diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 17:32:43 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 17:32:43 +0000 |
commit | 6bf0a5cb5034a7e684dcc3500e841785237ce2dd (patch) | |
tree | a68f146d7fa01f0134297619fbe7e33db084e0aa /dom/workers/WorkerCSPEventListener.cpp | |
parent | Initial commit. (diff) | |
download | thunderbird-6bf0a5cb5034a7e684dcc3500e841785237ce2dd.tar.xz thunderbird-6bf0a5cb5034a7e684dcc3500e841785237ce2dd.zip |
Adding upstream version 1:115.7.0.upstream/1%115.7.0upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'dom/workers/WorkerCSPEventListener.cpp')
-rw-r--r-- | dom/workers/WorkerCSPEventListener.cpp | 104 |
1 files changed, 104 insertions, 0 deletions
diff --git a/dom/workers/WorkerCSPEventListener.cpp b/dom/workers/WorkerCSPEventListener.cpp new file mode 100644 index 0000000000..bcfe219cc7 --- /dev/null +++ b/dom/workers/WorkerCSPEventListener.cpp @@ -0,0 +1,104 @@ +/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ +/* vim: set ts=8 sts=2 et sw=2 tw=80: */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "WorkerCSPEventListener.h" +#include "WorkerRef.h" +#include "WorkerRunnable.h" +#include "WorkerScope.h" +#include "mozilla/dom/SecurityPolicyViolationEvent.h" +#include "mozilla/dom/SecurityPolicyViolationEventBinding.h" +#include "mozilla/dom/WorkerRunnable.h" + +using namespace mozilla::dom; + +namespace { + +class WorkerCSPEventRunnable final : public MainThreadWorkerRunnable { + public: + WorkerCSPEventRunnable(WorkerPrivate* aWorkerPrivate, const nsAString& aJSON) + : MainThreadWorkerRunnable(aWorkerPrivate), mJSON(aJSON) {} + + private: + bool WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate) { + SecurityPolicyViolationEventInit violationEventInit; + if (NS_WARN_IF(!violationEventInit.Init(mJSON))) { + return true; + } + + RefPtr<mozilla::dom::Event> event = + mozilla::dom::SecurityPolicyViolationEvent::Constructor( + aWorkerPrivate->GlobalScope(), u"securitypolicyviolation"_ns, + violationEventInit); + event->SetTrusted(true); + + aWorkerPrivate->GlobalScope()->DispatchEvent(*event); + return true; + } + + const nsString mJSON; +}; + +} // namespace + +NS_IMPL_ISUPPORTS(WorkerCSPEventListener, nsICSPEventListener) + +/* static */ +already_AddRefed<WorkerCSPEventListener> WorkerCSPEventListener::Create( + WorkerPrivate* aWorkerPrivate) { + MOZ_ASSERT(aWorkerPrivate); + aWorkerPrivate->AssertIsOnWorkerThread(); + + RefPtr<WorkerCSPEventListener> listener = new WorkerCSPEventListener(); + + MutexAutoLock lock(listener->mMutex); + listener->mWorkerRef = WeakWorkerRef::Create(aWorkerPrivate, [listener]() { + MutexAutoLock lock(listener->mMutex); + listener->mWorkerRef = nullptr; + }); + + if (NS_WARN_IF(!listener->mWorkerRef)) { + return nullptr; + } + + return listener.forget(); +} + +WorkerCSPEventListener::WorkerCSPEventListener() + : mMutex("WorkerCSPEventListener::mMutex") {} + +NS_IMETHODIMP +WorkerCSPEventListener::OnCSPViolationEvent(const nsAString& aJSON) { + MutexAutoLock lock(mMutex); + if (!mWorkerRef) { + return NS_OK; + } + + WorkerPrivate* workerPrivate = mWorkerRef->GetUnsafePrivate(); + MOZ_ASSERT(workerPrivate); + + if (NS_IsMainThread()) { + RefPtr<WorkerCSPEventRunnable> runnable = + new WorkerCSPEventRunnable(workerPrivate, aJSON); + runnable->Dispatch(); + + return NS_OK; + } + + SecurityPolicyViolationEventInit violationEventInit; + if (NS_WARN_IF(!violationEventInit.Init(aJSON))) { + return NS_ERROR_UNEXPECTED; + } + + RefPtr<mozilla::dom::Event> event = + mozilla::dom::SecurityPolicyViolationEvent::Constructor( + workerPrivate->GlobalScope(), u"securitypolicyviolation"_ns, + violationEventInit); + event->SetTrusted(true); + + workerPrivate->GlobalScope()->DispatchEvent(*event); + + return NS_OK; +} |