From 36d22d82aa202bb199967e9512281e9a53db42c9 Mon Sep 17 00:00:00 2001
From: Daniel Baumann <daniel.baumann@progress-linux.org>
Date: Sun, 7 Apr 2024 21:33:14 +0200
Subject: Adding upstream version 115.7.0esr.

Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
---
 dom/reporting/ReportingHeader.h | 142 ++++++++++++++++++++++++++++++++++++++++
 1 file changed, 142 insertions(+)
 create mode 100644 dom/reporting/ReportingHeader.h

(limited to 'dom/reporting/ReportingHeader.h')

diff --git a/dom/reporting/ReportingHeader.h b/dom/reporting/ReportingHeader.h
new file mode 100644
index 0000000000..d0db5f612b
--- /dev/null
+++ b/dom/reporting/ReportingHeader.h
@@ -0,0 +1,142 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* vim: set ts=8 sts=2 et sw=2 tw=80: */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this file,
+ * You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#ifndef mozilla_dom_ReportingHeader_h
+#define mozilla_dom_ReportingHeader_h
+
+#include "mozilla/TimeStamp.h"
+#include "nsClassHashtable.h"
+#include "nsIObserver.h"
+#include "nsITimer.h"
+#include "nsTObserverArray.h"
+
+class nsIHttpChannel;
+class nsIPrincipal;
+class nsIURI;
+
+namespace mozilla {
+
+class OriginAttributesPattern;
+
+namespace ipc {
+class PrincipalInfo;
+}
+
+namespace dom {
+
+class ReportingHeader final : public nsIObserver,
+                              public nsITimerCallback,
+                              public nsINamed {
+ public:
+  NS_DECL_ISUPPORTS
+  NS_DECL_NSIOBSERVER
+  NS_DECL_NSITIMERCALLBACK
+  NS_DECL_NSINAMED
+
+  static void Initialize();
+
+  // Exposed structs for gtests
+
+  struct Endpoint {
+    nsCOMPtr<nsIURI> mUrl;
+    uint32_t mPriority;
+    uint32_t mWeight;
+  };
+
+  struct Group {
+    nsString mName;
+    bool mIncludeSubdomains;
+    int32_t mTTL;
+    TimeStamp mCreationTime;
+    nsTObserverArray<Endpoint> mEndpoints;
+  };
+
+  struct Client {
+    nsTObserverArray<Group> mGroups;
+  };
+
+  static UniquePtr<Client> ParseHeader(nsIHttpChannel* aChannel, nsIURI* aURI,
+                                       const nsACString& aHeaderValue);
+
+  static void GetEndpointForReport(
+      const nsAString& aGroupName,
+      const mozilla::ipc::PrincipalInfo& aPrincipalInfo,
+      nsACString& aEndpointURI);
+
+  static void GetEndpointForReport(const nsAString& aGroupName,
+                                   nsIPrincipal* aPrincipal,
+                                   nsACString& aEndpointURI);
+
+  static void RemoveEndpoint(const nsAString& aGroupName,
+                             const nsACString& aEndpointURL,
+                             const mozilla::ipc::PrincipalInfo& aPrincipalInfo);
+
+  // ChromeOnly-WebIDL methods
+
+  static bool HasReportingHeaderForOrigin(const nsACString& aOrigin);
+
+ private:
+  ReportingHeader();
+  ~ReportingHeader();
+
+  static void Shutdown();
+
+  // Checks if a channel contains a Report-To header and parses its value.
+  void ReportingFromChannel(nsIHttpChannel* aChannel);
+
+  // This method checks if the protocol handler of the URI has the
+  // URI_IS_POTENTIALLY_TRUSTWORTHY flag.
+  bool IsSecureURI(nsIURI* aURI) const;
+
+  void RemoveOriginsFromHost(const nsAString& aHost);
+
+  void RemoveOriginsFromOriginAttributesPattern(
+      const OriginAttributesPattern& aPattern);
+
+  void RemoveOrigins();
+
+  void RemoveOriginsForTTL();
+
+  void MaybeCreateCleanupTimer();
+
+  void MaybeCancelCleanupTimer();
+
+  static void LogToConsoleInvalidJSON(nsIHttpChannel* aChannel, nsIURI* aURI);
+
+  static void LogToConsoleDuplicateGroup(nsIHttpChannel* aChannel, nsIURI* aURI,
+                                         const nsAString& aName);
+
+  static void LogToConsoleInvalidNameItem(nsIHttpChannel* aChannel,
+                                          nsIURI* aURI);
+
+  static void LogToConsoleIncompleteItem(nsIHttpChannel* aChannel, nsIURI* aURI,
+                                         const nsAString& aName);
+
+  static void LogToConsoleIncompleteEndpoint(nsIHttpChannel* aChannel,
+                                             nsIURI* aURI,
+                                             const nsAString& aName);
+
+  static void LogToConsoleInvalidURLEndpoint(nsIHttpChannel* aChannel,
+                                             nsIURI* aURI,
+                                             const nsAString& aName,
+                                             const nsAString& aURL);
+
+  static void LogToConsoleInternal(nsIHttpChannel* aChannel, nsIURI* aURI,
+                                   const char* aMsg,
+                                   const nsTArray<nsString>& aParams);
+
+  static void GetEndpointForReportInternal(const ReportingHeader::Group& aGrup,
+                                           nsACString& aEndpointURI);
+
+  nsClassHashtable<nsCStringHashKey, Client> mOrigins;
+
+  nsCOMPtr<nsITimer> mCleanupTimer;
+};
+
+}  // namespace dom
+}  // namespace mozilla
+
+#endif  // mozilla_dom_ReportingHeader_h
-- 
cgit v1.2.3