/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=8 sts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "mozilla/dom/InternalHeaders.h" #include "FetchUtil.h" #include "mozilla/dom/FetchTypes.h" #include "mozilla/ErrorResult.h" #include "nsCharSeparatedTokenizer.h" #include "nsContentUtils.h" #include "nsIHttpChannel.h" #include "nsIHttpHeaderVisitor.h" #include "nsNetUtil.h" #include "nsReadableUtils.h" namespace mozilla::dom { InternalHeaders::InternalHeaders(nsTArray&& aHeaders, HeadersGuardEnum aGuard) : mGuard(aGuard), mList(std::move(aHeaders)), mListDirty(true) {} InternalHeaders::InternalHeaders( const nsTArray& aHeadersEntryList, HeadersGuardEnum aGuard) : mGuard(aGuard), mListDirty(true) { for (const HeadersEntry& headersEntry : aHeadersEntryList) { mList.AppendElement(Entry(headersEntry.name(), headersEntry.value())); } } void InternalHeaders::ToIPC(nsTArray& aIPCHeaders, HeadersGuardEnum& aGuard) { aGuard = mGuard; aIPCHeaders.Clear(); for (Entry& entry : mList) { aIPCHeaders.AppendElement(HeadersEntry(entry.mName, entry.mValue)); } } bool InternalHeaders::IsValidHeaderValue(const nsCString& aLowerName, const nsCString& aNormalizedValue, ErrorResult& aRv) { // Steps 2 to 6 for ::Set() and ::Append() in the spec. // Step 2 if (IsInvalidName(aLowerName, aRv) || IsInvalidValue(aNormalizedValue, aRv)) { return false; } // Step 3 if (IsImmutable(aRv)) { return false; } // Step 4 if (mGuard == HeadersGuardEnum::Request) { if (IsForbiddenRequestHeader(aLowerName, aNormalizedValue)) { return false; } } // Step 5 if (mGuard == HeadersGuardEnum::Request_no_cors) { nsAutoCString tempValue; Get(aLowerName, tempValue, aRv); if (tempValue.IsVoid()) { tempValue = aNormalizedValue; } else { tempValue.Append(", "); tempValue.Append(aNormalizedValue); } if (!nsContentUtils::IsCORSSafelistedRequestHeader(aLowerName, tempValue)) { return false; } } // Step 6 else if (IsForbiddenResponseHeader(aLowerName)) { return false; } return true; } void InternalHeaders::Append(const nsACString& aName, const nsACString& aValue, ErrorResult& aRv) { // Step 1 nsAutoCString trimValue; NS_TrimHTTPWhitespace(aValue, trimValue); // Steps 2 to 6 nsAutoCString lowerName; ToLowerCase(aName, lowerName); if (!IsValidHeaderValue(lowerName, trimValue, aRv)) { return; } // Step 7 nsAutoCString name(aName); ReuseExistingNameIfExists(name); SetListDirty(); mList.AppendElement(Entry(name, trimValue)); // Step 8 if (mGuard == HeadersGuardEnum::Request_no_cors) { RemovePrivilegedNoCorsRequestHeaders(); } } void InternalHeaders::RemovePrivilegedNoCorsRequestHeaders() { bool dirty = false; // remove in reverse order to minimize copying for (int32_t i = mList.Length() - 1; i >= 0; --i) { if (IsPrivilegedNoCorsRequestHeaderName(mList[i].mName)) { mList.RemoveElementAt(i); dirty = true; } } if (dirty) { SetListDirty(); } } bool InternalHeaders::DeleteInternal(const nsCString& aLowerName, ErrorResult& aRv) { bool dirty = false; // remove in reverse order to minimize copying for (int32_t i = mList.Length() - 1; i >= 0; --i) { if (mList[i].mName.EqualsIgnoreCase(aLowerName.get())) { mList.RemoveElementAt(i); dirty = true; } } if (dirty) { SetListDirty(); } return dirty; } void InternalHeaders::Delete(const nsACString& aName, ErrorResult& aRv) { // See https://fetch.spec.whatwg.org/#dom-headers-delete nsAutoCString lowerName; ToLowerCase(aName, lowerName); // Step 1 if (IsInvalidName(lowerName, aRv)) { return; } if (IsImmutable(aRv)) { return; } nsAutoCString value; GetInternal(lowerName, value, aRv); if (IsForbiddenRequestHeader(lowerName, value)) { return; } // Step 2 if (mGuard == HeadersGuardEnum::Request_no_cors && !IsNoCorsSafelistedRequestHeaderName(lowerName) && !IsPrivilegedNoCorsRequestHeaderName(lowerName)) { return; } if (IsForbiddenResponseHeader(lowerName)) { return; } // Steps 3, 4, and 5 if (!DeleteInternal(lowerName, aRv)) { return; } // Step 6 if (mGuard == HeadersGuardEnum::Request_no_cors) { RemovePrivilegedNoCorsRequestHeaders(); } } void InternalHeaders::Get(const nsACString& aName, nsACString& aValue, ErrorResult& aRv) const { nsAutoCString lowerName; ToLowerCase(aName, lowerName); if (IsInvalidName(lowerName, aRv)) { return; } GetInternal(lowerName, aValue, aRv); } void InternalHeaders::GetInternal(const nsCString& aLowerName, nsACString& aValue, ErrorResult& aRv) const { const char* delimiter = ", "; bool firstValueFound = false; for (uint32_t i = 0; i < mList.Length(); ++i) { if (mList[i].mName.EqualsIgnoreCase(aLowerName.get())) { if (firstValueFound) { aValue += delimiter; } aValue += mList[i].mValue; firstValueFound = true; } } // No value found, so return null to content if (!firstValueFound) { aValue.SetIsVoid(true); } } void InternalHeaders::GetSetCookie(nsTArray& aValues) const { for (uint32_t i = 0; i < mList.Length(); ++i) { if (mList[i].mName.EqualsIgnoreCase("Set-Cookie")) { aValues.AppendElement(mList[i].mValue); } } } void InternalHeaders::GetFirst(const nsACString& aName, nsACString& aValue, ErrorResult& aRv) const { nsAutoCString lowerName; ToLowerCase(aName, lowerName); if (IsInvalidName(lowerName, aRv)) { return; } for (uint32_t i = 0; i < mList.Length(); ++i) { if (mList[i].mName.EqualsIgnoreCase(lowerName.get())) { aValue = mList[i].mValue; return; } } // No value found, so return null to content aValue.SetIsVoid(true); } bool InternalHeaders::Has(const nsACString& aName, ErrorResult& aRv) const { nsAutoCString lowerName; ToLowerCase(aName, lowerName); if (IsInvalidName(lowerName, aRv)) { return false; } for (uint32_t i = 0; i < mList.Length(); ++i) { if (mList[i].mName.EqualsIgnoreCase(lowerName.get())) { return true; } } return false; } void InternalHeaders::Set(const nsACString& aName, const nsACString& aValue, ErrorResult& aRv) { // Step 1 nsAutoCString trimValue; NS_TrimHTTPWhitespace(aValue, trimValue); // Steps 2 to 6 nsAutoCString lowerName; ToLowerCase(aName, lowerName); if (!IsValidHeaderValue(lowerName, trimValue, aRv)) { return; } // Step 7 SetListDirty(); int32_t firstIndex = INT32_MAX; // remove in reverse order to minimize copying for (int32_t i = mList.Length() - 1; i >= 0; --i) { if (mList[i].mName.EqualsIgnoreCase(lowerName.get())) { firstIndex = std::min(firstIndex, i); mList.RemoveElementAt(i); } } if (firstIndex < INT32_MAX) { Entry* entry = mList.InsertElementAt(firstIndex); entry->mName = aName; entry->mValue = trimValue; } else { mList.AppendElement(Entry(aName, trimValue)); } // Step 8 if (mGuard == HeadersGuardEnum::Request_no_cors) { RemovePrivilegedNoCorsRequestHeaders(); } } void InternalHeaders::Clear() { SetListDirty(); mList.Clear(); } void InternalHeaders::SetGuard(HeadersGuardEnum aGuard, ErrorResult& aRv) { // The guard is only checked during ::Set() and ::Append() in the spec. It // does not require revalidating headers already set. mGuard = aGuard; } InternalHeaders::~InternalHeaders() = default; // static bool InternalHeaders::IsNoCorsSafelistedRequestHeaderName( const nsCString& aName) { return aName.EqualsIgnoreCase("accept") || aName.EqualsIgnoreCase("accept-language") || aName.EqualsIgnoreCase("content-language") || aName.EqualsIgnoreCase("content-type"); } // static bool InternalHeaders::IsPrivilegedNoCorsRequestHeaderName( const nsCString& aName) { return aName.EqualsIgnoreCase("range"); } // static