123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293 |
- "use strict";
- let ssm = Services.scriptSecurityManager;
- // This will show a directory listing, but we never actually load these so that's OK.
- const kDummyPage = getRootDirectory(gTestPath);
- const kAboutPagesRegistered = Promise.all([
- BrowserTestUtils.registerAboutPage(
- registerCleanupFunction, "test-chrome-privs", kDummyPage,
- Ci.nsIAboutModule.ALLOW_SCRIPT),
- BrowserTestUtils.registerAboutPage(
- registerCleanupFunction, "test-chrome-privs2", kDummyPage,
- Ci.nsIAboutModule.ALLOW_SCRIPT),
- BrowserTestUtils.registerAboutPage(
- registerCleanupFunction, "test-unknown-linkable", kDummyPage,
- Ci.nsIAboutModule.MAKE_LINKABLE | Ci.nsIAboutModule.ALLOW_SCRIPT),
- BrowserTestUtils.registerAboutPage(
- registerCleanupFunction, "test-unknown-linkable2", kDummyPage,
- Ci.nsIAboutModule.MAKE_LINKABLE | Ci.nsIAboutModule.ALLOW_SCRIPT),
- BrowserTestUtils.registerAboutPage(
- registerCleanupFunction, "test-unknown-unlinkable", kDummyPage,
- Ci.nsIAboutModule.ALLOW_SCRIPT),
- BrowserTestUtils.registerAboutPage(
- registerCleanupFunction, "test-unknown-unlinkable2", kDummyPage,
- Ci.nsIAboutModule.ALLOW_SCRIPT),
- BrowserTestUtils.registerAboutPage(
- registerCleanupFunction, "test-content-unlinkable", kDummyPage,
- Ci.nsIAboutModule.URI_SAFE_FOR_UNTRUSTED_CONTENT | Ci.nsIAboutModule.ALLOW_SCRIPT),
- BrowserTestUtils.registerAboutPage(
- registerCleanupFunction, "test-content-unlinkable2", kDummyPage,
- Ci.nsIAboutModule.URI_SAFE_FOR_UNTRUSTED_CONTENT | Ci.nsIAboutModule.ALLOW_SCRIPT),
- BrowserTestUtils.registerAboutPage(
- registerCleanupFunction, "test-content-linkable", kDummyPage,
- Ci.nsIAboutModule.URI_SAFE_FOR_UNTRUSTED_CONTENT | Ci.nsIAboutModule.MAKE_LINKABLE |
- Ci.nsIAboutModule.ALLOW_SCRIPT),
- BrowserTestUtils.registerAboutPage(
- registerCleanupFunction, "test-content-linkable2", kDummyPage,
- Ci.nsIAboutModule.URI_SAFE_FOR_UNTRUSTED_CONTENT | Ci.nsIAboutModule.MAKE_LINKABLE |
- Ci.nsIAboutModule.ALLOW_SCRIPT),
- ]);
- const URLs = new Map([
- ["http://www.example.com", [
- // For each of these entries, the booleans represent whether the parent URI can:
- // - load them
- // - load them without principal inheritance
- // - whether the URI can be created at all (some protocol handlers will
- // refuse to create certain variants)
- ["http://www.example2.com", true, true, true],
- ["feed:http://www.example2.com", false, false, true],
- ["https://www.example2.com", true, true, true],
- ["chrome://foo/content/bar.xul", false, false, true],
- ["feed:chrome://foo/content/bar.xul", false, false, false],
- ["view-source:http://www.example2.com", false, false, true],
- ["view-source:https://www.example2.com", false, false, true],
- ["view-source:feed:http://www.example2.com", false, false, true],
- ["feed:view-source:http://www.example2.com", false, false, false],
- ["data:text/html,Hi", true, false, true],
- ["view-source:data:text/html,Hi", false, false, true],
- ["javascript:alert('hi')", true, false, true],
- ["moz://a", false, false, true],
- ["about:test-chrome-privs", false, false, true],
- ["about:test-unknown-unlinkable", false, false, true],
- ["about:test-content-unlinkable", false, false, true],
- ["about:test-content-linkable", true, true, true],
- // Because this page doesn't have SAFE_FOR_UNTRUSTED, the web can't link to it:
- ["about:test-unknown-linkable", false, false, true],
- ]],
- ["feed:http://www.example.com", [
- ["http://www.example2.com", true, true, true],
- ["feed:http://www.example2.com", true, true, true],
- ["https://www.example2.com", true, true, true],
- ["feed:https://www.example2.com", true, true, true],
- ["chrome://foo/content/bar.xul", false, false, true],
- ["feed:chrome://foo/content/bar.xul", false, false, false],
- ["view-source:http://www.example2.com", false, false, true],
- ["view-source:https://www.example2.com", false, false, true],
- ["view-source:feed:http://www.example2.com", false, false, true],
- ["feed:view-source:http://www.example2.com", false, false, false],
- ["data:text/html,Hi", true, false, true],
- ["view-source:data:text/html,Hi", false, false, true],
- ["javascript:alert('hi')", true, false, true],
- ["moz://a", false, false, true],
