diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 17:32:43 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 17:32:43 +0000 |
commit | 6bf0a5cb5034a7e684dcc3500e841785237ce2dd (patch) | |
tree | a68f146d7fa01f0134297619fbe7e33db084e0aa /toolkit/components/clearsitedata/ClearSiteData.cpp | |
parent | Initial commit. (diff) | |
download | thunderbird-upstream.tar.xz thunderbird-upstream.zip |
Adding upstream version 1:115.7.0.upstream/1%115.7.0upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'toolkit/components/clearsitedata/ClearSiteData.cpp')
-rw-r--r-- | toolkit/components/clearsitedata/ClearSiteData.cpp | 315 |
1 files changed, 315 insertions, 0 deletions
diff --git a/toolkit/components/clearsitedata/ClearSiteData.cpp b/toolkit/components/clearsitedata/ClearSiteData.cpp new file mode 100644 index 0000000000..2ce6734f74 --- /dev/null +++ b/toolkit/components/clearsitedata/ClearSiteData.cpp @@ -0,0 +1,315 @@ +/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ +/* vim: set ts=8 sts=2 et sw=2 tw=80: */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this file, + * You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "ClearSiteData.h" + +#include "mozilla/net/HttpBaseChannel.h" +#include "mozilla/OriginAttributes.h" +#include "mozilla/Preferences.h" +#include "mozilla/Services.h" +#include "mozilla/Unused.h" +#include "nsASCIIMask.h" +#include "nsCharSeparatedTokenizer.h" +#include "nsContentSecurityManager.h" +#include "nsContentUtils.h" +#include "nsIClearDataService.h" +#include "nsIHttpChannel.h" +#include "nsIHttpProtocolHandler.h" +#include "nsIObserverService.h" +#include "nsIPrincipal.h" +#include "nsIScriptError.h" +#include "nsIScriptSecurityManager.h" +#include "nsNetUtil.h" + +using namespace mozilla; + +namespace { + +StaticRefPtr<ClearSiteData> gClearSiteData; + +} // namespace + +// This object is used to suspend/resume the channel. +class ClearSiteData::PendingCleanupHolder final : public nsIClearDataCallback { + public: + NS_DECL_ISUPPORTS + + explicit PendingCleanupHolder(nsIHttpChannel* aChannel) + : mChannel(aChannel), mPendingOp(false) {} + + nsresult Start() { + MOZ_ASSERT(!mPendingOp); + nsresult rv = mChannel->Suspend(); + if (NS_WARN_IF(NS_FAILED(rv))) { + return rv; + } + + mPendingOp = true; + return NS_OK; + } + + // nsIClearDataCallback interface + + NS_IMETHOD + OnDataDeleted(uint32_t aFailedFlags) override { + MOZ_ASSERT(mPendingOp); + mPendingOp = false; + + mChannel->Resume(); + mChannel = nullptr; + + return NS_OK; + } + + private: + ~PendingCleanupHolder() { + if (mPendingOp) { + mChannel->Resume(); + } + } + + nsCOMPtr<nsIHttpChannel> mChannel; + bool mPendingOp; +}; + +NS_INTERFACE_MAP_BEGIN(ClearSiteData::PendingCleanupHolder) + NS_INTERFACE_MAP_ENTRY_AMBIGUOUS(nsISupports, nsIClearDataCallback) + NS_INTERFACE_MAP_ENTRY(nsIClearDataCallback) +NS_INTERFACE_MAP_END + +NS_IMPL_ADDREF(ClearSiteData::PendingCleanupHolder) +NS_IMPL_RELEASE(ClearSiteData::PendingCleanupHolder) + +/* static */ +void ClearSiteData::Initialize() { + MOZ_ASSERT(!gClearSiteData); + MOZ_ASSERT(NS_IsMainThread()); + + if (!XRE_IsParentProcess()) { + return; + } + + RefPtr<ClearSiteData> service = new ClearSiteData(); + + nsCOMPtr<nsIObserverService> obs = services::GetObserverService(); + if (NS_WARN_IF(!obs)) { + return; + } + + obs->AddObserver(service, NS_HTTP_ON_EXAMINE_RESPONSE_TOPIC, false); + obs->AddObserver(service, NS_XPCOM_SHUTDOWN_OBSERVER_ID, false); + gClearSiteData = service; +} + +/* static */ +void ClearSiteData::Shutdown() { + MOZ_ASSERT(NS_IsMainThread()); + + if (!gClearSiteData) { + return; + } + + RefPtr<ClearSiteData> service = gClearSiteData; + gClearSiteData = nullptr; + + nsCOMPtr<nsIObserverService> obs = services::GetObserverService(); + if (NS_WARN_IF(!obs)) { + return; + } + + obs->RemoveObserver(service, NS_HTTP_ON_EXAMINE_RESPONSE_TOPIC); + obs->RemoveObserver(service, NS_XPCOM_SHUTDOWN_OBSERVER_ID); +} + +ClearSiteData::ClearSiteData() = default; +ClearSiteData::~ClearSiteData() = default; + +NS_IMETHODIMP +ClearSiteData::Observe(nsISupports* aSubject, const char* aTopic, + const char16_t* aData) { + if (!strcmp(aTopic, NS_XPCOM_SHUTDOWN_OBSERVER_ID)) { + Shutdown(); + return