/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */ /* ***** BEGIN LICENSE BLOCK ***** * Version: NPL 1.1/GPL 2.0/LGPL 2.1 * * The contents of this file are subject to the Netscape Public License * Version 1.1 (the "License"); you may not use this file except in * compliance with the License. You may obtain a copy of the License at * http://www.mozilla.org/NPL/ * * Software distributed under the License is distributed on an "AS IS" basis, * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License * for the specific language governing rights and limitations under the * License. * * The Original Code is mozilla.org code. * * The Initial Developer of the Original Code is * Netscape Communications Corporation. * Portions created by the Initial Developer are Copyright (C) 1998-2000 * the Initial Developer. All Rights Reserved. * * Contributor(s): * Norris Boyd * Mitch Stoltz * Steve Morse * * * Alternatively, the contents of this file may be used under the terms of * either the GNU General Public License Version 2 or later (the "GPL"), or * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"), * in which case the provisions of the GPL or the LGPL are applicable instead * of those above. If you wish to allow use of your version of this file only * under the terms of either the GPL or the LGPL, and not to allow others to * use your version of this file under the terms of the NPL, indicate your * decision by deleting the provisions above and replace them with the notice * and other provisions required by the GPL or the LGPL. If you do not delete * the provisions above, a recipient may use your version of this file under * the terms of any one of the NPL, the GPL or the LGPL. * * ***** END LICENSE BLOCK ***** */ #include "nscore.h" #include "nsScriptSecurityManager.h" #include "nsIServiceManager.h" #include "nsIScriptObjectPrincipal.h" #include "nsIScriptContext.h" #include "nsIURL.h" #include "nsIJARURI.h" #include "nspr.h" #include "nsJSPrincipals.h" #include "nsSystemPrincipal.h" #include "nsCodebasePrincipal.h" #include "nsCertificatePrincipal.h" #include "nsAggregatePrincipal.h" #include "nsCRT.h" #include "nsXPIDLString.h" #include "nsReadableUtils.h" #include "nsIJSContextStack.h" #include "nsDOMError.h" #include "nsDOMCID.h" #include "jsdbgapi.h" #include "nsIXPConnect.h" #include "nsIXPCSecurityManager.h" #include "nsTextFormatter.h" #include "nsIIOService.h" #include "nsIStringBundle.h" #include "nsNetUtil.h" #include "nsDirectoryService.h" #include "nsDirectoryServiceDefs.h" #include "nsIFile.h" #include "nsIZipReader.h" #include "nsIJAR.h" #include "nsIPluginInstance.h" #include "nsIXPConnect.h" #include "nsIScriptGlobalObject.h" #include "nsIDOMWindowInternal.h" #include "nsIDocShell.h" #include "nsIDocShellTreeItem.h" #include "nsIPrompt.h" #include "nsIWindowWatcher.h" #include "nsIConsoleService.h" #include "nsISecurityCheckedComponent.h" #include "nsIPrefBranchInternal.h" #include "nsIJSRuntimeService.h" static NS_DEFINE_IID(kIIOServiceIID, NS_IIOSERVICE_IID); static NS_DEFINE_CID(kIOServiceCID, NS_IOSERVICE_CID); static NS_DEFINE_IID(kIStringBundleServiceIID, NS_ISTRINGBUNDLESERVICE_IID); static NS_DEFINE_IID(kStringBundleServiceCID, NS_STRINGBUNDLESERVICE_CID); static NS_DEFINE_CID(kCScriptNameSetRegistryCID, NS_SCRIPT_NAMESET_REGISTRY_CID); static NS_DEFINE_CID(kZipReaderCID, NS_ZIPREADER_CID); //-- All values of this enum except the first map to odd numbers so they can be // stored in a void* without being confused for a pointer value (which is always even). enum { SCRIPT_SECURITY_UNDEFINED_ACCESS = 0, SCRIPT_SECURITY_CAPABILITY_ONLY = 1, SCRIPT_SECURITY_SAME_ORIGIN_ACCESS = 3, SCRIPT_SECURITY_ALL_ACCESS = 5, SCRIPT_SECURITY_NO_ACCESS = 7 }; #define CLASS_HAS_DEFAULT_POLICY 1 << 0 #define CLASS_HAS_SITE_POLICY 1 << 1 #define CLASS_HAS_ACCESSTYPE 1 << 2 // Result of this function should not be freed. static const PRUnichar * JSValIDToString(JSContext *aJSContext, const jsval idval) { JSString *str = JS_ValueToString(aJSContext, idval); if(!str) return nsnull; return NS_REINTERPRET_CAST(PRUnichar*, JS_GetStringChars(str)); } // Convinience method to get the current js context stack. // Uses cached JSContextStack service instead of calling through // to the service manager. JSContext * nsScriptSecurityManager::GetCurrentContextQuick() { // Get JSContext from stack. nsresult rv; if (!mThreadJSContextStack) { mThreadJSContextStack = do_GetService("@mozilla.org/js/xpc/ContextStack;1", &rv); } if (!mThreadJSContextStack) return nsnull; JSContext *cx; if (NS_FAILED(mThreadJSContextStack->Peek(&cx))) return nsnull; return cx; } ///////////////////////////// // nsScriptSecurityManager // ///////////////////////////// //////////////////////////////////// // Methods