- ["about:test-chrome-privs", false, false, true],
- ["about:test-unknown-unlinkable", false, false, true],
- ["about:test-content-unlinkable", false, false, true],
- ["about:test-content-linkable", true, true, true],
- // Because this page doesn't have SAFE_FOR_UNTRUSTED, the web can't link to it:
- ["about:test-unknown-linkable", false, false, true],
- ]],
- ["view-source:http://www.example.com", [
- ["http://www.example2.com", true, true, true],
- ["feed:http://www.example2.com", false, false, true],
- ["https://www.example2.com", true, true, true],
- ["feed:https://www.example2.com", false, false, true],
- ["chrome://foo/content/bar.xul", false, false, true],
- ["feed:chrome://foo/content/bar.xul", false, false, false],
- ["view-source:http://www.example2.com", true, true, true],
- ["view-source:https://www.example2.com", true, true, true],
- ["view-source:feed:http://www.example2.com", false, false, true],
- ["feed:view-source:http://www.example2.com", false, false, false],
- ["data:text/html,Hi", true, false, true],
- ["view-source:data:text/html,Hi", true, false, true],
- ["javascript:alert('hi')", true, false, true],
- ["moz://a", false, false, true],
- ["about:test-chrome-privs", false, false, true],
- ["about:test-unknown-unlinkable", false, false, true],
- ["about:test-content-unlinkable", false, false, true],
- ["about:test-content-linkable", true, true, true],
- // Because this page doesn't have SAFE_FOR_UNTRUSTED, the web can't link to it:
- ["about:test-unknown-linkable", false, false, true],
- ]],
- // about: related tests.
- ["about:test-chrome-privs", [
- ["about:test-chrome-privs", true, true, true],
- ["about:test-chrome-privs2", true, true, true],
- ["about:test-chrome-privs2?foo#bar", true, true, true],
- ["about:test-chrome-privs2?foo", true, true, true],
- ["about:test-chrome-privs2#bar", true, true, true],
- ["about:test-unknown-unlinkable", true, true, true],
- ["about:test-content-unlinkable", true, true, true],
- ["about:test-content-unlinkable?foo", true, true, true],
- ["about:test-content-unlinkable?foo#bar", true, true, true],
- ["about:test-content-unlinkable#bar", true, true, true],
- ["about:test-content-linkable", true, true, true],
- ["about:test-unknown-linkable", true, true, true],
- ]],
- ["about:test-unknown-unlinkable", [
- ["about:test-chrome-privs", false, false, true],
- // Can link to ourselves:
- ["about:test-unknown-unlinkable", true, true, true],
- // Can't link to unlinkable content if we're not sure it's privileged:
- ["about:test-unknown-unlinkable2", false, false, true],
- ["about:test-content-unlinkable", true, true, true],
- ["about:test-content-unlinkable2", true, true, true],
- ["about:test-content-unlinkable2?foo", true, true, true],
- ["about:test-content-unlinkable2?foo#bar", true, true, true],
- ["about:test-content-unlinkable2#bar", true, true, true],
- ["about:test-content-linkable", true, true, true],
- // Because this page doesn't have SAFE_FOR_UNTRUSTED, the web can't link to it:
- ["about:test-unknown-linkable", false, false, true],
- ]],
- ["about:test-content-unlinkable", [
- ["about:test-chrome-privs", false, false, true],
- // Can't link to unlinkable content if we're not sure it's privileged:
- ["about:test-unknown-unlinkable", false, false, true],
- ["about:test-content-unlinkable", true, true, true],
- ["about:test-content-unlinkable2", true, true, true],
- ["about:test-content-unlinkable2?foo", true, true, true],
- ["about:test-content-unlinkable2?foo#bar", true, true, true],
- ["about:test-content-unlinkable2#bar", true, true, true],
- ["about:test-content-linkable", true, true, true],
- ["about:test-unknown-linkable", false, false, true],
- ]],
- ["about:test-unknown-linkable", [
- ["about:test-chrome-privs", false, false, true],
- // Linkable content can't link to unlinkable content.
- ["about:test-unknown-unlinkable", false, false, true],
- ["about:test-content-unlinkable", false, false, true],
- ["about:test-content-unlinkable2", false, false, true],
- ["about:test-content-unlinkable2?foo", false, false, true],
- ["about:test-content-unlinkable2?foo#bar", false, false, true],
- ["about:test-content-unlinkable2#bar", false, false, true],
- // ... but it can link to other linkable content.
