summaryrefslogtreecommitdiffstats
path: root/dom/security/DOMSecurityMonitor.h
blob: 457e8a143a58151e288165f3dca9a8a6ce736b07 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this file,
 * You can obtain one at http://mozilla.org/MPL/2.0/. */

#ifndef mozilla_dom_DOMSecurityMonitor_h
#define mozilla_dom_DOMSecurityMonitor_h

#include "nsStringFwd.h"

class nsIChannel;
class nsIPrincipal;

class DOMSecurityMonitor final {
 public:
  /* The fragment parser is triggered anytime JS calls innerHTML or similar
   * JS functions which can generate HTML fragments. This generation of
   * HTML might be dangerous, hence we should ensure that no new instances
   * of innerHTML and similar functions are introduced in system privileged
   * contexts, or also about: pages, in our codebase.
   *
   * If the auditor detects a new instance of innerHTML or similar
   * function it will CRASH using a strong assertion.
   */
  static void AuditParsingOfHTMLXMLFragments(nsIPrincipal* aPrincipal,
                                             const nsAString& aFragment);

  /* The use of javascript: URIs in system privileged contexts or
   * also about: pages is considered unsafe and discouraged.
   *
   * If the auditor detects a javascript: URI in a privileged
   * context it will CRASH using a strong assertion.
   *
   */
  static void AuditUseOfJavaScriptURI(nsIChannel* aChannel);

 private:
  DOMSecurityMonitor() = default;
  ~DOMSecurityMonitor() = default;
};

#endif /* mozilla_dom_DOMSecurityMonitor_h */