summaryrefslogtreecommitdiffstats
path: root/security/manager/ssl/nsCertOverrideService.cpp
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 01:47:29 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 01:47:29 +0000
commit0ebf5bdf043a27fd3dfb7f92e0cb63d88954c44d (patch)
treea31f07c9bcca9d56ce61e9a1ffd30ef350d513aa /security/manager/ssl/nsCertOverrideService.cpp
parentInitial commit. (diff)
downloadfirefox-esr-upstream/115.8.0esr.tar.xz
firefox-esr-upstream/115.8.0esr.zip
Adding upstream version 115.8.0esr.upstream/115.8.0esr
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'security/manager/ssl/nsCertOverrideService.cpp')
-rw-r--r--security/manager/ssl/nsCertOverrideService.cpp757
1 files changed, 757 insertions, 0 deletions
diff --git a/security/manager/ssl/nsCertOverrideService.cpp b/security/manager/ssl/nsCertOverrideService.cpp
new file mode 100644
index 0000000000..b8d0bbc3a1
--- /dev/null
+++ b/security/manager/ssl/nsCertOverrideService.cpp
@@ -0,0 +1,757 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* vim: set ts=8 sts=2 et sw=2 tw=80: */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "nsCertOverrideService.h"
+
+#include "NSSCertDBTrustDomain.h"
+#include "ScopedNSSTypes.h"
+#include "SharedSSLState.h"
+#include "mozilla/Assertions.h"
+#include "mozilla/ScopeExit.h"
+#include "mozilla/TaskQueue.h"
+#include "mozilla/Telemetry.h"
+#include "mozilla/TextUtils.h"
+#include "mozilla/Tokenizer.h"
+#include "mozilla/Unused.h"
+#include "mozilla/dom/ToJSValue.h"
+#include "nsAppDirectoryServiceDefs.h"
+#include "nsCRT.h"
+#include "nsILineInputStream.h"
+#ifdef ENABLE_WEBDRIVER
+# include "nsIMarionette.h"
+#endif
+#include "nsIObserver.h"
+#include "nsIObserverService.h"
+#include "nsIOutputStream.h"
+#ifdef ENABLE_WEBDRIVER
+# include "nsIRemoteAgent.h"
+#endif
+#include "nsISafeOutputStream.h"
+#include "nsIX509Cert.h"
+#include "nsNSSCertificate.h"
+#include "nsNSSComponent.h"
+#include "nsNetUtil.h"
+#include "nsStreamUtils.h"
+#include "nsStringBuffer.h"
+#include "nsThreadUtils.h"
+
+using namespace mozilla;
+using namespace mozilla::psm;
+
+#define CERT_OVERRIDE_FILE_NAME "cert_override.txt"
+
+class WriterRunnable : public Runnable {
+ public:
+ WriterRunnable(nsCertOverrideService* aService, nsCString& aData,
+ nsCOMPtr<nsIFile> aFile)
+ : Runnable("nsCertOverrideService::WriterRunnable"),
+ mCertOverrideService(aService),
+ mData(aData),
+ mFile(std::move(aFile)) {}
+
+ NS_IMETHOD
+ Run() override {
+ mCertOverrideService->AssertOnTaskQueue();
+ nsresult rv;
+
+ auto removeShutdownBlockerOnExit =
+ MakeScopeExit([certOverrideService = mCertOverrideService]() {
+ NS_DispatchToMainThread(NS_NewRunnableFunction(
+ "nsCertOverrideService::RemoveShutdownBlocker",
+ [certOverrideService] {
+ certOverrideService->RemoveShutdownBlocker();
+ }));
+ });
+
+ nsCOMPtr<nsIOutputStream> outputStream;
+ rv = NS_NewSafeLocalFileOutputStream(
+ getter_AddRefs(outputStream), mFile,
+ PR_CREATE_FILE | PR_TRUNCATE | PR_WRONLY);
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ const char* ptr = mData.get();
+ uint32_t remaining = mData.Length();
+ uint32_t written = 0;
+ while (remaining > 0) {
+ rv = outputStream->Write(ptr, remaining, &written);
