195 lines
7.5 KiB
C++
195 lines
7.5 KiB
C++
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#ifndef mozilla_net_CookieCommons_h
|
|
#define mozilla_net_CookieCommons_h
|
|
|
|
#include <cstdint>
|
|
#include <functional>
|
|
#include "mozIThirdPartyUtil.h"
|
|
#include "prtime.h"
|
|
#include "nsString.h"
|
|
#include "nsICookie.h"
|
|
#include "mozilla/net/NeckoChannelParams.h"
|
|
|
|
class nsIChannel;
|
|
class nsICookieJarSettings;
|
|
class nsIEffectiveTLDService;
|
|
class nsIPrincipal;
|
|
class nsIURI;
|
|
|
|
namespace mozilla {
|
|
|
|
namespace dom {
|
|
class Document;
|
|
}
|
|
|
|
namespace net {
|
|
|
|
// these constants represent an operation being performed on cookies
|
|
enum CookieOperation { OPERATION_READ, OPERATION_WRITE };
|
|
|
|
// these constants represent a decision about a cookie based on user prefs.
|
|
enum CookieStatus {
|
|
STATUS_ACCEPTED,
|
|
STATUS_ACCEPT_SESSION,
|
|
STATUS_REJECTED,
|
|
// STATUS_REJECTED_WITH_ERROR indicates the cookie should be rejected because
|
|
// of an error (rather than something the user can control). this is used for
|
|
// notification purposes, since we only want to notify of rejections where
|
|
// the user can do something about it (e.g. whitelist the site).
|
|
STATUS_REJECTED_WITH_ERROR
|
|
};
|
|
|
|
class Cookie;
|
|
class CookieParser;
|
|
|
|
// pref string constants
|
|
static const char kPrefMaxNumberOfCookies[] = "network.cookie.maxNumber";
|
|
static const char kPrefMaxCookiesPerHost[] = "network.cookie.maxPerHost";
|
|
static const char kPrefCookieQuotaPerHost[] = "network.cookie.quotaPerHost";
|
|
static const char kPrefCookiePurgeAge[] = "network.cookie.purgeAge";
|
|
|
|
// default limits for the cookie list. these can be tuned by the
|
|
// network.cookie.maxNumber and network.cookie.maxPerHost prefs respectively.
|
|
static const uint32_t kMaxCookiesPerHost = 180;
|
|
static const uint32_t kCookieQuotaPerHost = 150;
|
|
static const uint32_t kMaxNumberOfCookies = 3000;
|
|
static const uint32_t kMaxBytesPerCookie = 4096;
|
|
static const uint32_t kMaxBytesPerPath = 1024;
|
|
|
|
static const int64_t kCookiePurgeAge =
|
|
int64_t(30 * 24 * 60 * 60) * PR_USEC_PER_SEC; // 30 days in microseconds
|
|
|
|
class CookieCommons final {
|
|
public:
|
|
static bool DomainMatches(Cookie* aCookie, const nsACString& aHost);
|
|
|
|
static bool PathMatches(Cookie* aCookie, const nsACString& aPath);
|
|
|
|
static bool PathMatches(const nsACString& aCookiePath,
|
|
const nsACString& aPath);
|
|
|
|
static nsresult GetBaseDomain(nsIEffectiveTLDService* aTLDService,
|
|
nsIURI* aHostURI, nsACString& aBaseDomain,
|
|
bool& aRequireHostMatch);
|
|
|
|
static nsresult GetBaseDomain(nsIPrincipal* aPrincipal,
|
|
nsACString& aBaseDomain);
|
|
|
|
static nsresult GetBaseDomainFromHost(nsIEffectiveTLDService* aTLDService,
|
|
const nsACString& aHost,
|
|
nsCString& aBaseDomain);
|
|
|
|
// This method returns true if aBaseDomain contains any colons since only
|
|
// IPv6 baseDomains may contain colons.
