/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=2 sw=2 et tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "ExpandedPrincipal.h" #include "nsIClassInfoImpl.h" #include "nsIObjectInputStream.h" #include "nsReadableUtils.h" #include "mozilla/Base64.h" #include "mozilla/extensions/WebExtensionPolicy.h" #include "json/json.h" using namespace mozilla; NS_IMPL_CLASSINFO(ExpandedPrincipal, nullptr, 0, NS_EXPANDEDPRINCIPAL_CID) NS_IMPL_QUERY_INTERFACE_CI(ExpandedPrincipal, nsIPrincipal, nsIExpandedPrincipal) NS_IMPL_CI_INTERFACE_GETTER(ExpandedPrincipal, nsIPrincipal, nsIExpandedPrincipal) ExpandedPrincipal::ExpandedPrincipal( nsTArray>&& aPrincipals, const nsACString& aOriginNoSuffix, const OriginAttributes& aAttrs) : BasePrincipal(eExpandedPrincipal, aOriginNoSuffix, aAttrs), mPrincipals(std::move(aPrincipals)) {} ExpandedPrincipal::~ExpandedPrincipal() = default; already_AddRefed ExpandedPrincipal::Create( const nsTArray>& aAllowList, const OriginAttributes& aAttrs) { nsTArray> principals; for (size_t i = 0; i < aAllowList.Length(); ++i) { principals.AppendElement(aAllowList[i]); } nsAutoCString origin; origin.AssignLiteral("[Expanded Principal ["); StringJoinAppend( origin, ", "_ns, principals, [](nsACString& dest, const nsCOMPtr& principal) { nsAutoCString subOrigin; DebugOnly rv = principal->GetOrigin(subOrigin); MOZ_ASSERT(NS_SUCCEEDED(rv)); dest.Append(subOrigin); }); origin.AppendLiteral("]]"); RefPtr ep = new ExpandedPrincipal(std::move(principals), origin, aAttrs); return ep.forget(); } NS_IMETHODIMP ExpandedPrincipal::GetDomain(nsIURI** aDomain) { *aDomain = nullptr; return NS_OK; } NS_IMETHODIMP ExpandedPrincipal::SetDomain(nsIURI* aDomain) { return NS_OK; } bool ExpandedPrincipal::SubsumesInternal( nsIPrincipal* aOther, BasePrincipal::DocumentDomainConsideration aConsideration) { // If aOther is an ExpandedPrincipal too, we break it down into its component // nsIPrincipals, and check subsumes on each one. if (Cast(aOther)->Is()) { auto* expanded = Cast(aOther)->As(); for (auto& other : expanded->AllowList()) { // Use SubsumesInternal rather than Subsumes here, since OriginAttribute // checks are only done between non-expanded sub-principals, and we don't // need to incur the extra virtual call overhead. if (!SubsumesInternal(other, aConsideration)) { return false; } } return true; } // We're dealing with a regular principal. One of our principals must subsume // it. for (uint32_t i = 0; i < mPrincipals.Length(); ++i) { if (Cast(mPrincipals[i])->Subsumes(aOther, aConsideration)) { return true; } } return false; } bool ExpandedPrincipal::MayLoadInternal(nsIURI* uri) { for (uint32_t i = 0; i < mPrincipals.Length(); ++i) { if (BasePrincipal::Cast(mPrincipals[i])->MayLoadInternal(uri)) { return true; } } return false; } uint32_t ExpandedPrincipal::GetHashValue() { MOZ_CRASH("extended principal should never be used as key in a hash map"); } NS_IMETHODIMP ExpandedPrincipal::GetURI(nsIURI** aURI) { *aURI = nullptr; return NS_OK; } const nsTArray>& ExpandedPrincipal::AllowList() { return mPrincipals; } NS_IMETHODIMP ExpandedPrincipal::GetBaseDomain(nsACString& aBaseDomain) { return NS_ERROR_NOT_AVAILABLE; } NS_IMETHODIMP ExpandedPrincipal::GetAddonId(nsAString& aAddonId) { aAddonId.Truncate(); return NS_OK; }; bool ExpandedPrincipal::AddonHasPermission(const nsAtom* aPerm) { for (size_t i = 0; i < mPrincipals.Length(); ++i) { if (BasePrincipal::Cast(mPrincipals[i])->AddonHasPermission(aPerm)) { return true; } } return false; } bool ExpandedPrincipal::AddonAllowsLoad(nsIURI* aURI, bool aExplicit /* = false */) { for (const auto& principal : mPrincipals) { if (Cast(principal)->AddonAllowsLoad(aURI, aExplicit)) { return true; } } return false; } void ExpandedPrincipal::SetCsp(nsIContentSecurityPolicy* aCSP) { AssertIsOnMainThread(); mCSP = new nsMainThreadPtrHolder( "ExpandedPrincipal::mCSP", aCSP); } NS_IMETHODIMP ExpandedPrincipal::GetCsp(nsIContentSecurityPolicy** aCsp) { AssertIsOnMainThread(); NS_IF_ADDREF(*aCsp = mCSP); return NS_OK; } nsIPrincipal* ExpandedPrincipal::PrincipalToInherit(nsIURI* aRequestedURI) { if (aRequestedURI) { // If a given sub-principal subsumes the given URI, use that principal for // inheritance. In general, this only happens with certain CORS modes, loads // with forced principal inheritance, and creation of XML documents from // XMLHttpRequests or fetch requests. For URIs that normally inherit a // principal (such as data: URIs), we fall back to the last principal in the // allowlist. for (const auto& principal : mPrincipals) { if (Cast(principal)->MayLoadInternal(aRequestedURI)) { return principal; } } } return mPrincipals.LastElement(); } nsresult ExpandedPrincipal::GetScriptLocation(nsACString& aStr) { aStr.AssignLiteral("[Expanded Principal ["); for (size_t i = 0; i < mPrincipals.Length(); ++i) { if (i != 0) { aStr.AppendLiteral(", "); } nsAutoCString spec; nsresult rv = nsJSPrincipals::get(mPrincipals.ElementAt(i))->GetScriptLocation(spec); NS_ENSURE_SUCCESS(rv, rv); aStr.Append(spec); } aStr.AppendLiteral("]]"); return NS_OK; } ////////////////////////////////////////// // Methods implementing nsISerializable // ////////////////////////////////////////// // We've had way too many issues with unversioned serializations, so // explicitly version this one. static const uint32_t kSerializationVersion = 1; NS_IMETHODIMP ExpandedPrincipal::Deserializer::Read(nsIObjectInputStream* aStream) { uint32_t version; nsresult rv = aStream->Read32(&version); if (version != kSerializationVersion) { MOZ_ASSERT(false, "We really need to add handling of the old(?) version here"); return NS_ERROR_UNEXPECTED; } uint32_t count; rv = aStream->Read32(&count); if (NS_FAILED(rv)) { return rv; } nsTArray> principals; if (!principals.SetCapacity(count, fallible)) { return NS_ERROR_OUT_OF_MEMORY; } for (uint32_t i = 0; i < count; ++i) { nsCOMPtr read; rv = aStream->ReadObject(true, getter_AddRefs(read)); if (NS_FAILED(rv)) { return rv; } nsCOMPtr principal = do_QueryInterface(read); if (!principal) { return NS_ERROR_UNEXPECTED; } principals.AppendElement(std::move(principal)); } mPrincipal = ExpandedPrincipal::Create(principals, OriginAttributes()); return NS_OK; } nsresult ExpandedPrincipal::GetSiteIdentifier(SiteIdentifier& aSite) { // Call GetSiteIdentifier on each of our principals and return a new // ExpandedPrincipal. nsTArray> allowlist; for (const auto& principal : mPrincipals) { SiteIdentifier site; nsresult rv = Cast(principal)->GetSiteIdentifier(site); NS_ENSURE_SUCCESS(rv, rv); allowlist.AppendElement(site.GetPrincipal()); } RefPtr expandedPrincipal = ExpandedPrincipal::Create(allowlist, OriginAttributesRef()); MOZ_ASSERT(expandedPrincipal, "ExpandedPrincipal::Create returned nullptr?"); aSite.Init(expandedPrincipal); return NS_OK; } nsresult