implementing ISupports // //////////////////////////////////// NS_IMPL_THREADSAFE_ISUPPORTS3(nsScriptSecurityManager, nsIScriptSecurityManager, nsIXPCSecurityManager, nsIObserver) /////////////////////////////////////////////////// // Methods implementing nsIScriptSecurityManager // /////////////////////////////////////////////////// ///////////////// Security Checks ///////////////// static JSBool JS_DLL_CALLBACK CheckJSFunctionCallerAccess(JSContext *cx, JSObject *obj, jsval id, JSAccessMode mode, jsval *vp) { // Currently, this function will be called only when function.caller // is accessed. If that changes, we will need to change this function. NS_ASSERTION(nsCRT::strcmp(NS_REINTERPRET_CAST(PRUnichar*, JS_GetStringChars(JSVAL_TO_STRING(id))), NS_LITERAL_STRING("caller").get()) == 0, "CheckJSFunctionCallerAccess called for a property other than \'caller\'"); // Get the security manager //XXX: Any way to avoid this service lookup? nsresult rv; nsCOMPtr ssm = do_GetService(NS_SCRIPTSECURITYMANAGER_CONTRACTID, &rv); if (NS_FAILED(rv)) { NS_ERROR("Failed to get security manager service"); return JS_FALSE; } // Get the caller function object NS_ASSERTION(JSVAL_IS_OBJECT(*vp), "*vp is not an object"); JSObject* target = JSVAL_TO_OBJECT(*vp); // Do the same-origin check - this sets a JS exception if the check fails rv = ssm->CheckPropertyAccess(cx, target, "Function", "caller", nsIXPCSecurityManager::ACCESS_GET_PROPERTY); if (NS_FAILED(rv)) return JS_FALSE; // Security check failed return JS_TRUE; } NS_IMETHODIMP nsScriptSecurityManager::CheckPropertyAccess(JSContext* aJSContext, JSObject* aJSObject, const char* aClassName, const char* aPropertyName, PRUint32 aAction) { return CheckPropertyAccessImpl(aAction, nsnull, aJSContext, aJSObject, nsnull, nsnull, nsnull, nsnull, aClassName, aPropertyName, nsnull); } NS_IMETHODIMP nsScriptSecurityManager::CheckConnect(JSContext* aJSContext, nsIURI* aTargetURI, const char* aClassName, const char* aPropertyName) { // Get a context if necessary if (!aJSContext) { aJSContext = GetCurrentContextQuick(); if (!aJSContext) return NS_OK; // No JS context, so allow the load } nsresult rv = CheckLoadURIFromScript(aJSContext, aTargetURI); if (NS_FAILED(rv)) return rv; return CheckPropertyAccessImpl(nsIXPCSecurityManager::ACCESS_CALL_METHOD, nsnull, aJSContext, nsnull, nsnull, aTargetURI, nsnull, nsnull, aClassName, aPropertyName, nsnull); } nsresult nsScriptSecurityManager::CheckPropertyAccessImpl(PRUint32 aAction, nsIXPCNativeCallContext* aCallContext, JSContext* aJSContext, JSObject* aJSObject, nsISupports* aObj, nsIURI* aTargetURI, nsIClassInfo* aClassInfo, jsval aName, const char* aClassName, const char* aProperty, void** aPolicy) { nsCOMPtr subjectPrincipal; if (NS_FAILED(GetSubjectPrincipal(aJSContext, getter_AddRefs(subjectPrincipal)))) return NS_ERROR_FAILURE; PRBool equals; if (!subjectPrincipal || NS_SUCCEEDED(subjectPrincipal->Equals(mSystemPrincipal, &equals)) && equals) // We have native code or the system principal: just allow access return NS_OK; static const char unknownClassName[] = "UnknownClass"; #ifdef DEBUG_mstoltz if (aProperty) printf("### CheckPropertyAccess(%s.%s, %i) ", aClassName, aProperty, aAction); else { nsXPIDLCString classNameStr; const char* className; if (aClassInfo) aClassInfo->GetClassDescription(getter_Copies(classNameStr)); className = classNameStr.get(); if(!className) className = unknownClassName; nsCAutoString propertyStr(className); propertyStr += '.'; propertyStr.AppendWithConversion((PRUnichar*)JSValIDToString(aJSContext, aName)); char* property; property = ToNewCString(propertyStr); printf("### CanAccess(%s, %i) ", property, aAction); PR_FREEIF(property); } #endif //-- Look up the policy for this property/method PRInt32 secLevel; nsCAutoString capability; if (aPolicy && *aPolicy) { #ifdef DEBUG_mstoltz printf("Cached "); #endif secLevel = NS_PTR_TO_INT32(*aPolicy); } else { nsXPIDLCString classNameStr; const char* className; nsCAutoString propertyName(aProperty); if (aClassName) className = aClassName; else //-- Get className and propertyName from aClassInfo and aName, repectively { if(aClassInfo) aClassInfo->GetClassDescription(getter_Copies(classNameStr)); className = classNameStr.get(); if (!className) className = unknownClassName; propertyName.AssignWithConversion((PRUnichar*)JSValIDToString(aJSContext, aName)); } // if (aProperty), we were called from CheckPropertyAccess or checkConnect, // so we can assume this is a DOM class. Otherwise, we ask the ClassInfo. secLevel = GetSecurityLevel(subjectPrincipal, (aProperty || IsDOMClass(aClassInfo)), className, propertyName.get(), aAction, capability, aPolicy); } nsresult rv; switch (secLevel) { case