123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441 |
- /* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
- /* This Source Code Form is subject to the terms of the Mozilla Public
- * License, v. 2.0. If a copy of the MPL was not distributed with this
- * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
- #include "base/basictypes.h"
- #include "mozilla/ArrayUtils.h"
- #include "nsAboutProtocolHandler.h"
- #include "nsIURI.h"
- #include "nsIAboutModule.h"
- #include "nsString.h"
- #include "nsNetCID.h"
- #include "nsAboutProtocolUtils.h"
- #include "nsError.h"
- #include "nsNetUtil.h"
- #include "nsIObjectInputStream.h"
- #include "nsIObjectOutputStream.h"
- #include "nsAutoPtr.h"
- #include "nsIWritablePropertyBag2.h"
- #include "nsIChannel.h"
- #include "nsIScriptError.h"
- #include "nsContentUtils.h"
- namespace mozilla {
- namespace net {
- static NS_DEFINE_CID(kSimpleURICID, NS_SIMPLEURI_CID);
- static NS_DEFINE_CID(kNestedAboutURICID, NS_NESTEDABOUTURI_CID);
- static bool IsSafeForUntrustedContent(nsIAboutModule *aModule, nsIURI *aURI) {
- uint32_t flags;
- nsresult rv = aModule->GetURIFlags(aURI, &flags);
- NS_ENSURE_SUCCESS(rv, false);
- return (flags & nsIAboutModule::URI_SAFE_FOR_UNTRUSTED_CONTENT) != 0;
- }
- static bool IsSafeToLinkForUntrustedContent(nsIAboutModule *aModule, nsIURI *aURI) {
- uint32_t flags;
- nsresult rv = aModule->GetURIFlags(aURI, &flags);
- NS_ENSURE_SUCCESS(rv, false);
- return (flags & nsIAboutModule::URI_SAFE_FOR_UNTRUSTED_CONTENT) && (flags & nsIAboutModule::MAKE_LINKABLE);
- }
- ////////////////////////////////////////////////////////////////////////////////
- NS_IMPL_ISUPPORTS(nsAboutProtocolHandler, nsIProtocolHandler,
- nsIProtocolHandlerWithDynamicFlags, nsISupportsWeakReference)
- ////////////////////////////////////////////////////////////////////////////////
- // nsIProtocolHandler methods:
- NS_IMETHODIMP
- nsAboutProtocolHandler::GetScheme(nsACString &result)
- {
- result.AssignLiteral("about");
- return NS_OK;
- }
- NS_IMETHODIMP
- nsAboutProtocolHandler::GetDefaultPort(int32_t *result)
- {
- *result = -1; // no port for about: URLs
- return NS_OK;
- }
- NS_IMETHODIMP
- nsAboutProtocolHandler::GetProtocolFlags(uint32_t *result)
- {
- *result = URI_NORELATIVE | URI_NOAUTH | URI_DANGEROUS_TO_LOAD | URI_SCHEME_NOT_SELF_LINKABLE;
- return NS_OK;
- }
- NS_IMETHODIMP
- nsAboutProtocolHandler::GetFlagsForURI(nsIURI* aURI, uint32_t* aFlags)
- {
- // First use the default (which is "unsafe for content"):
- GetProtocolFlags(aFlags);
- // Now try to see if this URI overrides the default:
- nsCOMPtr<nsIAboutModule> aboutMod;
- nsresult rv = NS_GetAboutModule(aURI, getter_AddRefs(aboutMod));
- if (NS_FAILED(rv)) {
- // Swallow this and just tell the consumer the default:
- return NS_OK;
- }
- uint32_t aboutModuleFlags = 0;
- rv = aboutMod->GetURIFlags(aURI, &aboutModuleFlags);
- // This should never happen, so pass back the error:
- NS_ENSURE_SUCCESS(rv, rv);
- // Secure (https) pages can load safe about pages without becoming
- // mixed content.
- if (aboutModuleFlags & nsIAboutModule::URI_SAFE_FOR_UNTRUSTED_CONTENT) {
- *aFlags |= URI_SAFE_TO_LOAD_IN_SECURE_CONTEXT;
- // about: pages can only be loaded by unprivileged principals
- // if they are marked as LINKABLE
- if (aboutModuleFlags & nsIAboutModule::MAKE_LINKABLE) {
- // Replace URI_DANGEROUS_TO_LOAD with URI_LOADABLE_BY_ANYONE.