bool InternalHeaders::IsRevalidationHeader(const nsCString& aName) { return aName.EqualsIgnoreCase("if-modified-since") || aName.EqualsIgnoreCase("if-none-match") || aName.EqualsIgnoreCase("if-unmodified-since") || aName.EqualsIgnoreCase("if-match") || aName.EqualsIgnoreCase("if-range"); } // static bool InternalHeaders::IsInvalidName(const nsACString& aName, ErrorResult& aRv) { if (!NS_IsValidHTTPToken(aName)) { aRv.ThrowTypeError(aName); return true; } return false; } // static bool InternalHeaders::IsInvalidValue(const nsACString& aValue, ErrorResult& aRv) { if (!NS_IsReasonableHTTPHeaderValue(aValue)) { aRv.ThrowTypeError(aValue); return true; } return false; } bool InternalHeaders::IsImmutable(ErrorResult& aRv) const { if (mGuard == HeadersGuardEnum::Immutable) { aRv.ThrowTypeError("Headers are immutable and cannot be modified."); return true; } return false; } bool InternalHeaders::IsForbiddenRequestHeader(const nsCString& aName, const nsACString& aValue) const { return mGuard == HeadersGuardEnum::Request && nsContentUtils::IsForbiddenRequestHeader(aName, aValue); } bool InternalHeaders::IsForbiddenRequestNoCorsHeader( const nsCString& aName) const { return mGuard == HeadersGuardEnum::Request_no_cors && !nsContentUtils::IsCORSSafelistedRequestHeader(aName, ""_ns); } bool InternalHeaders::IsForbiddenRequestNoCorsHeader( const nsCString& aName, const nsACString& aValue) const { return mGuard == HeadersGuardEnum::Request_no_cors && !nsContentUtils::IsCORSSafelistedRequestHeader(aName, aValue); } bool InternalHeaders::IsForbiddenResponseHeader(const nsCString& aName) const { return mGuard == HeadersGuardEnum::Response && nsContentUtils::IsForbiddenResponseHeader(aName); } void InternalHeaders::Fill(const InternalHeaders& aInit, ErrorResult& aRv) { const nsTArray& list = aInit.mList; for (uint32_t i = 0; i < list.Length() && !aRv.Failed(); ++i) { const Entry& entry = list[i]; Append(entry.mName, entry.mValue, aRv); } } void InternalHeaders::Fill(const Sequence>& aInit, ErrorResult& aRv) { for (uint32_t i = 0; i < aInit.Length() && !aRv.Failed(); ++i) { const Sequence& tuple = aInit[i]; if (tuple.Length() != 2) { aRv.ThrowTypeError( "Headers require name/value tuples when being initialized by a " "sequence."); return; } Append(tuple[0], tuple[1], aRv); } } void InternalHeaders::Fill(const Record& aInit, ErrorResult& aRv) { for (auto& entry : aInit.Entries()) { Append(entry.mKey, entry.mValue, aRv); if (aRv.Failed()) { return; } } } namespace { class FillHeaders final : public nsIHttpHeaderVisitor { RefPtr mInternalHeaders; ~FillHeaders() = default; public: NS_DECL_ISUPPORTS explicit FillHeaders(InternalHeaders* aInternalHeaders) : mInternalHeaders(aInternalHeaders) { MOZ_DIAGNOSTIC_ASSERT(mInternalHeaders); } NS_IMETHOD VisitHeader(const nsACString& aHeader, const nsACString& aValue) override { mInternalHeaders->Append(aHeader, aValue, IgnoreErrors()); return NS_OK; } }; NS_IMPL_ISUPPORTS(FillHeaders, nsIHttpHeaderVisitor) } // namespace void InternalHeaders::FillResponseHeaders(nsIRequest* aRequest) { nsCOMPtr httpChannel = do_QueryInterface(aRequest); if (!httpChannel) { return; } RefPtr visitor = new FillHeaders(this); nsresult rv = httpChannel->VisitResponseHeaders(visitor); if (NS_FAILED(rv)) { NS_WARNING("failed to fill headers"); } } bool InternalHeaders::HasOnlySimpleHeaders() const { for (uint32_t i = 0; i < mList.Length(); ++i) { if (!nsContentUtils::IsCORSSafelistedRequestHeader(mList[i].mName, mList[i].mValue)) { return false; } } return true; } bool InternalHeaders::HasRevalidationHeaders() const { for (uint32_t i = 0; i < mList.Length(); ++i) { if (IsRevalidationHeader(mList[i].mName)) { return true; } } return false; } // static already_AddRefed InternalHeaders::BasicHeaders( InternalHeaders* aHeaders) { RefPtr basic = new InternalHeaders(*aHeaders); ErrorResult result; // The Set-Cookie headers cannot be invalid mutable headers, so the Delete // must succeed. basic->Delete("Set-Cookie"_ns, result); MOZ_ASSERT(!result.Failed()); basic->Delete("Set-Cookie2"_ns, result); MOZ_ASSERT(!result.Failed()); return basic.forget(); } // static already_AddRefed InternalHeaders::CORSHeaders( InternalHeaders* aHeaders, RequestCredentials aCredentialsMode) { RefPtr cors = new InternalHeaders(aHeaders->mGuard); ErrorResult result; nsAutoCString acExposedNames; aHeaders->Get("Access-Control-Expose-Headers"_ns, acExposedNames, result); MOZ_ASSERT(!result.Failed()); bool allowAllHeaders = false; AutoTArray exposeNamesArray; for (const nsACString& token : nsCCharSeparatedTokenizer(acExposedNames, ',').ToRange()) { if (token.IsEmpty()) { continue; } if (!NS_IsValidHTTPToken(token)) { NS_WARNING( "Got invalid HTTP token in Access-Control-Expose-Headers. Header " "value is:"); NS_WARNING(acExposedNames.get()); exposeNamesArray.Clear(); break; } if (token.EqualsLiteral("*") && aCredentialsMode != RequestCredentials::Include) { allowAllHeaders = true; } exposeNamesArray.AppendElement(token); } nsCaseInsensitiveCStringArrayComparator comp; for (uint32_t i = 0; i < aHeaders->mList.Length(); ++i) { const Entry& entry = aHeaders->mList[i]; if (allowAllHeaders) { cors->Append(entry.mName, entry.mValue, result); MOZ_ASSERT(!result.Failed()); } else if (entry.mName.EqualsIgnoreCase("cache-control") || entry.mName.EqualsIgnoreCase("content-language") || entry.mName.EqualsIgnoreCase("content-type") || entry.mName.EqualsIgnoreCase("content-length") || entry.mName.EqualsIgnoreCase("expires") || entry.mName.EqualsIgnoreCase("last-modified") || entry.mName.EqualsIgnoreCase("pragma") || exposeNamesArray.Contains(entry.mName, comp)) { cors->Append(entry.mName, entry.mValue, result); MOZ_ASSERT(!result.Failed()); } } return cors.forget(); } void InternalHeaders::GetEntries( nsTArray& aEntries) const { MOZ_ASSERT(aEntries.IsEmpty()); aEntries.AppendElements(mList); } void InternalHeaders::GetUnsafeHeaders(nsTArray& aNames) const { MOZ_ASSERT(aNames.IsEmpty()); for (uint32_t i = 0; i < mList.Length(); ++i) { const Entry& header = mList[i]; if (!nsContentUtils::IsCORSSafelistedRequestHeader(header.mName, header.mValue)) { aNames.AppendElement(header.mName); } } } void InternalHeaders::MaybeSortList() { class Comparator { public: bool Equals(const Entry& aA, const Entry& aB) const { return aA.mName == aB.mName; } bool LessThan(const Entry& aA, const Entry& aB) const { return aA.mName < aB.mName; } }; if (!mListDirty) { return; } mListDirty = false; Comparator comparator; mSortedList.Clear(); for (const Entry& entry : mList) { bool found = false; // We combine every header but Set-Cookie. if (!entry.mName.EqualsIgnoreCase("Set-Cookie")) { for (Entry& sortedEntry : mSortedList) { if (sortedEntry.mName.EqualsIgnoreCase(entry.mName.get())) { sortedEntry.mValue += ", "; sortedEntry.mValue += entry.mValue; found = true; break; } } } if (!found) { Entry newEntry = entry; ToLowerCase(newEntry.mName); mSortedList.InsertElementSorted(newEntry, comparator); } } } void InternalHeaders::SetListDirty() { mSortedList.Clear(); mListDirty = true; } void InternalHeaders::ReuseExistingNameIfExists(nsCString& aName) const { for (const Entry& entry : mList) { if (entry.mName.EqualsIgnoreCase(aName.get())) { aName = entry.mName; break; } } } } // namespace mozilla::dom