SCRIPT_SECURITY_ALL_ACCESS: #ifdef DEBUG_mstoltz printf("Level: AllAccess "); #endif rv = NS_OK; break; case SCRIPT_SECURITY_SAME_ORIGIN_ACCESS: { #ifdef DEBUG_mstoltz printf("Level: SameOrigin "); #endif nsCOMPtr objectPrincipal; if(aJSObject) { if (NS_FAILED(GetObjectPrincipal(aJSContext, NS_REINTERPRET_CAST(JSObject*, aJSObject), getter_AddRefs(objectPrincipal)))) return NS_ERROR_FAILURE; } else if(aTargetURI) { if (NS_FAILED(GetCodebasePrincipal(aTargetURI, getter_AddRefs(objectPrincipal)))) return NS_ERROR_FAILURE; } else { rv = NS_ERROR_DOM_SECURITY_ERR; break; } rv = CheckSameOrigin(aJSContext, subjectPrincipal, objectPrincipal, aAction == nsIXPCSecurityManager::ACCESS_SET_PROPERTY); break; } case SCRIPT_SECURITY_CAPABILITY_ONLY: { #ifdef DEBUG_mstoltz printf("Level: Capability "); #endif PRBool capabilityEnabled = PR_FALSE; rv = IsCapabilityEnabled(capability.get(), &capabilityEnabled); if (NS_FAILED(rv) || !capabilityEnabled) rv = NS_ERROR_DOM_SECURITY_ERR; else rv = NS_OK; break; } default: // Default is no access #ifdef DEBUG_mstoltz printf("Level: NoAccess (%i)",secLevel); #endif rv = NS_ERROR_DOM_SECURITY_ERR; } if NS_SUCCEEDED(rv) { #ifdef DEBUG_mstoltz printf(" GRANTED.\n"); #endif return rv; } //--See if the object advertises a non-default level of access // using nsISecurityCheckedComponent nsCOMPtr checkedComponent = do_QueryInterface(aObj); nsXPIDLCString objectSecurityLevel; if (checkedComponent) { nsCOMPtr wrapper; nsCOMPtr interfaceInfo; const nsIID* objIID; rv = aCallContext->GetCalleeWrapper(getter_AddRefs(wrapper)); if (NS_SUCCEEDED(rv)) rv = wrapper->FindInterfaceWithMember(aName, getter_AddRefs(interfaceInfo)); if (NS_SUCCEEDED(rv)) rv = interfaceInfo->GetIIDShared(&objIID); if (NS_SUCCEEDED(rv)) { switch (aAction) { case nsIXPCSecurityManager::ACCESS_GET_PROPERTY: checkedComponent->CanGetProperty(objIID, JSValIDToString(aJSContext, aName), getter_Copies(objectSecurityLevel)); break; case nsIXPCSecurityManager::ACCESS_SET_PROPERTY: checkedComponent->CanSetProperty(objIID, JSValIDToString(aJSContext, aName), getter_Copies(objectSecurityLevel)); break; case nsIXPCSecurityManager::ACCESS_CALL_METHOD: checkedComponent->CanCallMethod(objIID, JSValIDToString(aJSContext, aName), getter_Copies(objectSecurityLevel)); } } } rv = CheckXPCPermissions(aObj, objectSecurityLevel); #ifdef DEBUG_mstoltz if(NS_SUCCEEDED(rv)) printf("CheckXPCPerms GRANTED.\n"); else printf("CheckXPCPerms DENIED.\n"); #endif if (NS_FAILED(rv)) //-- Security tests failed, access is denied, report error { nsCAutoString errorMsg("Permission denied to "); switch(aAction) { case nsIXPCSecurityManager::ACCESS_GET_PROPERTY: errorMsg += "get property "; break; case nsIXPCSecurityManager::ACCESS_SET_PROPERTY: errorMsg += "set property "; break; case nsIXPCSecurityManager::ACCESS_CALL_METHOD: errorMsg += "call method "; } if (aProperty) { errorMsg += aClassName; errorMsg += '.'; errorMsg += aProperty; } else { nsXPIDLCString className; if (aClassInfo) aClassInfo->GetClassDescription(getter_Copies(className)); if(className) errorMsg += className; else errorMsg += unknownClassName; errorMsg += '.'; errorMsg.AppendWithConversion(JSValIDToString(aJSContext, aName)); } JS_SetPendingException(aJSContext, STRING_TO_JSVAL(JS_NewStringCopyZ(aJSContext, errorMsg.get()))); //-- if (aProperty) we were called from somewhere other than xpconnect, so we need to // tell xpconnect that an exception was thrown. if (aProperty) { nsCOMPtr xpc = do_GetService(nsIXPConnect::GetCID()); if (xpc) { nsCOMPtr xpcCallContext; xpc->GetCurrentNativeCallContext(getter_AddRefs(xpcCallContext)); if (xpcCallContext) xpcCallContext->SetExceptionWasThrown(PR_TRUE); } } } return rv; } nsresult nsScriptSecurityManager::CheckSameOrigin(JSContext *aCx, nsIPrincipal* aSubject, nsIPrincipal* aObject, PRUint32 aAction) { /* ** Get origin of subject and object and compare. */ if (aSubject == aObject) return NS_OK; PRBool isSameOrigin = PR_FALSE; if (NS_FAILED(aSubject->Equals(aObject, &isSameOrigin))) return NS_ERROR_FAILURE; if (isSameOrigin) return NS_OK; // Allow access to about:blank nsCOMPtr objectCodebase(do_QueryInterface(aObject)); if (objectCodebase) { nsXPIDLCString origin; if (NS_FAILED(objectCodebase->GetOrigin(getter_Copies(origin)))) return NS_ERROR_FAILURE; if (nsCRT::strcasecmp(origin, "about:blank") == 0) return NS_OK; } /* ** If we failed the origin tests it still might be the case that we ** are a signed script and have permissions to do this operation. ** Check for that here */ PRBool capabilityEnabled = PR_FALSE; const char* cap = aAction == nsIXPCSecurityManager::ACCESS_SET_PROPERTY ? "UniversalBrowserWrite" : "UniversalBrowserRead"; if (NS_FAILED(IsCapabilityEnabled(cap, &capabilityEnabled))) return