- *aFlags &= ~URI_DANGEROUS_TO_LOAD;
- *aFlags |= URI_LOADABLE_BY_ANYONE;
- }
- }
- return NS_OK;
- }
- NS_IMETHODIMP
- nsAboutProtocolHandler::NewURI(const nsACString &aSpec,
- const char *aCharset, // ignore charset info
- nsIURI *aBaseURI,
- nsIURI **result)
- {
- *result = nullptr;
- nsresult rv;
- // Use a simple URI to parse out some stuff first
- nsCOMPtr<nsIURI> url = do_CreateInstance(kSimpleURICID, &rv);
- if (NS_FAILED(rv)) return rv;
- rv = url->SetSpec(aSpec);
- if (NS_FAILED(rv)) {
- return rv;
- }
- // Unfortunately, people create random about: URIs that don't correspond to
- // about: modules... Since those URIs will never open a channel, might as
- // well consider them unsafe for better perf, and just in case.
- bool isSafe = false;
-
- nsCOMPtr<nsIAboutModule> aboutMod;
- rv = NS_GetAboutModule(url, getter_AddRefs(aboutMod));
- if (NS_SUCCEEDED(rv)) {
- isSafe = IsSafeToLinkForUntrustedContent(aboutMod, url);
- }
- if (isSafe) {
- // We need to indicate that this baby is safe. Use an inner URI that
- // no one but the security manager will see. Make sure to preserve our
- // path, in case someone decides to hardcode checks for particular
- // about: URIs somewhere.
- nsAutoCString spec;
- rv = url->GetPath(spec);
- NS_ENSURE_SUCCESS(rv, rv);
-
- spec.Insert("moz-safe-about:", 0);
- nsCOMPtr<nsIURI> inner;
- rv = NS_NewURI(getter_AddRefs(inner), spec);
- NS_ENSURE_SUCCESS(rv, rv);
- nsSimpleNestedURI* outer = new nsNestedAboutURI(inner, aBaseURI);
- NS_ENSURE_TRUE(outer, NS_ERROR_OUT_OF_MEMORY);
- // Take a ref to it in the COMPtr we plan to return
- url = outer;
- rv = outer->SetSpec(aSpec);
- NS_ENSURE_SUCCESS(rv, rv);
- }
- // We don't want to allow mutation, since it would allow safe and
- // unsafe URIs to change into each other...
- NS_TryToSetImmutable(url);
- url.swap(*result);
- return NS_OK;
- }
- NS_IMETHODIMP
- nsAboutProtocolHandler::NewChannel2(nsIURI* uri,
- nsILoadInfo* aLoadInfo,
- nsIChannel** result)
- {
- NS_ENSURE_ARG_POINTER(uri);
- // about:what you ask?
- nsCOMPtr<nsIAboutModule> aboutMod;
- nsresult rv = NS_GetAboutModule(uri, getter_AddRefs(aboutMod));
- nsAutoCString path;
- nsresult rv2 = NS_GetAboutModuleName(uri, path);
- if (NS_SUCCEEDED(rv2) && path.EqualsLiteral("srcdoc")) {
- // about:srcdoc is meant to be unresolvable, yet is included in the
- // about lookup tables so that it can pass security checks when used in
- // a srcdoc iframe. To ensure that it stays unresolvable, we pretend
- // that it doesn't exist.
