summaryrefslogtreecommitdiffstats
path: root/dom/ipc/WindowGlobalActor.cpp
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
commit26a029d407be480d791972afb5975cf62c9360a6 (patch)
treef435a8308119effd964b339f76abb83a57c29483 /dom/ipc/WindowGlobalActor.cpp
parentInitial commit. (diff)
downloadfirefox-26a029d407be480d791972afb5975cf62c9360a6.tar.xz
firefox-26a029d407be480d791972afb5975cf62c9360a6.zip
Adding upstream version 124.0.1.upstream/124.0.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'dom/ipc/WindowGlobalActor.cpp')
-rw-r--r--dom/ipc/WindowGlobalActor.cpp191
1 files changed, 191 insertions, 0 deletions
diff --git a/dom/ipc/WindowGlobalActor.cpp b/dom/ipc/WindowGlobalActor.cpp
new file mode 100644
index 0000000000..20dd775bad
--- /dev/null
+++ b/dom/ipc/WindowGlobalActor.cpp
@@ -0,0 +1,191 @@
+/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* vim:set ts=2 sw=2 sts=2 et cindent: */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "mozilla/dom/WindowGlobalActor.h"
+
+#include "AutoplayPolicy.h"
+#include "nsContentUtils.h"
+#include "mozilla/Components.h"
+#include "mozilla/ContentBlockingAllowList.h"
+#include "mozilla/Logging.h"
+#include "mozilla/dom/Document.h"
+#include "mozilla/dom/JSActorService.h"
+#include "mozilla/dom/JSWindowActorParent.h"
+#include "mozilla/dom/JSWindowActorChild.h"
+#include "mozilla/dom/JSWindowActorProtocol.h"
+#include "mozilla/dom/PopupBlocker.h"
+#include "mozilla/net/CookieJarSettings.h"
+#include "mozilla/dom/WindowContext.h"
+#include "mozilla/dom/WindowGlobalChild.h"
+#include "mozilla/dom/WindowGlobalParent.h"
+
+#include "nsGlobalWindowInner.h"
+#include "nsNetUtil.h"
+
+namespace mozilla::dom {
+
+// CORPP 3.1.3 https://mikewest.github.io/corpp/#integration-html
+static nsILoadInfo::CrossOriginEmbedderPolicy InheritedPolicy(
+ dom::BrowsingContext* aBrowsingContext) {
+ WindowContext* inherit = aBrowsingContext->GetParentWindowContext();
+ if (inherit) {
+ return inherit->GetEmbedderPolicy();
+ }
+
+ return nsILoadInfo::EMBEDDER_POLICY_NULL;
+}
+
+// Common WindowGlobalInit creation code used by both `AboutBlankInitializer`
+// and `WindowInitializer`.
+WindowGlobalInit WindowGlobalActor::BaseInitializer(
+ dom::BrowsingContext* aBrowsingContext, uint64_t aInnerWindowId,
+ uint64_t aOuterWindowId) {
+ MOZ_DIAGNOSTIC_ASSERT(aBrowsingContext);
+
+ using Indexes = WindowContext::FieldIndexes;
+
+ WindowGlobalInit init;
+ auto& ctx = init.context();
+ ctx.mInnerWindowId = aInnerWindowId;
+ ctx.mOuterWindowId = aOuterWindowId;
+ ctx.mBrowsingContextId = aBrowsingContext->Id();
+
+ // If any synced fields need to be initialized from our BrowsingContext, we
+ // can initialize them here.
+ auto& fields = ctx.mFields;
+ fields.Get<Indexes::IDX_EmbedderPolicy>() = InheritedPolicy(aBrowsingContext);
+ fields.Get<Indexes::IDX_AutoplayPermission>() =
+ nsIPermissionManager::UNKNOWN_ACTION;
+ fields.Get<Indexes::IDX_AllowJavascript>() = true;
+ return init;
+}
+
+WindowGlobalInit WindowGlobalActor::AboutBlankInitializer(
+ dom::BrowsingContext* aBrowsingContext, nsIPrincipal* aPrincipal) {
+ WindowGlobalInit init =
+ BaseInitializer(aBrowsingContext, nsContentUtils::GenerateWindowId(),
+ nsContentUtils::GenerateWindowId());
+
+ init.principal() = aPrincipal;
+ init.storagePrincipal() = aPrincipal;
+ Unused << NS_NewURI(getter_AddRefs(init.documentURI()), "about:blank");
+ init.isInitialDocument() = true;
+
+ return init;
+}
+
+WindowGlobalInit WindowGlobalActor::WindowInitializer(
+ nsGlobalWindowInner* aWindow) {
+ WindowGlobalInit init =
+ BaseInitializer(aWindow->GetBrowsingContext(), aWindow->WindowID(),
+ aWindow->GetOuterWindow()->WindowID());
+
+ init.principal() = aWindow->GetPrincipal();
+ init.storagePrincipal() = aWindow->GetEffectiveStoragePrincipal();
+ init.documentURI() = aWindow->GetDocumentURI();
+
+ Document* doc = aWindow->GetDocument();
