blob: 3af049455800f025633e1e0c4c57a02c3ff95f15 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
* You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "RejectForeignAllowList.h"
#include "mozilla/dom/Document.h"
#include "mozilla/BasePrincipal.h"
#include "mozilla/ClearOnShutdown.h"
#include "mozilla/StaticPtr.h"
#include "nsIHttpChannel.h"
#include "nsIURI.h"
#include "nsNetUtil.h"
#include "nsScriptSecurityManager.h"
#define REJECTFOREIGNALLOWLIST_PREF "privacy.rejectForeign.allowList"_ns
#define REJECTFOREIGNALLOWLIST_NAME "RejectForeignAllowList"_ns
namespace mozilla {
namespace {
StaticRefPtr<RejectForeignAllowList> gRejectForeignAllowList;
} // namespace
// static
bool RejectForeignAllowList::Check(dom::Document* aDocument) {
MOZ_ASSERT(aDocument);
nsIURI* documentURI = aDocument->GetDocumentURI();
if (!documentURI) {
return false;
}
return GetOrCreate()->CheckInternal(documentURI);
}
// static
bool RejectForeignAllowList::Check(nsIHttpChannel* aChannel) {
MOZ_ASSERT(aChannel);
nsCOMPtr<nsIURI> channelURI;
nsresult rv = NS_GetFinalChannelURI(aChannel, getter_AddRefs(channelURI));
if (NS_WARN_IF(NS_FAILED(rv))) {
return false;
}
return GetOrCreate()->CheckInternal(channelURI);
}
// static
bool RejectForeignAllowList::Check(nsIPrincipal* aPrincipal) {
return GetOrCreate()->CheckInternal(aPrincipal);
}
// static
RejectForeignAllowList* RejectForeignAllowList::GetOrCreate() {
if (!gRejectForeignAllowList) {
gRejectForeignAllowList = new RejectForeignAllowList();
nsCOMPtr<nsIUrlClassifierExceptionListService> exceptionListService =
do_GetService("@mozilla.org/url-classifier/exception-list-service;1");
if (exceptionListService) {
exceptionListService->RegisterAndRunExceptionListObserver(
REJECTFOREIGNALLOWLIST_NAME, REJECTFOREIGNALLOWLIST_PREF,
gRejectForeignAllowList);
}
RunOnShutdown([exceptionListService] {
if (gRejectForeignAllowList) {
if (exceptionListService) {
exceptionListService->UnregisterExceptionListObserver(
REJECTFOREIGNALLOWLIST_NAME, gRejectForeignAllowList);
}
gRejectForeignAllowList = nullptr;
}
});
}
return gRejectForeignAllowList;
}
// static
bool RejectForeignAllowList::Check(nsIURI* aURI) {
return GetOrCreate()->CheckInternal(aURI);
}
bool RejectForeignAllowList::CheckInternal(nsIURI* aURI) {
MOZ_ASSERT(aURI);
return nsContentUtils::IsURIInList(aURI, mList);
}
bool RejectForeignAllowList::CheckInternal(nsIPrincipal* aPrincipal) {
MOZ_ASSERT(aPrincipal);
auto* basePrin = BasePrincipal::Cast(aPrincipal);
if (!basePrin) {
return false;
}
bool result = false;
basePrin->IsURIInList(mList, &result);
return result;
}
NS_IMETHODIMP
RejectForeignAllowList::OnExceptionListUpdate(const nsACString& aList) {
mList = aList;
return NS_OK;
}
RejectForeignAllowList::RejectForeignAllowList() = default;
RejectForeignAllowList::~RejectForeignAllowList() = default;
NS_INTERFACE_MAP_BEGIN(RejectForeignAllowList)
NS_INTERFACE_MAP_ENTRY_AMBIGUOUS(nsISupports,
nsIUrlClassifierExceptionListObserver)
NS_INTERFACE_MAP_ENTRY(nsIUrlClassifierExceptionListObserver)
NS_INTERFACE_MAP_END
NS_IMPL_ADDREF(RejectForeignAllowList)
NS_IMPL_RELEASE(RejectForeignAllowList)
} // namespace mozilla
|