NS_ERROR_FAILURE; if (capabilityEnabled) return NS_OK; /* ** Access tests failed, so now report error. */ return NS_ERROR_DOM_PROP_ACCESS_DENIED; } PRBool nsScriptSecurityManager::IsDOMClass(nsIClassInfo* aClassInfo) { if (!aClassInfo) return PR_FALSE; PRUint32 classFlags; nsresult rv = aClassInfo->GetFlags(&classFlags); return NS_SUCCEEDED(rv) && (classFlags & nsIClassInfo::DOM_OBJECT); } PRInt32 nsScriptSecurityManager::GetSecurityLevel(nsIPrincipal *principal, PRBool aIsDOM, const char* aClassName, const char* aPropertyName, PRUint32 aAction, nsCString &aCapability, void** aPolicy) { nsresult rv = NS_ERROR_FAILURE; PRInt32 secLevel = SCRIPT_SECURITY_NO_ACCESS; nsXPIDLCString propertyPolicy; PRInt32 classPolicy = 0; if(mClassPolicies) { nsCStringKey classKey(aClassName); classPolicy = NS_PTR_TO_INT32(mClassPolicies->Get(&classKey)); if (classPolicy != 0) { //-- Look up the security policy for this property rv = GetPolicy(principal, aClassName, aPropertyName, classPolicy, aAction, getter_Copies(propertyPolicy)); } if (NS_FAILED(rv)) { //-- Look for a wildcard policy for this property nsCAutoString wildcardName("*."); wildcardName += aPropertyName; nsCStringKey wildcardKey(wildcardName); PRInt32 wcPolicy = NS_PTR_TO_INT32(mClassPolicies->Get(&wildcardKey)); if (wcPolicy != 0) { //-- Look up the security policy for this property rv = GetPolicy(principal, "*", aPropertyName, wcPolicy, aAction, getter_Copies(propertyPolicy)); } } } if (NS_SUCCEEDED(rv) && propertyPolicy) { if (PL_strcmp(propertyPolicy, "sameOrigin") == 0) secLevel = SCRIPT_SECURITY_SAME_ORIGIN_ACCESS; else if (PL_strcmp(propertyPolicy, "allAccess") == 0) secLevel = SCRIPT_SECURITY_ALL_ACCESS; else if (PL_strcmp(propertyPolicy, "noAccess") == 0) secLevel = SCRIPT_SECURITY_NO_ACCESS; else { // string should be the name of a capability aCapability = propertyPolicy; secLevel = SCRIPT_SECURITY_CAPABILITY_ONLY; } } else { //-- No policy for this property. // Use the default policy: sameOrigin for DOM, noAccess for everything else if(aIsDOM) secLevel = SCRIPT_SECURITY_SAME_ORIGIN_ACCESS; if ((classPolicy == 0) && aPolicy) { //-- If there's no stored policy for this property, // we can annotate the class's aPolicy field and avoid checking // policy prefs next time. *aPolicy = (void*)secLevel; } } return secLevel; } struct nsDomainEntry { nsDomainEntry(const char *anOrigin, const char *aPolicy, int aPolicyLength) : mNext(nsnull), mOrigin(anOrigin), mPolicy(aPolicy, aPolicyLength) { } PRBool Matches(const char *anOrigin) { int len = nsCRT::strlen(anOrigin); int thisLen = mOrigin.Length(); if (len < thisLen) return PR_FALSE; if (mOrigin.RFindChar(':', PR_FALSE, thisLen-1, 1) != -1) //-- Policy applies to all URLs of this scheme, compare scheme only return mOrigin.EqualsWithConversion(anOrigin, PR_TRUE, thisLen); //-- Policy applies to a particular host; compare scheme://host.domain if (!mOrigin.Equals(anOrigin + (len - thisLen))) return PR_FALSE; if (len == thisLen) return PR_TRUE; char charBefore = anOrigin[len-thisLen-1]; return (charBefore == '.' || charBefore == ':' || charBefore == '/'); } nsDomainEntry *mNext; nsCString mOrigin; nsCString mPolicy; }; nsresult nsScriptSecurityManager::TryToGetPref(nsISecurityPref* aSecurityPref, nsCString &aPrefName, const char* aClassName, const char* aPropertyName, PRInt32 aClassPolicy, PRUint32 aAction, char** result) { //-- Add the class and property names to the pref aPrefName += aClassName; aPrefName += '.'; aPrefName += aPropertyName; //-- Try to look up the pref if (NS_SUCCEEDED(aSecurityPref->SecurityGetCharPref(aPrefName.get(), result))) return NS_OK; //-- If appropriate, try adding .get or .set and looking up again if (aClassPolicy & CLASS_HAS_ACCESSTYPE) { aPrefName += (aAction == nsIXPCSecurityManager::ACCESS_SET_PROPERTY ? ".set" : ".get"); return aSecurityPref->SecurityGetCharPref(aPrefName.get(), result); } //-- Couldn't find a pref return NS_ERROR_FAILURE; } nsresult nsScriptSecurityManager::GetPolicy(nsIPrincipal* principal, const char* aClassName, const char* aPropertyName, PRInt32 aClassPolicy, PRUint32 aAction, char** result) { nsresult rv; *result = nsnull; nsCOMPtr securityPref(do_QueryReferent(mPrefBranchWeakRef)); if (!securityPref) return NS_ERROR_FAILURE; if ((aClassPolicy & CLASS_HAS_SITE_POLICY) && mOriginToPolicyMap) { //-- Look up the name of the relevant per-site policy nsCOMPtr codebase(do_QueryInterface(principal)); if (!codebase) return NS_ERROR_FAILURE; nsXPIDLCString origin; if (NS_FAILED(rv = codebase->GetOrigin(getter_Copies(origin)))) return rv; const char *s = origin; const char *nextToLastDot = nsnull; const char *lastDot = nsnull; const char *colon = nsnull; const char *p = s; while (*p) { if (*p == '.') { nextToLastDot = lastDot; lastDot = p; } if (!colon && *p == ':') colon = p; p++; } nsCStringKey key(nextToLastDot ? nextToLastDot+1 : s); nsDomainEntry *de = (nsDomainEntry *) mOriginToPolicyMap->Get(&key); if (!de) { nsCAutoString scheme(s, colon-s+1); nsCStringKey schemeKey(scheme); de = (nsDomainEntry *) mOriginToPolicyMap->Get(&schemeKey); } nsCString *policy = nsnull; while (de) { if (de->Matches(s)) { policy = &de->mPolicy; break; } de = de->mNext; } if (policy) { //-- build the pref name and look it up //-- the form is "capability.policy.policyname.class.property" nsCAutoString prefName("capability.policy."); prefName += *policy; prefName += '.'; rv = TryToGetPref(securityPref, prefName, aClassName, aPropertyName, aClassPolicy, aAction, result); if (NS_SUCCEEDED(rv)) return NS_OK; } } //-- Now try looking up a default policy, if one exists //-- the form is "capability.policy.default.class.property" if (aClassPolicy & CLASS_HAS_DEFAULT_POLICY) { nsCAutoString prefName("capability.policy.default."); rv = TryToGetPref(securityPref, prefName, aClassName, aPropertyName, aClassPolicy, aAction, result); if (NS_SUCCEEDED(rv)) return NS_OK; } //-- Couldn't find a policy return NS_ERROR_FAILURE; } NS_IMETHODIMP nsScriptSecurityManager::CheckLoadURIFromScript(JSContext *cx, nsIURI *aURI) { // Get principal of currently executing script. nsCOMPtr principal; if (NS_FAILED(GetSubjectPrincipal(cx, getter_AddRefs(principal)))) return NS_ERROR_FAILURE; // Native code can load all URIs. if (!principal) return NS_OK; // The system principal can load all URIs. PRBool equals = PR_FALSE; if (NS_FAILED(principal->Equals(mSystemPrincipal, &equals))) return NS_ERROR_FAILURE; if (equals) return NS_OK; // Otherwise, principal should have a codebase that we can use to // do the remaining tests. nsCOMPtr codebase(do_QueryInterface(principal)); if (!codebase) return NS_ERROR_FAILURE; nsCOMPtr uri; if (NS_FAILED(codebase->GetURI(getter_AddRefs(uri)))) return NS_ERROR_FAILURE; if (NS_SUCCEEDED(CheckLoadURI(uri, aURI, nsIScriptSecurityManager::STANDARD ))) return NS_OK; // See if we're attempting to load a file: URI. If so, let a // UniversalFileRead capability trump the above check. PRBool isFile = PR_FALSE; PRBool isRes = PR_FALSE; if (NS_FAILED(aURI->SchemeIs("file", &isFile)) || NS_FAILED(aURI->SchemeIs("resource", &isRes))) return NS_ERROR_FAILURE; if (isFile || isRes) { PRBool enabled; if (NS_FAILED(IsCapabilityEnabled("UniversalFileRead", &enabled))) return NS_ERROR_FAILURE; if (enabled) return NS_OK; } // Report error. nsXPIDLCString spec; if (NS_FAILED(aURI->GetSpec(getter_Copies(spec)))) return NS_ERROR_FAILURE; JS_ReportError(cx, "illegal URL method '%s'", (const char *)spec); return NS_ERROR_DOM_BAD_URI; } nsresult nsScriptSecurityManager::GetBaseURIScheme(nsIURI* aURI, char** aScheme) { if (!aURI) return NS_ERROR_FAILURE; nsresult rv; nsCOMPtr uri(aURI); //-- get the source scheme nsXPIDLCString scheme; rv = uri->GetScheme(getter_Copies(scheme)); if (NS_FAILED(rv)) return rv; //-- If uri is a view-source URI, drill down to the base URI nsXPIDLCString path; while(PL_strcmp(scheme, "view-source") == 0) { rv = uri->GetPath(getter_Copies(path)); if (NS_FAILED(rv)) return rv; rv = NS_NewURI(getter_AddRefs(uri), path, nsnull); if (NS_FAILED(rv)) return rv; rv = uri->GetScheme(getter_Copies(scheme)); if (NS_FAILED(rv)) return rv; } //-- If uri is a jar URI, drill down again nsCOMPtr jarURI; PRBool isJAR = PR_FALSE; while((jarURI = do_QueryInterface(uri))) { jarURI->GetJARFile(getter_AddRefs(uri)); isJAR = PR_TRUE; } if (!uri) return NS_ERROR_FAILURE; if (isJAR) { rv = uri->GetScheme(getter_Copies(scheme)); if (NS_FAILED(rv)) return rv; } //-- if uri is an about uri, distinguish 'safe' and 'unsafe' about URIs static const char aboutScheme[] = "about"; if(nsCRT::strcasecmp(scheme, aboutScheme) == 0) *aScheme = PL_strdup(scheme); { nsXPIDLCString spec; if(NS_FAILED(uri->GetSpec(getter_Copies(spec)))) return NS_ERROR_FAILURE; const char* page = spec.get() + sizeof(aboutScheme); if ((PL_strcmp(page, "blank") == 0) || (PL_strcmp(page, "") == 0) || (PL_strcmp(page, "mozilla") == 0) || (PL_strcmp(page, "credits") == 0)) { *aScheme = PL_strdup("about safe"); return *aScheme ? NS_OK : NS_ERROR_OUT_OF_MEMORY; } } *aScheme = PL_strdup(scheme); return *aScheme ? NS_OK : NS_ERROR_OUT_OF_MEMORY; } NS_IMETHODIMP nsScriptSecurityManager::CheckLoadURI(nsIURI *aSourceURI, nsIURI *aTargetURI, PRUint32 aFlags) { nsresult rv; //-- get the source scheme nsXPIDLCString sourceScheme; rv = GetBaseURIScheme(aSourceURI, getter_Copies(sourceScheme)); if (NS_FAILED(rv)) return rv; // Some loads are not allowed from mail/news messages if ((aFlags & nsIScriptSecurityManager::DISALLOW_FROM_MAIL) && (nsCRT::strcasecmp(sourceScheme, "mailbox") == 0 || nsCRT::strcasecmp(sourceScheme, "imap") == 0 || nsCRT::strcasecmp(sourceScheme, "news") == 0)) { return NS_ERROR_DOM_BAD_URI; } //-- get the target scheme nsXPIDLCString targetScheme; rv = GetBaseURIScheme(aTargetURI, getter_Copies(targetScheme)); if (NS_FAILED(rv)) return rv; if (nsCRT::strcasecmp(targetScheme, sourceScheme) == 0) { // every scheme can access another URI from the same scheme return NS_OK; } //-- If the schemes don't match, the policy is specified in this table. enum Action { AllowProtocol, DenyProtocol, PrefControlled, ChromeProtocol }; static const struct { const char *name; Action action; } protocolList[] = { //-- Keep the most commonly used protocols at the top of the list // to increase performance { "http", AllowProtocol }, { "chrome", ChromeProtocol }, { "file", PrefControlled }, { "https", AllowProtocol }, { "mailbox", DenyProtocol }, { "pop", AllowProtocol }, { "imap", DenyProtocol }, { "pop3", DenyProtocol }, { "news", AllowProtocol }, { "javascript", AllowProtocol }, { "ftp", AllowProtocol }, { "about safe", AllowProtocol }, { "about", DenyProtocol }, { "mailto", AllowProtocol }, { "aim", AllowProtocol }, { "data", AllowProtocol }, { "keyword", DenyProtocol }, { "resource", ChromeProtocol }, { "gopher", AllowProtocol }, { "datetime", DenyProtocol }, { "finger", AllowProtocol }, { "res", DenyProtocol } }; for (unsigned i=0; i < sizeof(protocolList)/sizeof(protocolList[0]); i++) { if (nsCRT::strcasecmp(targetScheme, protocolList[i].name) == 0) { PRBool doCheck = PR_FALSE; switch (protocolList[i].action) { case AllowProtocol: // everyone can access these schemes. return NS_OK; case PrefControlled: // Allow access if pref is false { nsCOMPtr securityPref = do_QueryReferent(mPrefBranchWeakRef); if (!securityPref) return NS_ERROR_FAILURE; securityPref->SecurityGetBoolPref("security.checkloaduri", &doCheck); return doCheck ? ReportErrorToConsole(aTargetURI) : NS_OK; } case ChromeProtocol: if (aFlags & nsIScriptSecurityManager::ALLOW_CHROME) return NS_OK; // resource: and chrome: are equivalent, securitywise if ((PL_strcmp(sourceScheme, "chrome") == 0) || (PL_strcmp(sourceScheme, "resource") == 0)) return NS_OK; return ReportErrorToConsole(aTargetURI); case DenyProtocol: // Deny access return ReportErrorToConsole(aTargetURI); } } } // If we reach here, we have an unknown protocol. Warn, but allow. // This is risky from a security standpoint, but allows flexibility // in installing new protocol handlers after initial ship. NS_WARN_IF_FALSE(PR_FALSE, "unknown protocol in nsScriptSecurityManager::CheckLoadURI"); return NS_OK; } nsresult nsScriptSecurityManager::ReportErrorToConsole(nsIURI* aTarget) { nsXPIDLCString spec; nsresult rv = aTarget->GetSpec(getter_Copies(spec)); if (NS_FAILED(rv)) return rv; nsAutoString msg; msg.AssignWithConversion("The link to "); msg.AppendWithConversion(spec); msg.AppendWithConversion(" was blocked by the security manager.\nRemote content may not link to local content."); // Report error in JS console nsCOMPtr console(do_GetService("@mozilla.org/consoleservice;1")); if (console) { PRUnichar* messageUni = ToNewUnicode(msg); if (!messageUni) return NS_ERROR_FAILURE; console->LogStringMessage(messageUni); nsMemory::Free(messageUni); } #ifdef DEBUG char* messageCstr = ToNewCString(msg); if (!messageCstr) return NS_ERROR_FAILURE; fprintf(stderr, "%s\n", messageCstr); PR_Free(messageCstr); #endif //-- Always returns an error return NS_ERROR_DOM_BAD_URI; } NS_IMETHODIMP nsScriptSecurityManager::CheckLoadURIStr(const char* aSourceURIStr, const char* aTargetURIStr, PRUint32 aFlags) { nsCOMPtr source; nsresult rv = NS_NewURI(getter_AddRefs(source), aSourceURIStr, nsnull); NS_ENSURE_SUCCESS(rv, rv); nsCOMPtr target; rv = NS_NewURI(getter_AddRefs(target), aTargetURIStr, nsnull); NS_ENSURE_SUCCESS(rv, rv); return CheckLoadURI(source, target, aFlags); } NS_IMETHODIMP nsScriptSecurityManager::CheckFunctionAccess(JSContext *aCx, void *aFunObj, void *aTargetObj) { //-- This check is called for event handlers nsCOMPtr subject; nsresult rv = GetFunctionObjectPrincipal(aCx, (JSObject *)aFunObj, getter_AddRefs(subject)); //-- If subject is null, get a principal from the function object's scope. if (NS_SUCCEEDED(rv) && !subject) rv = GetObjectPrincipal(aCx, (JSObject*)aFunObj, getter_AddRefs(subject)); if (NS_FAILED(rv)) return rv; if (!subject) return NS_ERROR_FAILURE; PRBool isSystem; if (NS_SUCCEEDED(subject->Equals(mSystemPrincipal, &isSystem)) && isSystem) // This is the system principal: just allow access return NS_OK; // Check if the principal the function was compiled under is // allowed to execute scripts. PRBool result; rv = CanExecuteScripts(aCx, subject, &result); if (NS_FAILED(rv)) return rv; if (!result) return NS_ERROR_DOM_SECURITY_ERR; /* ** Get origin of subject and object and compare. */ JSObject* obj = (JSObject*)aTargetObj; nsCOMPtr object; if (NS_FAILED(GetObjectPrincipal(aCx, obj, getter_AddRefs(object)))) return NS_ERROR_FAILURE; if (subject == object) return NS_OK; PRBool isSameOrigin = PR_FALSE; if (NS_FAILED(subject->Equals(object, &isSameOrigin))) return NS_ERROR_FAILURE; if (isSameOrigin) return NS_OK; // Allow access to about:blank nsCOMPtr objectCodebase(do_QueryInterface(object)); if (objectCodebase) { nsXPIDLCString origin; if (NS_FAILED(objectCodebase->GetOrigin(getter_Copies(origin)))) return NS_ERROR_FAILURE; if (nsCRT::strcasecmp(origin, "about:blank") == 0) return NS_OK; } /* ** Access tests failed. Fail silently without a JS exception. */ return NS_ERROR_DOM_SECURITY_ERR; } nsresult nsScriptSecurityManager::GetRootDocShell(JSContext *cx, nsIDocShell **result) { nsresult rv; *result = nsnull; nsCOMPtr docshell; nsCOMPtr scriptContext = (nsIScriptContext*)JS_GetContextPrivate(cx); if (!scriptContext) return NS_ERROR_FAILURE; nsCOMPtr globalObject; scriptContext->GetGlobalObject(getter_AddRefs(globalObject)); if (!globalObject) return NS_ERROR_FAILURE; rv = globalObject->GetDocShell(getter_AddRefs(docshell)); if (NS_FAILED(rv)) return rv; nsCOMPtr docshellTreeItem(do_QueryInterface(docshell, &rv)); if (NS_FAILED(rv)) return rv; nsCOMPtr rootItem; rv = docshellTreeItem->GetRootTreeItem(getter_AddRefs(rootItem)); if (NS_FAILED(rv)) return rv; return rootItem->QueryInterface(NS_GET_IID(nsIDocShell), (void**)result); } NS_IMETHODIMP nsScriptSecurityManager::CanExecuteScripts(JSContext* cx, nsIPrincipal *principal, PRBool *result) { if (principal == mSystemPrincipal) { // Even if JavaScript is disabled, we must still execute system scripts *result = PR_TRUE; return NS_OK; } //-- Always allow chrome pages to run scripts // This is for about: URLs, which are chrome but don't // have the system principal nsresult rv; if (!mIsJavaScriptEnabled) { nsCOMPtr codebase(do_QueryInterface(principal)); if (codebase) { nsXPIDLCString origin; rv = codebase->GetOrigin(getter_Copies(origin)); static const char chromePrefix[] = "chrome:"; if (NS_SUCCEEDED(rv) && (PL_strncmp(origin, chromePrefix, sizeof(chromePrefix)-1) == 0)) { *result = PR_TRUE; return NS_OK; } } } //-- See if the current window allows JS execution nsCOMPtr docshell; rv = GetRootDocShell(cx, getter_AddRefs(docshell)); if (NS_SUCCEEDED(rv)) { rv = docshell->GetAllowJavascript(result); if (NS_FAILED(rv)) return rv; if (!*result) return NS_OK; } //-- See if JS is disabled globally (via prefs) *result = mIsJavaScriptEnabled; if ((mIsJavaScriptEnabled != mIsMailJavaScriptEnabled) && docshell) { // Is this script running from mail? PRUint32 appType; rv = docshell->GetAppType(&appType); if (NS_FAILED(rv)) return rv; if (appType == nsIDocShell::APP_TYPE_MAIL) *result = mIsMailJavaScriptEnabled; } if (!*result) return NS_OK; //-- Check for a per-site policy static const char jsPrefGroupName[] = "javascript"; nsCStringKey jsKey(jsPrefGroupName); PRInt32 classPolicy = mClassPolicies ? NS_PTR_TO_INT32(mClassPolicies->Get(&jsKey)) : 0; if(classPolicy) { nsXPIDLCString policy; rv = GetPolicy(principal, jsPrefGroupName, "enabled", classPolicy, 0, getter_Copies(policy)); if (NS_SUCCEEDED(rv) && (PL_strcmp("noAccess", policy) == 0)) { *result = PR_FALSE; return NS_OK; } } //-- Nobody vetoed, so allow the JS to run. *result = PR_TRUE; return NS_OK; } ///////////////// Principals /////////////////////// NS_IMETHODIMP nsScriptSecurityManager::GetSubjectPrincipal(nsIPrincipal **result) { JSContext *cx = GetCurrentContextQuick(); if (!cx) { *result = nsnull; return NS_OK; } return GetSubjectPrincipal(cx, result); } NS_IMETHODIMP nsScriptSecurityManager::GetSystemPrincipal(nsIPrincipal **result) { if (!mSystemPrincipal) { mSystemPrincipal = new nsSystemPrincipal(); if (!mSystemPrincipal) return NS_ERROR_OUT_OF_MEMORY; NS_ADDREF(mSystemPrincipal); } *result = mSystemPrincipal; NS_ADDREF(*result); return NS_OK; } NS_IMETHODIMP nsScriptSecurityManager::GetCertificatePrincipal(const char* aCertID, nsIPrincipal **result) { nsresult rv; //-- Create a certificate principal nsCertificatePrincipal *certificate = new nsCertificatePrincipal(); if (!certificate) return NS_ERROR_OUT_OF_MEMORY; NS_ADDREF(certificate); if (NS_FAILED(certificate->Init(aCertID))) { NS_RELEASE(certificate); return NS_ERROR_FAILURE; } nsCOMPtr principal(do_QueryInterface((nsBasePrincipal*)certificate, &rv)); NS_RELEASE(certificate); if (NS_FAILED(rv)) return rv; if (mPrincipals) { // Check to see if we already have this principal. nsIPrincipalKey key(principal); nsCOMPtr