|
|
static bool IsIPv6BaseDomain(const nsACString& aBaseDomain);
|
|
|
|
static void NotifyRejected(nsIURI* aHostURI, nsIChannel* aChannel,
|
|
uint32_t aRejectedReason,
|
|
CookieOperation aOperation);
|
|
|
|
static bool CheckPathSize(const CookieStruct& aCookieData);
|
|
|
|
static bool CheckNameAndValueSize(const CookieStruct& aCookieData);
|
|
|
|
static bool CheckName(const CookieStruct& aCookieData);
|
|
|
|
static bool CheckValue(const CookieStruct& aCookieData);
|
|
|
|
static bool CheckCookiePermission(nsIChannel* aChannel,
|
|
CookieStruct& aCookieData);
|
|
|
|
static bool CheckCookiePermission(nsIPrincipal* aPrincipal,
|
|
nsICookieJarSettings* aCookieJarSettings,
|
|
CookieStruct& aCookieData);
|
|
|
|
static already_AddRefed<Cookie> CreateCookieFromDocument(
|
|
CookieParser& aCookieParser, dom::Document* aDocument,
|
|
const nsACString& aCookieString, int64_t aCurrentTimeInUsec,
|
|
nsIEffectiveTLDService* aTLDService, mozIThirdPartyUtil* aThirdPartyUtil,
|
|
nsACString& aBaseDomain, OriginAttributes& aAttrs);
|
|
|
|
static already_AddRefed<nsICookieJarSettings> GetCookieJarSettings(
|
|
nsIChannel* aChannel);
|
|
|
|
static bool ShouldIncludeCrossSiteCookie(Cookie* aCookie, nsIURI* aHostURI,
|
|
bool aPartitionForeign,
|
|
bool aInPrivateBrowsing,
|
|
bool aUsingStorageAccess,
|
|
bool aOn3pcbException);
|
|
|
|
static bool ShouldIncludeCrossSiteCookie(
|
|
nsIURI* aHostURI, int32_t aSameSiteAttr, bool aCookiePartitioned,
|
|
bool aPartitionForeign, bool aInPrivateBrowsing, bool aUsingStorageAccess,
|
|
bool aOn3pcbException);
|
|
|
|
static bool IsFirstPartyPartitionedCookieWithoutCHIPS(
|
|
Cookie* aCookie, const nsACString& aBaseDomain,
|
|
const OriginAttributes& aOriginAttributes);
|
|
|
|
static bool ShouldEnforceSessionForOriginAttributes(
|
|
const OriginAttributes& aOriginAttributes);
|
|
|
|
static bool IsSchemeSupported(nsIPrincipal* aPrincipal);
|
|
static bool IsSchemeSupported(nsIURI* aURI);
|
|
static bool IsSchemeSupported(const nsACString& aScheme);
|
|
|
|
static nsICookie::schemeType URIToSchemeType(nsIURI* aURI);
|
|
|
|
static nsICookie::schemeType PrincipalToSchemeType(nsIPrincipal* aPrincipal);
|
|
|
|
static nsICookie::schemeType SchemeToSchemeType(const nsACString& aScheme);
|
|
|
|
// Returns true if the channel is a safe top-level navigation or if it's a
|
|
// download request
|
|
static bool IsSafeTopLevelNav(nsIChannel* aChannel);
|
|
|
|
// Returns true if the channel is a foreign with respect to the host-uri.
|
|
// For loads of TYPE_DOCUMENT, this function returns true if it's a cross
|
|
// site navigation.
|
|
// `aHadCrossSiteRedirects` will be true iff the channel had a cross-site
|
|
// redirect before the final URI.
|
|
static bool IsSameSiteForeign(nsIChannel* aChannel, nsIURI* aHostURI,
|
|
bool* aHadCrossSiteRedirects);
|
|
|
|
static bool ChipsLimitEnabledAndChipsCookie(
|
|
const Cookie& cookie, dom::BrowsingContext* aBrowsingContext);
|
|
|
|
static void ComposeCookieString(nsTArray<RefPtr<Cookie>>& aCookieList,
|
|
nsACString& aCookieString);
|
|
|
|
static void GetServerDateHeader(nsIChannel* aChannel,
|
|
nsACString& aServerDateHeader);
|
|
|
|
enum class SecurityChecksResult {
|
|
// A sandboxed context detected.
|
|
eSandboxedError,
|
|
// A security error needs to be thrown.
|
|
eSecurityError,
|
|
// This context should not see cookies without returning errors.
|
|
eDoNotContinue,
|
|
// No security issues found. Proceed to expose cookies.
|
|
eContinue,
|
|
};
|
|
|
|
// Runs the security checks requied by specs on the current context (Document
|
|
// or Worker) to see if it's allowed to set/get cookies. In case it does
|
|
// (eContinue), the cookie principals are returned. Use the
|
|
// `aCookiePartitionedPrincipal` to retrieve CHIP cookies. Use
|
|
// `aCookiePrincipal` to retrieve non-CHIP cookies.
|
|
static SecurityChecksResult CheckGlobalAndRetrieveCookiePrincipals(
|
|
mozilla::dom::Document* aDocument, nsIPrincipal** aCookiePrincipal,
|
|
nsIPrincipal** aCookiePartitionedPrincipal);
|
|
|
|
// Return a reduced expiry attribute value if needed.
|
|
static int64_t MaybeReduceExpiry(int64_t aCurrentTimeInSec,
|
|
int64_t aExpiryInSec);
|
|
};
|
|
|
|
} // namespace net
|
|
} // namespace mozilla
|
|
|
|
#endif // mozilla_net_CookieCommons_h
|