/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=8 sts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #ifndef __SANDBOXPRIVATE_H__ #define __SANDBOXPRIVATE_H__ #include "mozilla/WeakPtr.h" #include "mozilla/StaticPrefs_dom.h" #include "mozilla/StorageAccess.h" #include "mozilla/net/CookieJarSettings.h" #include "nsContentUtils.h" #include "nsIGlobalObject.h" #include "nsIScriptObjectPrincipal.h" #include "nsIPrincipal.h" #include "nsGlobalWindowInner.h" #include "nsWeakReference.h" #include "nsWrapperCache.h" #include "js/loader/ModuleLoaderBase.h" #include "js/Object.h" // JS::GetPrivate, JS::SetPrivate #include "js/RootingAPI.h" class SandboxPrivate : public nsIGlobalObject, public nsIScriptObjectPrincipal, public nsSupportsWeakReference, public mozilla::SupportsWeakPtr, public nsWrapperCache { public: NS_DECL_CYCLE_COLLECTING_ISUPPORTS NS_DECL_CYCLE_COLLECTION_WRAPPERCACHE_CLASS_AMBIGUOUS(SandboxPrivate, nsIGlobalObject) static void Create(nsIPrincipal* principal, JS::Handle global) { RefPtr sbp = new SandboxPrivate(principal); sbp->SetWrapper(global); sbp->PreserveWrapper(ToSupports(sbp.get())); // Pass on ownership of sbp to |global|. // The type used to cast to void needs to match the one in GetPrivate. nsIScriptObjectPrincipal* sop = static_cast(sbp.forget().take()); JS::SetObjectISupports(global, sop); } static SandboxPrivate* GetPrivate(JSObject* obj) { // The type used to cast to void needs to match the one in Create. nsIScriptObjectPrincipal* sop = JS::GetObjectISupports(obj); return static_cast(sop); } mozilla::OriginTrials Trials() const final { return {}; } nsIPrincipal* GetPrincipal() override { return mPrincipal; } nsIPrincipal* GetEffectiveCookiePrincipal() override { return mPrincipal; } nsIPrincipal* GetEffectiveStoragePrincipal() override { return mPrincipal; } nsIPrincipal* PartitionedPrincipal() override { return mPrincipal; } JSObject* GetGlobalJSObject() override { return GetWrapper(); } JSObject* GetGlobalJSObjectPreserveColor() const override { return GetWrapperPreserveColor(); } mozilla::StorageAccess GetStorageAccess() final { MOZ_ASSERT(NS_IsMainThread()); if (mozilla::StaticPrefs::dom_serviceWorkers_testing_enabled()) { // XXX: This is a hack to workaround bug 1732159 and is not intended return mozilla::StorageAccess::eAllow; } nsCOMPtr cookieJarSettings = mozilla::net::CookieJarSettings::Create(mPrincipal); return mozilla::StorageAllowedForServiceWorker(mPrincipal, cookieJarSettings); } void ForgetGlobalObject(JSObject* obj) { ClearWrapper(obj); } virtual JSObject* WrapObject(JSContext* cx, JS::Handle aGivenProto) override { MOZ_CRASH("SandboxPrivate doesn't use DOM bindings!"); } JS::loader::ModuleLoaderBase* GetModuleLoader(JSContext* aCx) override; mozilla::Result GetStorageKey() override; size_t ObjectMoved(JSObject* obj, JSObject* old) { UpdateWrapper(obj, old); return 0; } bool ShouldResistFingerprinting( RFPTarget aTarget = RFPTarget::Unknown) const override { return nsContentUtils::ShouldResistFingerprinting( "Presently we don't have enough context to make an informed decision" "on JS Sandboxes. See 1782853", aTarget); } private: explicit SandboxPrivate(nsIPrincipal* principal) : mPrincipal(principal) {} virtual ~SandboxPrivate() = default; nsCOMPtr mPrincipal; RefPtr mModuleLoader; }; #endif // __SANDBOXPRIVATE_H__