mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
109 lines
3.6 KiB
C++
109 lines
3.6 KiB
C++
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*-
|
|
* vim: set ts=4 sw=4 et tw=99 ft=cpp:
|
|
*
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#ifndef __AccessCheck_h__
|
|
#define __AccessCheck_h__
|
|
|
|
#include "jsapi.h"
|
|
#include "jswrapper.h"
|
|
#include "WrapperFactory.h"
|
|
|
|
class nsIPrincipal;
|
|
|
|
namespace xpc {
|
|
|
|
class AccessCheck {
|
|
public:
|
|
static bool subsumes(JSCompartment *a, JSCompartment *b);
|
|
static bool subsumes(JSObject *a, JSObject *b);
|
|
static bool wrapperSubsumes(JSObject *wrapper);
|
|
static bool subsumesIgnoringDomain(JSCompartment *a, JSCompartment *b);
|
|
static bool isChrome(JSCompartment *compartment);
|
|
static bool isChrome(JSObject *obj);
|
|
static bool callerIsChrome();
|
|
static nsIPrincipal *getPrincipal(JSCompartment *compartment);
|
|
static bool isCrossOriginAccessPermitted(JSContext *cx, JSObject *obj, jsid id,
|
|
js::Wrapper::Action act);
|
|
static bool isSystemOnlyAccessPermitted(JSContext *cx);
|
|
|
|
static bool needsSystemOnlyWrapper(JSObject *obj);
|
|
|
|
static bool isScriptAccessOnly(JSContext *cx, JSObject *wrapper);
|
|
|
|
static void deny(JSContext *cx, jsid id);
|
|
};
|
|
|
|
struct Policy {
|
|
};
|
|
|
|
// This policy only permits access to the object if the subject can touch
|
|
// system objects.
|
|
struct OnlyIfSubjectIsSystem : public Policy {
|
|
static bool check(JSContext *cx, JSObject *wrapper, jsid id, js::Wrapper::Action act) {
|
|
return AccessCheck::isSystemOnlyAccessPermitted(cx);
|
|
}
|
|
|
|
static bool deny(JSContext *cx, jsid id, js::Wrapper::Action act) {
|
|
AccessCheck::deny(cx, id);
|
|
return false;
|
|
}
|
|
|
|
static bool allowNativeCall(JSContext *cx, JS::IsAcceptableThis test, JS::NativeImpl impl)
|
|
{
|
|
return AccessCheck::isSystemOnlyAccessPermitted(cx);
|
|
}
|
|
};
|
|
|
|
// This policy only permits access to properties that are safe to be used
|
|
// across origins.
|
|
struct CrossOriginAccessiblePropertiesOnly : public Policy {
|
|
static bool check(JSContext *cx, JSObject *wrapper, jsid id, js::Wrapper::Action act) {
|
|
return AccessCheck::isCrossOriginAccessPermitted(cx, wrapper, id, act);
|
|
}
|
|
static bool deny(JSContext *cx, jsid id, js::Wrapper::Action act) {
|
|
AccessCheck::deny(cx, id);
|
|
return false;
|
|
}
|
|
static bool allowNativeCall(JSContext *cx, JS::IsAcceptableThis test, JS::NativeImpl impl)
|
|
{
|
|
return false;
|
|
}
|
|
};
|
|
|
|
// This policy only permits access to properties if they appear in the
|
|
// objects exposed properties list.
|
|
struct ExposedPropertiesOnly : public Policy {
|
|
static bool check(JSContext *cx, JSObject *wrapper, jsid id, js::Wrapper::Action act);
|
|
|
|
static bool deny(JSContext *cx, jsid id, js::Wrapper::Action act) {
|
|
// For gets, silently fail.
|
|
if (act == js::Wrapper::GET)
|
|
return true;
|
|
// For sets,throw an exception.
|
|
AccessCheck::deny(cx, id);
|
|
return false;
|
|
}
|
|
static bool allowNativeCall(JSContext *cx, JS::IsAcceptableThis test, JS::NativeImpl impl);
|
|
};
|
|
|
|
// Components specific policy
|
|
struct ComponentsObjectPolicy : public Policy {
|
|
static bool check(JSContext *cx, JSObject *wrapper, jsid id, js::Wrapper::Action act);
|
|
|
|
static bool deny(JSContext *cx, jsid id, js::Wrapper::Action act) {
|
|
AccessCheck::deny(cx, id);
|
|
return false;
|
|
}
|
|
static bool allowNativeCall(JSContext *cx, JS::IsAcceptableThis test, JS::NativeImpl impl) {
|
|
return false;
|
|
}
|
|
};
|
|
|
|
}
|
|
|
|
#endif /* __AccessCheck_h__ */
|