+ NS_ENSURE_SUCCESS(rv, rv);
+ remaining -= written;
+ ptr += written;
+ }
+
+ nsCOMPtr<nsISafeOutputStream> safeStream = do_QueryInterface(outputStream);
+ MOZ_ASSERT(safeStream);
+ rv = safeStream->Finish();
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ return NS_OK;
+ }
+
+ private:
+ const RefPtr<nsCertOverrideService> mCertOverrideService;
+ nsCString mData;
+ const nsCOMPtr<nsIFile> mFile;
+};
+
+NS_IMPL_ISUPPORTS(nsCertOverride, nsICertOverride)
+
+NS_IMETHODIMP
+nsCertOverride::GetAsciiHost(/*out*/ nsACString& aAsciiHost) {
+ aAsciiHost = mAsciiHost;
+ return NS_OK;
+}
+
+NS_IMETHODIMP
+nsCertOverride::GetFingerprint(/*out*/ nsACString& aFingerprint) {
+ aFingerprint = mFingerprint;
+ return NS_OK;
+}
+
+NS_IMETHODIMP
+nsCertOverride::GetPort(/*out*/ int32_t* aPort) {
+ *aPort = mPort;
+ return NS_OK;
+}
+
+NS_IMETHODIMP
+nsCertOverride::GetHostPort(/*out*/ nsACString& aHostPort) {
+ nsCertOverrideService::GetHostWithPort(mAsciiHost, mPort, aHostPort);
+ return NS_OK;
+}
+
+NS_IMETHODIMP
+nsCertOverride::GetOriginAttributes(
+ JSContext* aCtx, /*out*/ JS::MutableHandle<JS::Value> aValue) {
+ if (ToJSValue(aCtx, mOriginAttributes, aValue)) {
+ return NS_OK;
+ }
+ return NS_ERROR_FAILURE;
+}
+
+NS_IMPL_ISUPPORTS(nsCertOverrideService, nsICertOverrideService, nsIObserver,
+ nsISupportsWeakReference, nsIAsyncShutdownBlocker)
+
+nsCertOverrideService::nsCertOverrideService()
+ : mMutex("nsCertOverrideService.mutex"),
+ mDisableAllSecurityCheck(false),
+ mPendingWriteCount(0) {
+ nsCOMPtr<nsIEventTarget> target =
+ do_GetService(NS_STREAMTRANSPORTSERVICE_CONTRACTID);
+ MOZ_ASSERT(target);
+
+ mWriterTaskQueue = TaskQueue::Create(target.forget(), "CertOverrideService");
+}
+
+nsCertOverrideService::~nsCertOverrideService() = default;
+
+static nsCOMPtr<nsIAsyncShutdownClient> GetShutdownBarrier() {
+ MOZ_ASSERT(NS_IsMainThread());
+ nsCOMPtr<nsIAsyncShutdownService> svc =
+ mozilla::services::GetAsyncShutdownService();
+ MOZ_RELEASE_ASSERT(svc);
+
+ nsCOMPtr<nsIAsyncShutdownClient> barrier;
+ nsresult rv = svc->GetProfileBeforeChange(getter_AddRefs(barrier));
+
+ MOZ_RELEASE_ASSERT(NS_SUCCEEDED(rv));
+ MOZ_RELEASE_ASSERT(barrier);
+ return barrier;
+}
+
+nsresult nsCertOverrideService::Init() {
+ if (!NS_IsMainThread()) {
+ MOZ_ASSERT_UNREACHABLE("nsCertOverrideService initialized off main thread");
+ return NS_ERROR_NOT_SAME_THREAD;
+ }
+
+ nsCOMPtr<nsIObserverService> observerService =
+ mozilla::services::GetObserverService();
+
+ // If we cannot add ourselves as a profile change observer, then we will not
+ // attempt to read/write any settings file. Otherwise, we would end up
+ // reading/writing the wrong settings file after a profile change.
+ if (observerService) {
+ observerService->AddObserver(this, "profile-do-change", true);
+ // simulate a profile change so we read the current profile's settings file
+ Observe(nullptr, "profile-do-change", nullptr);
+ }
+
+ SharedSSLState::NoteCertOverrideServiceInstantiated();
+ return NS_OK;
+}
+
+NS_IMETHODIMP
+nsCertOverrideService::Observe(nsISupports*, const char* aTopic,
+ const char16_t* aData) {
+ if (!nsCRT::strcmp(aTopic, "profile-do-change")) {
+ // The profile has already changed.
+ // Now read from the new profile location.