- rv = NS_ERROR_FACTORY_NOT_REGISTERED;
- }
- if (NS_SUCCEEDED(rv)) {
- // The standard return case:
- rv = aboutMod->NewChannel(uri, aLoadInfo, result);
- if (NS_SUCCEEDED(rv)) {
- // Not all implementations of nsIAboutModule::NewChannel()
- // set the LoadInfo on the newly created channel yet, as
- // an interim solution we set the LoadInfo here if not
- // available on the channel. Bug 1087720
- nsCOMPtr<nsILoadInfo> loadInfo = (*result)->GetLoadInfo();
- if (aLoadInfo != loadInfo) {
- if (loadInfo) {
- NS_ASSERTION(false,
- "nsIAboutModule->newChannel(aURI, aLoadInfo) needs to set LoadInfo");
- const char16_t* params[] = {
- u"nsIAboutModule->newChannel(aURI)",
- u"nsIAboutModule->newChannel(aURI, aLoadInfo)"
- };
- nsContentUtils::ReportToConsole(
- nsIScriptError::warningFlag,
- NS_LITERAL_CSTRING("Security by Default"),
- nullptr, // aDocument
- nsContentUtils::eNECKO_PROPERTIES,
- "APIDeprecationWarning",
- params, mozilla::ArrayLength(params));
- }
- (*result)->SetLoadInfo(aLoadInfo);
- }
- // If this URI is safe for untrusted content, enforce that its
- // principal be based on the channel's originalURI by setting the
- // owner to null.
- // Note: this relies on aboutMod's newChannel implementation
- // having set the proper originalURI, which probably isn't ideal.
- if (IsSafeForUntrustedContent(aboutMod, uri)) {
- (*result)->SetOwner(nullptr);
- }
- RefPtr<nsNestedAboutURI> aboutURI;
- nsresult rv2 = uri->QueryInterface(kNestedAboutURICID,
- getter_AddRefs(aboutURI));
- if (NS_SUCCEEDED(rv2) && aboutURI->GetBaseURI()) {
- nsCOMPtr<nsIWritablePropertyBag2> writableBag =
- do_QueryInterface(*result);
- if (writableBag) {
- writableBag->
- SetPropertyAsInterface(NS_LITERAL_STRING("baseURI"),
- aboutURI->GetBaseURI());
- }
- }
- }
- return rv;
- }
- // mumble...
- if (rv == NS_ERROR_FACTORY_NOT_REGISTERED) {
- // This looks like an about: we don't know about. Convert
- // this to an invalid URI error.
- rv = NS_ERROR_MALFORMED_URI;
- }
- return rv;
- }
- NS_IMETHODIMP
- nsAboutProtocolHandler::NewChannel(nsIURI* uri, nsIChannel* *result)
- {
- return NewChannel2(uri, nullptr, result);
- }
- NS_IMETHODIMP
- nsAboutProtocolHandler::AllowPort(int32_t port, const char *scheme, bool *_retval)
- {
- // don't override anything.
- *_retval = false;
- return NS_OK;
- }
- ////////////////////////////////////////////////////////////////////////////////
- // Safe about protocol handler impl
- NS_IMPL_ISUPPORTS(nsSafeAboutProtocolHandler, nsIProtocolHandler, nsISupportsWeakReference)
- // nsIProtocolHandler methods:
- NS_IMETHODIMP
- nsSafeAboutProtocolHandler::GetScheme(nsACString &result)
- {
- result.AssignLiteral("moz-safe-about");
- return NS_OK;
- }
- NS_IMETHODIMP
- nsSafeAboutProtocolHandler::GetDefaultPort(int32_t *result)
- {
- *result = -1; // no port for moz-safe-about: URLs
- return NS_OK;
- }
- NS_IMETHODIMP
- nsSafeAboutProtocolHandler::GetProtocolFlags(uint32_t *result)
- {
- *result = URI_NORELATIVE | URI_NOAUTH | URI_LOADABLE_BY_ANYONE | URI_SAFE_TO_LOAD_IN_SECURE_CONTEXT;
- return NS_OK;
- }
- NS_IMETHODIMP
- nsSafeAboutProtocolHandler::NewURI(const nsACString &aSpec,
- const char *aCharset, // ignore charset info
- nsIURI *aBaseURI,
- nsIURI **result)
- {
- nsresult rv;
- nsCOMPtr<nsIURI> url = do_CreateInstance(kSimpleURICID, &rv);
- if (NS_FAILED(rv)) return rv;
- rv = url->SetSpec(aSpec);
- if (NS_FAILED(rv)) {
- return rv;
- }
- NS_TryToSetImmutable(url);
-
- *result = nullptr;
- url.swap(*result);
- return rv;
- }
- NS_IMETHODIMP
- nsSafeAboutProtocolHandler::NewChannel2(nsIURI* uri,
- nsILoadInfo* aLoadInfo,
- nsIChannel** result)
- {
- *result = nullptr;
- return NS_ERROR_NOT_AVAILABLE;
- }
- NS_IMETHODIMP
- nsSafeAboutProtocolHandler::NewChannel(nsIURI* uri, nsIChannel* *result)
- {
- *result = nullptr;
- return NS_ERROR_NOT_AVAILABLE;
- }
- NS_IMETHODIMP
- nsSafeAboutProtocolHandler::AllowPort(int32_t port, const char *scheme, bool *_retval)
- {
- // don't override anything.
