarning=Use of XMLHttpRequest's withCredentials attribute is no longer supported in the synchronous mode in window context.
|
WithCredentialsSyncXHRWarning=Use of XMLHttpRequest's withCredentials attribute is no longer supported in the synchronous mode in window context.
|
||||||
TimeoutSyncXHRWarning=Use of XMLHttpRequest's timeout attribute is not supported in the synchronous mode in window context.
|
TimeoutSyncXHRWarning=Use of XMLHttpRequest's timeout attribute is not supported in the synchronous mode in window context.
|
||||||
|
Loading…
Reference in New Issue
Block a user