+ // we also need to update the cached file location
+
+ MutexAutoLock lock(mMutex);
+
+ nsresult rv = NS_GetSpecialDirectory(NS_APP_USER_PROFILE_50_DIR,
+ getter_AddRefs(mSettingsFile));
+ if (NS_SUCCEEDED(rv)) {
+ mSettingsFile->AppendNative(nsLiteralCString(CERT_OVERRIDE_FILE_NAME));
+ } else {
+ mSettingsFile = nullptr;
+ }
+ Read(lock);
+ CountPermanentOverrideTelemetry(lock);
+ }
+
+ return NS_OK;
+}
+
+void nsCertOverrideService::RemoveAllTemporaryOverrides() {
+ MutexAutoLock lock(mMutex);
+ bool removedAny = false;
+ for (auto iter = mSettingsTable.Iter(); !iter.Done(); iter.Next()) {
+ nsCertOverrideEntry* entry = iter.Get();
+ if (entry->mSettings->mIsTemporary) {
+ iter.Remove();
+ removedAny = true;
+ }
+ }
+ if (removedAny) {
+ nsCOMPtr<nsIObserverService> os = mozilla::services::GetObserverService();
+ if (os) {
+ os->NotifyObservers(nullptr, "net:cancel-all-connections", nullptr);
+ }
+ }
+ // no need to write, as temporaries are never written to disk
+}
+
+static const char sSHA256OIDString[] = "OID.2.16.840.1.101.3.4.2.1";
+nsresult nsCertOverrideService::Read(const MutexAutoLock& aProofOfLock) {
+ mMutex.AssertCurrentThreadOwns();
+ // If we don't have a profile, then we won't try to read any settings file.
+ if (!mSettingsFile) return NS_OK;
+
+ nsresult rv;
+ nsCOMPtr<nsIInputStream> fileInputStream;
+ rv = NS_NewLocalFileInputStream(getter_AddRefs(fileInputStream),
+ mSettingsFile);
+ if (NS_FAILED(rv)) {
+ return rv;
+ }
+
+ nsCOMPtr<nsILineInputStream> lineInputStream =
+ do_QueryInterface(fileInputStream, &rv);
+ if (NS_FAILED(rv)) {
+ return rv;
+ }
+
+ nsAutoCString buffer;
+ bool isMore = true;
+
+ // Each line is of the form:
+ // host:port:originAttributes \t sSHA256OIDString \t fingerprint \t
+ // There may be some "bits" identifiers and "dbKey" after the `fingerprint`
+ // field in 'fingerprint \t \t dbKey' format, but these are now ignored.
+ // Lines that don't match this form are silently dropped.
+
+ while (isMore && NS_SUCCEEDED(lineInputStream->ReadLine(buffer, &isMore))) {
+ if (buffer.IsEmpty() || buffer.First() == '#') {
+ continue;
+ }
+
+ Tokenizer parser(buffer);
+ nsDependentCSubstring host;
+ if (parser.CheckChar('[')) { // this is a IPv6 address
+ if (!parser.ReadUntil(Tokenizer::Token::Char(']'), host) ||
+ host.Length() == 0 || !parser.CheckChar(':')) {
+ continue;
+ }
+ } else if (!parser.ReadUntil(Tokenizer::Token::Char(':'), host) ||
+ host.Length() == 0) {
+ continue;
+ }
+ int32_t port = -1;
+ if (!parser.ReadInteger(&port)) {
+ continue;
+ }
+ OriginAttributes attributes;
+ if (parser.CheckChar(':')) {
+ nsDependentCSubstring attributesString;
+ if (!parser.ReadUntil(Tokenizer::Token::Whitespace(), attributesString) ||
+ !attributes.PopulateFromSuffix(attributesString)) {
+ continue;
+ }
+ } else if (!parser.CheckWhite()) {
+ continue;
+ }
+ nsDependentCSubstring algorithm;
+ if (!parser.ReadUntil(Tokenizer::Token::Whitespace(), algorithm) ||
+ algorithm != sSHA256OIDString) {
+ continue;
+ }
+ nsDependentCSubstring fingerprint;
+ if (!parser.ReadUntil(Tokenizer::Token::Whitespace(), fingerprint) ||