NS_OK; + } + + MOZ_ASSERT(!strcmp(aTopic, NS_HTTP_ON_EXAMINE_RESPONSE_TOPIC)); + + nsCOMPtr<nsIHttpChannel> channel = do_QueryInterface(aSubject); + if (NS_WARN_IF(!channel)) { + return NS_OK; + } + + ClearDataFromChannel(channel); + return NS_OK; +} + +void ClearSiteData::ClearDataFromChannel(nsIHttpChannel* aChannel) { + MOZ_ASSERT(aChannel); + + nsresult rv; + nsCOMPtr<nsIURI> uri; + + nsIScriptSecurityManager* ssm = nsContentUtils::GetSecurityManager(); + if (NS_WARN_IF(!ssm)) { + return; + } + + nsCOMPtr<nsIPrincipal> principal; + rv = ssm->GetChannelResultStoragePrincipal(aChannel, + getter_AddRefs(principal)); + if (NS_WARN_IF(NS_FAILED(rv) || !principal)) { + return; + } + + bool secure = principal->GetIsOriginPotentiallyTrustworthy(); + if (NS_WARN_IF(NS_FAILED(rv)) || !secure) { + return; + } + + // We want to use the final URI to check if Clear-Site-Data should be allowed + // or not. + rv = aChannel->GetURI(getter_AddRefs(uri)); + if (NS_WARN_IF(NS_FAILED(rv))) { + return; + } + + uint32_t flags = ParseHeader(aChannel, uri); + if (flags == 0) { + // Nothing to do. + return; + } + + int32_t cleanFlags = 0; + RefPtr<PendingCleanupHolder> holder = new PendingCleanupHolder(aChannel); + + if (flags & eCookies) { + LogOpToConsole(aChannel, uri, eCookies); + cleanFlags |= nsIClearDataService::CLEAR_COOKIES; + } + + if (flags & eStorage) { + LogOpToConsole(aChannel, uri, eStorage); + cleanFlags |= nsIClearDataService::CLEAR_DOM_STORAGES; + } + + if (cleanFlags) { + nsCOMPtr<nsIClearDataService> csd = + do_GetService("@mozilla.org/clear-data-service;1"); + MOZ_ASSERT(csd); + + rv = holder->Start(); + if (NS_WARN_IF(NS_FAILED(rv))) { + return; + } + + rv = csd->DeleteDataFromPrincipal(principal, false /* user request */, + cleanFlags, holder); + if (NS_WARN_IF(NS_FAILED(rv))) { + return; + } + } +} + +uint32_t ClearSiteData::ParseHeader(nsIHttpChannel* aChannel, + nsIURI* aURI) const { + MOZ_ASSERT(aChannel); + + nsAutoCString headerValue; + nsresult rv = aChannel->GetResponseHeader("Clear-Site-Data"_ns, headerValue); + if (NS_FAILED(rv)) { + return 0; + } + + uint32_t flags = 0; + + for (auto value : nsCCharSeparatedTokenizer(headerValue, ',').ToRange()) { + // XXX This seems unnecessary, since the tokenizer already strips whitespace + // around tokens. + value.StripTaggedASCII(mozilla::ASCIIMask::MaskWhitespace()); + + if (value.EqualsLiteral("\"cookies\"")) { + flags |= eCookies; + continue; + } + + if (value.EqualsLiteral("\"storage\"")) { + flags |= eStorage; + continue; + } + + if (value.EqualsLiteral("\"*\"")) { + flags = eCookies | eStorage; + break; + } + + LogErrorToConsole(aChannel, aURI, value); + } + + return flags; +} + +void ClearSiteData::LogOpToConsole(nsIHttpChannel* aChannel, nsIURI* aURI, + Type aType) const { + nsAutoString type; + TypeToString(aType, type); + + nsTArray<nsString> params; + params.AppendElement(type); + + LogToConsoleInternal(aChannel, aURI, "RunningClearSiteDataValue", params); +} + +void ClearSiteData::LogErrorToConsole(nsIHttpChannel* aChannel, nsIURI* aURI, + const nsACString& aUnknownType) const { + nsTArray<nsString> params; + params.AppendElement(NS_ConvertUTF8toUTF16(aUnknownType)); + + LogToConsoleInternal(aChannel, aURI, "UnknownClearSiteDataValue", params); +} + +void ClearSiteData::LogToConsoleInternal( + nsIHttpChannel* aChannel, nsIURI* aURI, const char* aMsg, + const nsTArray<nsString>& aParams) const { + MOZ_ASSERT(aChannel); + + nsCOMPtr<net::HttpBaseChannel> httpChannel = do_QueryInterface(aChannel); + if (!httpChannel) { + return; + } + + nsAutoCString uri; + nsresult rv = aURI->GetSpec(uri); + if (NS_WARN_IF(NS_FAILED(rv))) { + return; + } + + httpChannel->AddConsoleReport(nsIScriptError::infoFlag, "Clear-Site-Data"_ns, + nsContentUtils::eSECURITY_PROPERTIES, uri, 0, 0, + nsDependentCString(aMsg), aParams); +} + +void ClearSiteData::TypeToString(Type aType, nsAString& aStr) const { + switch (aType) { + case eCookies: + aStr.AssignLiteral("cookies"); + break; + + case eStorage: + aStr.AssignLiteral("storage"); + break; + + default: + MOZ_CRASH("Unknown type."); + } +} + +NS_INTERFACE_MAP_BEGIN(ClearSiteData) + NS_INTERFACE_MAP_ENTRY_AMBIGUOUS(nsISupports, nsIObserver) + NS_INTERFACE_MAP_ENTRY(nsIObserver) +NS_INTERFACE_MAP_END + +NS_IMPL_ADDREF(ClearSiteData) +NS_IMPL_RELEASE(ClearSiteData) |