diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 00:47:55 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 00:47:55 +0000 |
commit | 26a029d407be480d791972afb5975cf62c9360a6 (patch) | |
tree | f435a8308119effd964b339f76abb83a57c29483 /toolkit/components/extensions/ExtensionPolicyService.h | |
parent | Initial commit. (diff) | |
download | firefox-26a029d407be480d791972afb5975cf62c9360a6.tar.xz firefox-26a029d407be480d791972afb5975cf62c9360a6.zip |
Adding upstream version 124.0.1.upstream/124.0.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'toolkit/components/extensions/ExtensionPolicyService.h')
-rw-r--r-- | toolkit/components/extensions/ExtensionPolicyService.h | 145 |
1 files changed, 145 insertions, 0 deletions
diff --git a/toolkit/components/extensions/ExtensionPolicyService.h b/toolkit/components/extensions/ExtensionPolicyService.h new file mode 100644 index 0000000000..a767b48cd7 --- /dev/null +++ b/toolkit/components/extensions/ExtensionPolicyService.h @@ -0,0 +1,145 @@ +/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2; -*- */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#ifndef mozilla_ExtensionPolicyService_h +#define mozilla_ExtensionPolicyService_h + +#include "mozilla/MemoryReporting.h" +#include "mozilla/extensions/WebExtensionPolicy.h" +#include "mozIExtensionProcessScript.h" +#include "nsCOMPtr.h" +#include "nsCycleCollectionParticipant.h" +#include "nsHashKeys.h" +#include "nsIAddonPolicyService.h" +#include "nsAtom.h" +#include "nsIMemoryReporter.h" +#include "nsIObserver.h" +#include "nsIObserverService.h" +#include "nsISupports.h" +#include "nsPointerHashKeys.h" +#include "nsRefPtrHashtable.h" +#include "nsTHashSet.h" +#include "nsAtomHashKeys.h" + +class nsIChannel; +class nsIObserverService; + +class nsIPIDOMWindowInner; +class nsIPIDOMWindowOuter; + +namespace mozilla { +namespace dom { +class Promise; +} // namespace dom +namespace extensions { +class DocInfo; +class DocumentObserver; +class WebExtensionContentScript; +} // namespace extensions + +using extensions::DocInfo; +using extensions::WebExtensionPolicy; + +class ExtensionPolicyService final : public nsIAddonPolicyService, + public nsIObserver, + public nsIMemoryReporter { + public: + NS_DECL_CYCLE_COLLECTION_CLASS_AMBIGUOUS(ExtensionPolicyService, + nsIAddonPolicyService) + NS_DECL_CYCLE_COLLECTING_ISUPPORTS + NS_DECL_NSIADDONPOLICYSERVICE + NS_DECL_NSIOBSERVER + NS_DECL_NSIMEMORYREPORTER + + static mozIExtensionProcessScript& ProcessScript(); + + static ExtensionPolicyService& GetSingleton(); + + // Helper for fetching an AtomSet of restricted domains as configured by the + // extensions.webextensions.restrictedDomains pref. Safe to call from any + // thread. + static RefPtr<extensions::AtomSet> RestrictedDomains(); + + // Thread-safe AtomSet from extensions.quarantinedDomains.list. + static RefPtr<extensions::AtomSet> QuarantinedDomains(); + + static already_AddRefed<ExtensionPolicyService> GetInstance() { + return do_AddRef(&GetSingleton()); + } + + // Unlike the other methods on the ExtensionPolicyService, this method is + // threadsafe, and can look up a WebExtensionPolicyCore by hostname on any + // thread. + static RefPtr<extensions::WebExtensionPolicyCore> GetCoreByHost( + const nsACString& aHost); + + WebExtensionPolicy* GetByID(nsAtom* aAddonId) { + return mExtensions.GetWeak(aAddonId); + } + + WebExtensionPolicy* GetByID(const nsAString& aAddonId) { + RefPtr<nsAtom> atom = NS_AtomizeMainThread(aAddonId); + return GetByID(atom); + } + + WebExtensionPolicy* GetByURL(const extensions::URLInfo& aURL); + + WebExtensionPolicy* GetByHost(const nsACString& aHost) const; + + void GetAll(nsTArray<RefPtr<WebExtensionPolicy>>& aResult); + + bool RegisterExtension(WebExtensionPolicy& aPolicy); + bool UnregisterExtension(WebExtensionPolicy& aPolicy); + + bool RegisterObserver(extensions::DocumentObserver& aPolicy); + bool UnregisterObserver(extensions::DocumentObserver& aPolicy); + + bool UseRemoteExtensions() const; + bool IsExtensionProcess() const; + bool GetQuarantinedDomainsEnabled() const; + + nsresult InjectContentScripts(WebExtensionPolicy* aExtension); + + protected: + virtual ~ExtensionPolicyService(); + + private: + ExtensionPolicyService(); + + void RegisterObservers(); + void UnregisterObservers(); + + void CheckRequest(nsIChannel* aChannel); + void CheckDocument(dom::Document* aDocument); + + void CheckContentScripts(const DocInfo& aDocInfo, bool aIsPreload); + + already_AddRefed<dom::Promise> ExecuteContentScript( + nsPIDOMWindowInner* aWindow, + extensions::WebExtensionContentScript& aScript); + + RefPtr<dom::Promise> ExecuteContentScripts( + JSContext* aCx, nsPIDOMWindowInner* aWindow, + const nsTArray<RefPtr<extensions::WebExtensionContentScript>>& aScripts); + + void UpdateRestrictedDomains(); + void UpdateQuarantinedDomains(); + + // The WebExtensionPolicy object keeps the key alive. + nsRefPtrHashtable<nsWeakAtomHashKey, WebExtensionPolicy> mExtensions; + + nsRefPtrHashtable<nsPtrHashKey<const extensions::DocumentObserver>, + extensions::DocumentObserver> + mObservers; + + nsCOMPtr<nsIObserverService> mObs; + + nsString mDefaultCSP; + nsString mDefaultCSPV3; +}; + +} // namespace mozilla + +#endif // mozilla_ExtensionPolicyService_h |