+ fingerprint.Length() == 0) {
+ continue;
+ }
+
+ AddEntryToList(host, port, attributes,
+ false, // not temporary
+ fingerprint, aProofOfLock);
+ }
+
+ return NS_OK;
+}
+
+nsresult nsCertOverrideService::Write(const MutexAutoLock& aProofOfLock) {
+ mMutex.AssertCurrentThreadOwns();
+ MOZ_ASSERT(NS_IsMainThread());
+ if (!NS_IsMainThread()) {
+ return NS_ERROR_NOT_SAME_THREAD;
+ }
+
+ // If we don't have any profile, then we won't try to write any file
+ if (!mSettingsFile) {
+ return NS_OK;
+ }
+
+ nsCString output;
+
+ static const char kHeader[] =
+ "# PSM Certificate Override Settings file" NS_LINEBREAK
+ "# This is a generated file! Do not edit." NS_LINEBREAK;
+
+ /* see ::Read for file format */
+
+ output.Append(kHeader);
+
+ static const char kTab[] = "\t";
+ for (auto iter = mSettingsTable.Iter(); !iter.Done(); iter.Next()) {
+ nsCertOverrideEntry* entry = iter.Get();
+
+ RefPtr<nsCertOverride> settings = entry->mSettings;
+ if (settings->mIsTemporary) {
+ continue;
+ }
+
+ output.Append(entry->mKeyString);
+ output.Append(kTab);
+ output.Append(sSHA256OIDString);
+ output.Append(kTab);
+ output.Append(settings->mFingerprint);
+ output.Append(kTab);
+ // the "bits" string used to go here, but it no longer exists
+ // the "\t dbKey" string used to go here, but it no longer exists
+ output.Append(NS_LINEBREAK);
+ }
+
+ // Make a clone of the file to pass to the WriterRunnable.
+ nsCOMPtr<nsIFile> file;
+ nsresult rv;
+ rv = mSettingsFile->Clone(getter_AddRefs(file));
+ NS_ENSURE_SUCCESS(rv, rv);
+
+ nsCOMPtr<nsIRunnable> runnable = new WriterRunnable(this, output, file);
+ rv = mWriterTaskQueue->Dispatch(runnable.forget());
+ if (NS_FAILED(rv)) {
+ return rv;
+ }
+ mPendingWriteCount++;
+
+ if (mPendingWriteCount == 1) {
+ rv = GetShutdownBarrier()->AddBlocker(
+ this, NS_LITERAL_STRING_FROM_CSTRING(__FILE__), __LINE__,
+ u"nsCertOverrideService writing data"_ns);
+ NS_ENSURE_SUCCESS(rv, rv);
+ }
+
+ return NS_OK;
+}
+
+nsresult GetCertSha256Fingerprint(nsIX509Cert* aCert, nsCString& aResult) {
+ nsAutoString fpStrUTF16;
+ nsresult rv = aCert->GetSha256Fingerprint(fpStrUTF16);
+ if (NS_FAILED(rv)) {
+ return rv;
+ }
+ aResult.Assign(NS_ConvertUTF16toUTF8(fpStrUTF16));
+ return NS_OK;
+}
+
+NS_IMETHODIMP
+nsCertOverrideService::RememberValidityOverride(
+ const nsACString& aHostName, int32_t aPort,
+ const OriginAttributes& aOriginAttributes, nsIX509Cert* aCert,
+ bool aTemporary) {
+ if (aHostName.IsEmpty() || !IsAscii(aHostName) || !aCert) {
+ return NS_ERROR_INVALID_ARG;
+ }
+ if (aPort < -1) {
+ return NS_ERROR_INVALID_ARG;
+ }
+ if (!NS_IsMainThread()) {
+ return NS_ERROR_NOT_SAME_THREAD;
+ }
+
+ UniqueCERTCertificate nsscert(aCert->GetCert());
+ if (!nsscert) {
+ return NS_ERROR_FAILURE;
+ }
+
+ nsAutoCString fpStr;
+ nsresult rv = GetCertSha256Fingerprint(aCert, fpStr);
+ if (NS_FAILED(rv)) {
+ return rv;
+ }
+
+ {
+ MutexAutoLock lock(mMutex);
+ AddEntryToList(aHostName, aPort, aOriginAttributes, aTemporary, fpStr,
+ lock);
+ if (!aTemporary) {
+ Write(lock);
+ }
+ }
+
+ return NS_OK;
+}
+
+NS_IMETHODIMP
+nsCertOverrideService::RememberValidityOverrideScriptable(