- ["about:test-content-linkable", true, true, true],
- // Can link to ourselves:
- ["about:test-unknown-linkable", true, true, true],
- // Because this page doesn't have SAFE_FOR_UNTRUSTED, the web can't link to it:
- ["about:test-unknown-linkable2", false, false, true],
- ]],
- ["about:test-content-linkable", [
- ["about:test-chrome-privs", false, false, true],
- // Linkable content can't link to unlinkable content.
- ["about:test-unknown-unlinkable", false, false, true],
- ["about:test-content-unlinkable", false, false, true],
- // ... but it can link to itself and other linkable content.
- ["about:test-content-linkable", true, true, true],
- ["about:test-content-linkable2", true, true, true],
- // Because this page doesn't have SAFE_FOR_UNTRUSTED, the web can't link to it:
- ["about:test-unknown-linkable", false, false, true],
- ]],
- ]);
- function testURL(source, target, canLoad, canLoadWithoutInherit, canCreate, flags) {
- function getPrincipalDesc(principal) {
- if (principal.URI) {
- return principal.URI.spec;
- }
- if (principal.isSystemPrincipal) {
- return "system principal";
- }
- if (principal.isNullPrincipal) {
- return "null principal";
- }
- return "unknown principal";
- }
- let threw = false;
- let targetURI;
- try {
- targetURI = makeURI(target);
- } catch (ex) {
- ok(!canCreate, "Shouldn't be passing URIs that we can't create. Failed to create: " + target);
- return;
- }
- ok(canCreate, "Created a URI for " + target + " which should " +
- (canCreate ? "" : "not ") + "be possible.");
- try {
- ssm.checkLoadURIWithPrincipal(source, targetURI, flags);
- } catch (ex) {
- info(ex.message);
- threw = true;
- }
- let inheritDisallowed = flags & ssm.DISALLOW_INHERIT_PRINCIPAL;
- let shouldThrow = inheritDisallowed ? !canLoadWithoutInherit : !canLoad;
- ok(threw == shouldThrow,
- "Should " + (shouldThrow ? "" : "not ") + "throw an error when loading " +
- target + " from " + getPrincipalDesc(source) +
- (inheritDisallowed ? " without" : " with") + " principal inheritance.");
- }
- add_task(function* () {
- yield kAboutPagesRegistered;
- let baseFlags = ssm.STANDARD | ssm.DONT_REPORT_ERRORS;
- for (let [sourceString, targetsAndExpectations] of URLs) {
- let source;
- if (sourceString.startsWith("about:test-chrome-privs")) {
- source = ssm.getSystemPrincipal();
- } else {
- source = ssm.createCodebasePrincipal(makeURI(sourceString), {});
- }
- for (let [target, canLoad, canLoadWithoutInherit, canCreate] of targetsAndExpectations) {
- testURL(source, target, canLoad, canLoadWithoutInherit, canCreate, baseFlags);
- testURL(source, target, canLoad, canLoadWithoutInherit, canCreate,
- baseFlags | ssm.DISALLOW_INHERIT_PRINCIPAL);
- }
- }
- // Now test blob URIs, which we need to do in-content.
- yield BrowserTestUtils.withNewTab("http://www.example.com/", function* (browser) {
- yield ContentTask.spawn(
- browser,
- testURL.toString(),
- function* (testURLFn) {
- let testURL = eval("(" + testURLFn + ")");
- let ssm = Services.scriptSecurityManager;
- let baseFlags = ssm.STANDARD | ssm.DONT_REPORT_ERRORS;
- let makeURI = Cu.import("resource://gre/modules/BrowserUtils.jsm", {}).BrowserUtils.makeURI;
- let b = new content.Blob(["I am a blob"]);
- let contentBlobURI = content.URL.createObjectURL(b);
- let contentPrincipal = content.document.nodePrincipal;
- // Loading this blob URI from the content page should work:
- testURL(contentPrincipal, contentBlobURI, true, true, true, baseFlags);
- testURL(contentPrincipal, contentBlobURI, true, true, true,
- baseFlags | ssm.DISALLOW_INHERIT_PRINCIPAL);
- testURL(contentPrincipal, "view-source:" + contentBlobURI, false, false, true,
- baseFlags);
- testURL(contentPrincipal, "view-source:" + contentBlobURI, false, false, true,
- baseFlags | ssm.DISALLOW_INHERIT_PRINCIPAL);
- // Feed URIs for blobs can't be created, so need to pass false as the fourth param.
- for (let prefix of ["feed:", "view-source:feed:", "feed:view-source:"]) {
- testURL(contentPrincipal, prefix + contentBlobURI, false, false, false,
- baseFlags);
- testURL(contentPrincipal, prefix + contentBlobURI, false, false, false,
- baseFlags | ssm.DISALLOW_INHERIT_PRINCIPAL);
- }
- }
- );
- });
- });
|