+
+ init.isInitialDocument() = doc->IsInitialDocument();
+ init.blockAllMixedContent() = doc->GetBlockAllMixedContent(false);
+ init.upgradeInsecureRequests() = doc->GetUpgradeInsecureRequests(false);
+ init.sandboxFlags() = doc->GetSandboxFlags();
+ net::CookieJarSettings::Cast(doc->CookieJarSettings())
+ ->Serialize(init.cookieJarSettings());
+ init.httpsOnlyStatus() = doc->HttpsOnlyStatus();
+
+ using Indexes = WindowContext::FieldIndexes;
+
+ auto& fields = init.context().mFields;
+ fields.Get<Indexes::IDX_CookieBehavior>() =
+ Some(doc->CookieJarSettings()->GetCookieBehavior());
+ fields.Get<Indexes::IDX_IsOnContentBlockingAllowList>() =
+ doc->CookieJarSettings()->GetIsOnContentBlockingAllowList();
+ fields.Get<Indexes::IDX_IsThirdPartyWindow>() = doc->HasThirdPartyChannel();
+ fields.Get<Indexes::IDX_IsThirdPartyTrackingResourceWindow>() =
+ nsContentUtils::IsThirdPartyTrackingResourceWindow(aWindow);
+ fields.Get<Indexes::IDX_ShouldResistFingerprinting>() =
+ doc->ShouldResistFingerprinting(RFPTarget::IsAlwaysEnabledForPrecompute);
+ fields.Get<Indexes::IDX_OverriddenFingerprintingSettings>() =
+ doc->GetOverriddenFingerprintingSettings();
+ fields.Get<Indexes::IDX_IsSecureContext>() = aWindow->IsSecureContext();
+
+ // Initialze permission fields
+ fields.Get<Indexes::IDX_AutoplayPermission>() =
+ media::AutoplayPolicy::GetSiteAutoplayPermission(init.principal());
+ fields.Get<Indexes::IDX_PopupPermission>() =
+ PopupBlocker::GetPopupPermission(init.principal());
+
+ // Initialize top level permission fields
+ if (aWindow->GetBrowsingContext()->IsTop()) {
+ fields.Get<Indexes::IDX_AllowMixedContent>() = [&] {
+ uint32_t permit = nsIPermissionManager::UNKNOWN_ACTION;
+ nsCOMPtr<nsIPermissionManager> permissionManager =
+ components::PermissionManager::Service();
+
+ if (permissionManager) {
+ permissionManager->TestPermissionFromPrincipal(
+ init.principal(), "mixed-content"_ns, &permit);
+ }
+
+ return permit == nsIPermissionManager::ALLOW_ACTION;
+ }();
+
+ fields.Get<Indexes::IDX_ShortcutsPermission>() =
+ nsGlobalWindowInner::GetShortcutsPermission(init.principal());
+ }
+
+ if (auto policy = doc->GetEmbedderPolicy()) {
+ fields.Get<Indexes::IDX_EmbedderPolicy>() = *policy;
+ }
+
+ // Init Mixed Content Fields
+ nsCOMPtr<nsIURI> innerDocURI = NS_GetInnermostURI(doc->GetDocumentURI());
+ fields.Get<Indexes::IDX_IsSecure>() =
+ innerDocURI && innerDocURI->SchemeIs("https");
+
+ nsCOMPtr<nsITransportSecurityInfo> securityInfo;
+ if (nsCOMPtr<nsIChannel> channel = doc->GetChannel()) {
+ nsCOMPtr<nsILoadInfo> loadInfo(channel->LoadInfo());
+ fields.Get<Indexes::IDX_IsOriginalFrameSource>() =
+ loadInfo->GetOriginalFrameSrcLoad();
+ fields.Get<Indexes::IDX_UsingStorageAccess>() =
+ loadInfo->GetStoragePermission() != nsILoadInfo::NoStoragePermission;
+
+ channel->GetSecurityInfo(getter_AddRefs(securityInfo));
+ }
+ init.securityInfo() = securityInfo;
+
+ fields.Get<Indexes::IDX_IsLocalIP>() =
+ init.principal()->GetIsLocalIpAddress();
+
+ // Most data here is specific to the Document, which can change without
+ // creating a new WindowGlobal. Anything new added here which fits that
+ // description should also be synchronized in
+ // WindowGlobalChild::OnNewDocument.
+ return init;
+}
+
+already_AddRefed<JSActorProtocol> WindowGlobalActor::MatchingJSActorProtocol(
+ JSActorService* aActorSvc, const nsACString& aName, ErrorResult& aRv) {
+ RefPtr<JSWindowActorProtocol> proto =
+ aActorSvc->GetJSWindowActorProtocol(aName);
+ if (!proto) {
+ aRv.ThrowNotFoundError(nsPrintfCString("No such JSWindowActor '%s'",
+ PromiseFlatCString(aName).get()));
+ return nullptr;
+ }
+
+ if (!proto->Matches(BrowsingContext(), GetDocumentURI(), GetRemoteType(),
+ aRv)) {
+ MOZ_ASSERT(aRv.Failed());
+ return nullptr;
+ }
+ MOZ_ASSERT(!aRv.Failed());
+ return proto.forget();
+}
+
+} // namespace mozilla::dom