+ const nsACString& aHostName, int32_t aPort,
+ JS::Handle<JS::Value> aOriginAttributes, nsIX509Cert* aCert,
+ bool aTemporary, JSContext* aCx) {
+ OriginAttributes attrs;
+ if (!aOriginAttributes.isObject() || !attrs.Init(aCx, aOriginAttributes)) {
+ return NS_ERROR_INVALID_ARG;
+ }
+
+ return RememberValidityOverride(aHostName, aPort, attrs, aCert, aTemporary);
+}
+
+NS_IMETHODIMP
+nsCertOverrideService::HasMatchingOverride(
+ const nsACString& aHostName, int32_t aPort,
+ const OriginAttributes& aOriginAttributes, nsIX509Cert* aCert,
+ bool* aIsTemporary, bool* aRetval) {
+ bool disableAllSecurityCheck = false;
+ {
+ MutexAutoLock lock(mMutex);
+ disableAllSecurityCheck = mDisableAllSecurityCheck;
+ }
+ if (disableAllSecurityCheck) {
+ *aIsTemporary = false;
+ *aRetval = true;
+ return NS_OK;
+ }
+
+ if (aHostName.IsEmpty() || !IsAscii(aHostName)) {
+ return NS_ERROR_INVALID_ARG;
+ }
+ if (aPort < -1) return NS_ERROR_INVALID_ARG;
+
+ NS_ENSURE_ARG_POINTER(aCert);
+ NS_ENSURE_ARG_POINTER(aIsTemporary);
+ NS_ENSURE_ARG_POINTER(aRetval);
+ *aRetval = false;
+
+ RefPtr<nsCertOverride> settings(
+ GetOverrideFor(aHostName, aPort, aOriginAttributes));
+ // If there is no corresponding override and the given OriginAttributes isn't
+ // the default, try to look up an override using the default OriginAttributes.
+ if (!settings && aOriginAttributes != OriginAttributes()) {
+ settings = GetOverrideFor(aHostName, aPort, OriginAttributes());
+ }
+ if (!settings) {
+ return NS_OK;
+ }
+
+ *aIsTemporary = settings->mIsTemporary;
+
+ nsAutoCString fpStr;
+ nsresult rv = GetCertSha256Fingerprint(aCert, fpStr);
+ if (NS_FAILED(rv)) {
+ return rv;
+ }
+
+ *aRetval = settings->mFingerprint.Equals(fpStr);
+ return NS_OK;
+}
+
+already_AddRefed<nsCertOverride> nsCertOverrideService::GetOverrideFor(
+ const nsACString& aHostName, int32_t aPort,
+ const OriginAttributes& aOriginAttributes) {
+ nsAutoCString keyString;
+ GetKeyString(aHostName, aPort, aOriginAttributes, keyString);
+ MutexAutoLock lock(mMutex);
+ nsCertOverrideEntry* entry = mSettingsTable.GetEntry(keyString.get());
+ if (!entry) {
+ return nullptr;
+ }
+ return do_AddRef(entry->mSettings);
+}
+
+NS_IMETHODIMP
+nsCertOverrideService::HasMatchingOverrideScriptable(
+ const nsACString& aHostName, int32_t aPort,
+ JS::Handle<JS::Value> aOriginAttributes, nsIX509Cert* aCert,
+ bool* aIsTemporary, JSContext* aCx, bool* aRetval) {
+ OriginAttributes attrs;
+ if (!aOriginAttributes.isObject() || !attrs.Init(aCx, aOriginAttributes)) {
+ return NS_ERROR_INVALID_ARG;
+ }
+
+ return HasMatchingOverride(aHostName, aPort, attrs, aCert, aIsTemporary,
+ aRetval);
+}
+
+nsresult nsCertOverrideService::AddEntryToList(
+ const nsACString& aHostName, int32_t aPort,
+ const OriginAttributes& aOriginAttributes, const bool aIsTemporary,
+ const nsACString& fingerprint, const MutexAutoLock& aProofOfLock) {
+ mMutex.AssertCurrentThreadOwns();
+ nsAutoCString keyString;
+ GetKeyString(aHostName, aPort, aOriginAttributes, keyString);
+
+ nsCertOverrideEntry* entry = mSettingsTable.PutEntry(keyString.get());
+
+ if (!entry) {