- *_retval = false;
- return NS_OK;
- }
- ////////////////////////////////////////////////////////////
- // nsNestedAboutURI implementation
- NS_INTERFACE_MAP_BEGIN(nsNestedAboutURI)
- if (aIID.Equals(kNestedAboutURICID))
- foundInterface = static_cast<nsIURI*>(this);
- else
- NS_INTERFACE_MAP_END_INHERITING(nsSimpleNestedURI)
- // nsISerializable
- NS_IMETHODIMP
- nsNestedAboutURI::Read(nsIObjectInputStream* aStream)
- {
- nsresult rv = nsSimpleNestedURI::Read(aStream);
- if (NS_FAILED(rv)) return rv;
- bool haveBase;
- rv = aStream->ReadBoolean(&haveBase);
- if (NS_FAILED(rv)) return rv;
- if (haveBase) {
- nsCOMPtr<nsISupports> supports;
- rv = aStream->ReadObject(true, getter_AddRefs(supports));
- if (NS_FAILED(rv)) return rv;
- mBaseURI = do_QueryInterface(supports, &rv);
- if (NS_FAILED(rv)) return rv;
- }
- return NS_OK;
- }
- NS_IMETHODIMP
- nsNestedAboutURI::Write(nsIObjectOutputStream* aStream)
- {
- nsresult rv = nsSimpleNestedURI::Write(aStream);
- if (NS_FAILED(rv)) return rv;
- rv = aStream->WriteBoolean(mBaseURI != nullptr);
- if (NS_FAILED(rv)) return rv;
- if (mBaseURI) {
- // A previous iteration of this code wrote out mBaseURI as nsISupports
- // and then read it in as nsIURI, which is non-kosher when mBaseURI
- // implements more than just a single line of interfaces and the
- // canonical nsISupports* isn't the one a static_cast<> of mBaseURI
- // would produce. For backwards compatibility with existing
- // serializations we continue to write mBaseURI as nsISupports but
- // switch to reading it as nsISupports, with a post-read QI to get to
- // nsIURI.
- rv = aStream->WriteCompoundObject(mBaseURI, NS_GET_IID(nsISupports),
- true);
- if (NS_FAILED(rv)) return rv;
- }
- return NS_OK;
- }
- // nsSimpleURI
- /* virtual */ nsSimpleURI*
- nsNestedAboutURI::StartClone(nsSimpleURI::RefHandlingEnum aRefHandlingMode,
- const nsACString& aNewRef)
- {
- // Sadly, we can't make use of nsSimpleNestedURI::StartClone here.
- // However, this function is expected to exactly match that function,
- // aside from the "new ns***URI()" call.
- NS_ENSURE_TRUE(mInnerURI, nullptr);
- nsCOMPtr<nsIURI> innerClone;
- nsresult rv;
- if (aRefHandlingMode == eHonorRef) {
- rv = mInnerURI->Clone(getter_AddRefs(innerClone));
- } else if (aRefHandlingMode == eReplaceRef) {
- rv = mInnerURI->CloneWithNewRef(aNewRef, getter_AddRefs(innerClone));
- } else {
- rv = mInnerURI->CloneIgnoringRef(getter_AddRefs(innerClone));
- }
- if (NS_FAILED(rv)) {
- return nullptr;
- }
- nsNestedAboutURI* url = new nsNestedAboutURI(innerClone, mBaseURI);
- SetRefOnClone(url, aRefHandlingMode, aNewRef);
- url->SetMutable(false);
- return url;
- }
- // nsIClassInfo
- NS_IMETHODIMP
- nsNestedAboutURI::GetClassIDNoAlloc(nsCID *aClassIDNoAlloc)
- {
- *aClassIDNoAlloc = kNestedAboutURICID;
- return NS_OK;
- }
- } // namespace net
- } // namespace mozilla
|