ExpandedPrincipal::PopulateJSONObject(Json::Value& aObject) { Json::Value& principalList = aObject[Json::StaticString(JSONEnumKeyString())] = Json::arrayValue; for (const auto& principal : mPrincipals) { Json::Value object = Json::objectValue; nsresult rv = BasePrincipal::Cast(principal)->ToJSON(object); NS_ENSURE_SUCCESS(rv, rv); principalList.append(std::move(object)); } nsAutoCString suffix; OriginAttributesRef().CreateSuffix(suffix); if (suffix.Length() > 0) { SetJSONValue(aObject, suffix); } return NS_OK; } already_AddRefed ExpandedPrincipal::FromProperties( nsTArray& aFields) { MOZ_ASSERT(aFields.Length() == eMax + 1, "Must have all the keys"); nsTArray> allowList; OriginAttributes attrs; // The odd structure here is to make the code to not compile // if all the switch enum cases haven't been codified for (const auto& field : aFields) { switch (field.key) { case ExpandedPrincipal::eSpecs: if (!field.valueWasSerialized) { MOZ_ASSERT(false, "Expanded principals require specs in serialized JSON"); return nullptr; } for (const nsACString& each : field.value.Split(',')) { nsAutoCString result; nsresult rv; rv = Base64Decode(each, result); MOZ_ASSERT(NS_SUCCEEDED(rv), "failed to decode"); NS_ENSURE_SUCCESS(rv, nullptr); nsCOMPtr principal = BasePrincipal::FromJSON(result); allowList.AppendElement(principal); } break; case ExpandedPrincipal::eSuffix: if (field.valueWasSerialized) { bool ok = attrs.PopulateFromSuffix(field.value); if (!ok) { return nullptr; } } break; } } if (allowList.Length() == 0) { return nullptr; } RefPtr expandedPrincipal = ExpandedPrincipal::Create(allowList, attrs); return expandedPrincipal.forget(); } /* static */ already_AddRefed ExpandedPrincipal::FromProperties( const Json::Value& aJSON) { MOZ_ASSERT(aJSON.size() <= eMax + 1, "Must have at most, all the properties"); const std::string specs = std::to_string(eSpecs); const std::string suffix = std::to_string(eSuffix); MOZ_ASSERT(aJSON.isMember(specs), "The eSpecs member is required"); MOZ_ASSERT(aJSON.size() == 1 || aJSON.isMember(suffix), "eSuffix is optional"); const auto* specsValue = aJSON.find(specs.c_str(), specs.c_str() + specs.length()); if (!specsValue) { MOZ_ASSERT(false, "Expanded principals require specs in serialized JSON"); return nullptr; } nsTArray> allowList; for (const auto& principalJSON : *specsValue) { if (nsCOMPtr principal = BasePrincipal::FromJSON(principalJSON)) { allowList.AppendElement(principal); } } if (allowList.Length() == 0) { return nullptr; } OriginAttributes attrs; if (aJSON.isMember(suffix)) { const auto& value = aJSON[suffix]; if (!value.isString()) { return nullptr; } bool ok = attrs.PopulateFromSuffix(nsDependentCString(value.asCString())); if (!ok) { return nullptr; } } RefPtr expandedPrincipal = ExpandedPrincipal::Create(allowList, attrs); return expandedPrincipal.forget(); } NS_IMETHODIMP ExpandedPrincipal::IsThirdPartyURI(nsIURI* aURI, bool* aRes) { // ExpandedPrincipal for extension content scripts consist of two principals, // the document's principal and the extension's principal. // To make sure that the third-party check behaves like the web page on which // the content script is running, ignore the extension's principal. for (const auto& principal : mPrincipals) { if (!Cast(principal)->AddonPolicyCore()) { return Cast(principal)->IsThirdPartyURI(aURI, aRes); } } if (mPrincipals.IsEmpty()) { *aRes = true; return NS_OK; } return Cast(mPrincipals[0])->IsThirdPartyURI(aURI, aRes); }