+ NS_ERROR("can't insert a null entry!");
+ return NS_ERROR_OUT_OF_MEMORY;
+ }
+
+ entry->mKeyString = keyString;
+
+ RefPtr<nsCertOverride> settings(new nsCertOverride());
+
+ settings->mAsciiHost = aHostName;
+ settings->mPort = aPort;
+ settings->mOriginAttributes = aOriginAttributes;
+ settings->mIsTemporary = aIsTemporary;
+ settings->mFingerprint = fingerprint;
+ entry->mSettings = settings;
+
+ return NS_OK;
+}
+
+NS_IMETHODIMP
+nsCertOverrideService::ClearValidityOverride(
+ const nsACString& aHostName, int32_t aPort,
+ const OriginAttributes& aOriginAttributes) {
+ if (aHostName.IsEmpty() || !IsAscii(aHostName)) {
+ return NS_ERROR_INVALID_ARG;
+ }
+ if (!NS_IsMainThread()) {
+ return NS_ERROR_NOT_SAME_THREAD;
+ }
+
+ if (aPort == 0 && aHostName.EqualsLiteral("all:temporary-certificates")) {
+ RemoveAllTemporaryOverrides();
+ return NS_OK;
+ }
+ nsAutoCString keyString;
+ GetKeyString(aHostName, aPort, aOriginAttributes, keyString);
+ {
+ MutexAutoLock lock(mMutex);
+ mSettingsTable.RemoveEntry(keyString.get());
+ Write(lock);
+ }
+
+ nsCOMPtr<nsINSSComponent> nss(do_GetService(PSM_COMPONENT_CONTRACTID));
+ if (nss) {
+ nss->ClearSSLExternalAndInternalSessionCache();
+ } else {
+ return NS_ERROR_NOT_AVAILABLE;
+ }
+
+ nsCOMPtr<nsIObserverService> os = mozilla::services::GetObserverService();
+ if (os) {
+ os->NotifyObservers(nullptr, "net:cancel-all-connections", nullptr);
+ }
+
+ return NS_OK;
+}
+NS_IMETHODIMP
+nsCertOverrideService::ClearValidityOverrideScriptable(
+ const nsACString& aHostName, int32_t aPort,
+ JS::Handle<JS::Value> aOriginAttributes, JSContext* aCx) {
+ OriginAttributes attrs;
+ if (!aOriginAttributes.isObject() || !attrs.Init(aCx, aOriginAttributes)) {
+ return NS_ERROR_INVALID_ARG;
+ }
+
+ return ClearValidityOverride(aHostName, aPort, attrs);
+}
+
+NS_IMETHODIMP
+nsCertOverrideService::ClearAllOverrides() {
+ if (!NS_IsMainThread()) {
+ return NS_ERROR_NOT_SAME_THREAD;
+ }
+
+ {
+ MutexAutoLock lock(mMutex);
+ mSettingsTable.Clear();
+ Write(lock);
+ }
+
+ nsCOMPtr<nsINSSComponent> nss(do_GetService(PSM_COMPONENT_CONTRACTID));
+ if (nss) {
+ nss->ClearSSLExternalAndInternalSessionCache();
+ } else {
+ return NS_ERROR_NOT_AVAILABLE;
+ }
+
+ nsCOMPtr<nsIObserverService> os = mozilla::services::GetObserverService();
+ if (os) {
+ os->NotifyObservers(nullptr, "net:cancel-all-connections", nullptr);
+ }
+
+ return NS_OK;
+}
+
+void nsCertOverrideService::CountPermanentOverrideTelemetry(
+ const MutexAutoLock& aProofOfLock) {
+ mMutex.AssertCurrentThreadOwns();
+ uint32_t overrideCount = 0;
+ for (auto iter = mSettingsTable.Iter(); !iter.Done(); iter.Next()) {
+ if (!iter.Get()->mSettings->mIsTemporary) {
+ overrideCount++;
+ }
+ }
+ Telemetry::Accumulate(Telemetry::SSL_PERMANENT_CERT_ERROR_OVERRIDES,
+ overrideCount);
+}
+
+static bool IsDebugger() {
+#ifdef ENABLE_WEBDRIVER
+ nsCOMPtr<nsIMarionette> marionette = do_GetService(NS_MARIONETTE_CONTRACTID);
+ if (marionette) {
+ bool marionetteRunning = false;
+ marionette->GetRunning(&marionetteRunning);
+ if (marionetteRunning) {
+ return true;
+ }
+ }
+
+ nsCOMPtr<nsIRemoteAgent> agent = do_GetService(NS_REMOTEAGENT_CONTRACTID);
+ if (agent) {
+ bool remoteAgentRunning = false;
+ agent->GetRunning(&remoteAgentRunning);
+ if (remoteAgentRunning) {
+ return true;
+ }
+ }
+#endif
+
+ return false;
+}
+
+NS_IMETHODIMP
+nsCertOverrideService::
+ SetDisableAllSecurityChecksAndLetAttackersInterceptMyData(bool aDisable) {
+ if (!(PR_GetEnv("XPCSHELL_TEST_PROFILE_DIR") || IsDebugger())) {
+ return NS_ERROR_NOT_AVAILABLE;
+ }
+
+ {
+ MutexAutoLock lock(mMutex);
+ mDisableAllSecurityCheck = aDisable;
+ }
+
+ nsCOMPtr<nsINSSComponent> nss(do_GetService(PSM_COMPONENT_CONTRACTID));
+ if (nss) {
+ nss->ClearSSLExternalAndInternalSessionCache();
+ } else {
+ return NS_ERROR_NOT_AVAILABLE;
+ }
+
+ return NS_OK;
+}
+
+NS_IMETHODIMP
+nsCertOverrideService::GetSecurityCheckDisabled(bool* aDisabled) {
+ MutexAutoLock lock(mMutex);
+ *aDisabled = mDisableAllSecurityCheck;
+ return NS_OK;
+}
+
+NS_IMETHODIMP
+nsCertOverrideService::GetOverrides(
+ /*out*/ nsTArray<RefPtr<nsICertOverride>>& retval) {
+ MutexAutoLock lock(mMutex);
+ for (auto iter = mSettingsTable.Iter(); !iter.Done(); iter.Next()) {
+ const RefPtr<nsICertOverride> settings = iter.Get()->mSettings;
+
+ retval.AppendElement(settings);
+ }
+ return NS_OK;
+}
+
+void nsCertOverrideService::GetHostWithPort(const nsACString& aHostName,
+ int32_t aPort,
+ nsACString& aRetval) {
+ nsAutoCString hostPort;
+ if (aHostName.Contains(':')) {
+ // if aHostName is an IPv6 address, add brackets to match the internal
+ // representation, which always stores IPv6 addresses with brackets
+ hostPort.Append('[');
+ hostPort.Append(aHostName);
+ hostPort.Append(']');
+ } else {
+ hostPort.Append(aHostName);
+ }
+ if (aPort == -1) {
+ aPort = 443;
+ }
+ if (!hostPort.IsEmpty()) {
+ hostPort.Append(':');
+ hostPort.AppendInt(aPort);
+ }
+ aRetval.Assign(hostPort);
+}
+
+void nsCertOverrideService::GetKeyString(
+ const nsACString& aHostName, int32_t aPort,
+ const OriginAttributes& aOriginAttributes, nsACString& aRetval) {
+ nsAutoCString keyString;
+ GetHostWithPort(aHostName, aPort, keyString);
+ keyString.Append(':');
+ OriginAttributes strippedAttributes(aOriginAttributes);
+ strippedAttributes.StripAttributes(
+ ~OriginAttributes::STRIP_PRIVATE_BROWSING_ID);
+ nsAutoCString attributeSuffix;
+ strippedAttributes.CreateSuffix(attributeSuffix);
+ keyString.Append(attributeSuffix);
+ aRetval.Assign(keyString);
+}
+
+// nsIAsyncShutdownBlocker implementation
+NS_IMETHODIMP
+nsCertOverrideService::GetName(nsAString& aName) {
+ aName = u"nsCertOverrideService: shutdown"_ns;
+ return NS_OK;
+}
+
+NS_IMETHODIMP
+nsCertOverrideService::GetState(nsIPropertyBag** aState) {
+ if (!aState) {
+ return NS_ERROR_INVALID_ARG;
+ }
+ *aState = nullptr;
+ return NS_OK;
+}
+
+NS_IMETHODIMP
+nsCertOverrideService::BlockShutdown(nsIAsyncShutdownClient*) { return NS_OK; }
+
+void nsCertOverrideService::RemoveShutdownBlocker() {
+ MOZ_ASSERT(NS_IsMainThread());
+ MOZ_ASSERT(mPendingWriteCount > 0);
+ mPendingWriteCount--;
+ if (mPendingWriteCount == 0) {
+ nsresult rv = GetShutdownBarrier()->RemoveBlocker(this);
+ MOZ_RELEASE_ASSERT(NS_SUCCEEDED(rv));
+ }
+}