fromTable = (nsIPrincipal *) mPrincipals->Get(&key); if (fromTable) principal = fromTable; } //-- Bundle this certificate principal into an aggregate principal nsAggregatePrincipal* agg = new nsAggregatePrincipal(); if (!agg) return NS_ERROR_OUT_OF_MEMORY; rv = agg->SetCertificate(principal); if (NS_FAILED(rv)) return rv; principal = do_QueryInterface((nsBasePrincipal*)agg, &rv); if (NS_FAILED(rv)) return rv; *result = principal; NS_ADDREF(*result); return NS_OK; } nsresult nsScriptSecurityManager::CreateCodebasePrincipal(nsIURI* aURI, nsIPrincipal **result) { nsresult rv = NS_OK; nsCodebasePrincipal *codebase = new nsCodebasePrincipal(); if (!codebase) return NS_ERROR_OUT_OF_MEMORY; NS_ADDREF(codebase); if (NS_FAILED(codebase->Init(aURI))) { NS_RELEASE(codebase); return NS_ERROR_FAILURE; } rv = CallQueryInterface((nsBasePrincipal*)codebase, result); NS_RELEASE(codebase); return rv; } NS_IMETHODIMP nsScriptSecurityManager::GetCodebasePrincipal(nsIURI *aURI, nsIPrincipal **result) { nsresult rv; nsCOMPtr principal; rv = CreateCodebasePrincipal(aURI, getter_AddRefs(principal)); if (NS_FAILED(rv)) return rv; if (mPrincipals) { //-- Check to see if we already have this principal. nsIPrincipalKey key(principal); nsCOMPtr fromTable = (nsIPrincipal *) mPrincipals->Get(&key); if (fromTable) principal = fromTable; else //-- Check to see if we have a more general principal { nsCOMPtr codebasePrin(do_QueryInterface(principal)); nsXPIDLCString originUrl; rv = codebasePrin->GetOrigin(getter_Copies(originUrl)); if (NS_FAILED(rv)) return rv; nsCOMPtr newURI; rv = NS_NewURI(getter_AddRefs(newURI), originUrl, nsnull); if (NS_FAILED(rv)) return rv; nsCOMPtr principal2; rv = CreateCodebasePrincipal(newURI, getter_AddRefs(principal2)); if (NS_FAILED(rv)) return rv; nsIPrincipalKey key2(principal2); fromTable = (nsIPrincipal *) mPrincipals->Get(&key2); if (fromTable) principal = fromTable; } } //-- Bundle this codebase principal into an aggregate principal nsAggregatePrincipal* agg = new nsAggregatePrincipal(); if (!agg) return NS_ERROR_OUT_OF_MEMORY; rv = agg->SetCodebase(principal); if (NS_FAILED(rv)) return rv; principal = do_QueryInterface((nsBasePrincipal*)agg, &rv); if (NS_FAILED(rv)) return rv; *result = principal; NS_ADDREF(*result); return NS_OK; } nsresult nsScriptSecurityManager::GetScriptPrincipal(JSContext *cx, JSScript *script, nsIPrincipal **result) { if (!script) { *result = nsnull; return NS_OK; } JSPrincipals *jsp = JS_GetScriptPrincipals(cx, script); if (!jsp) { // Script didn't have principals -- shouldn't happen. return NS_ERROR_FAILURE; } nsJSPrincipals *nsJSPrin = NS_STATIC_CAST(nsJSPrincipals *, jsp); *result = nsJSPrin->nsIPrincipalPtr; if (!*result) return NS_ERROR_FAILURE; NS_ADDREF(*result); return NS_OK; } nsresult nsScriptSecurityManager::GetFunctionObjectPrincipal(JSContext *cx, JSObject *obj, nsIPrincipal **result) { JSFunction *fun = (JSFunction *) JS_GetPrivate(cx, obj); JSScript *script = JS_GetFunctionScript(cx, fun); nsCOMPtr scriptPrincipal; if (script) if (NS_FAILED(GetScriptPrincipal(cx, script, getter_AddRefs(scriptPrincipal)))) return NS_ERROR_FAILURE; if (script && (JS_GetFunctionObject(fun) != obj) && (scriptPrincipal.get() == mSystemPrincipal)) { // Function is brutally-shared chrome. For this case only, // get a principal from the object's scope instead of the // principal compiled into the function. return GetObjectPrincipal(cx, obj, result); } *result = scriptPrincipal.get(); NS_IF_ADDREF(*result); return NS_OK; } nsresult nsScriptSecurityManager::GetFramePrincipal(JSContext *cx, JSStackFrame *fp, nsIPrincipal **result) { JSObject *obj = JS_GetFrameFunctionObject(cx, fp); if (!obj) { // Must be in a top-level script. Get principal from the script. JSScript *script = JS_GetFrameScript(cx, fp); return GetScriptPrincipal(cx, script, result); } return GetFunctionObjectPrincipal(cx, obj, result); } nsresult nsScriptSecurityManager::GetPrincipalAndFrame(JSContext *cx, nsIPrincipal **result, JSStackFrame **frameResult) { // Get principals from innermost frame of JavaScript or Java. JSStackFrame *fp = nsnull; // tell JS_FrameIterator to start at innermost for (fp = JS_FrameIterator(cx, &fp); fp; fp = JS_FrameIterator(cx, &fp)) { if (NS_FAILED(GetFramePrincipal(cx, fp, result))) return NS_ERROR_FAILURE; if (*result) { *frameResult = fp; return NS_OK; } } //-- If there's no principal on the stack, look at the global object // and return the innermost frame for annotations. if (cx) { nsCOMPtr scriptContext = NS_REINTERPRET_CAST(nsIScriptContext*,JS_GetContextPrivate(cx)); if (scriptContext) { nsCOMPtr global; scriptContext->GetGlobalObject(getter_AddRefs(global)); NS_ENSURE_TRUE(global, NS_ERROR_FAILURE); nsCOMPtr globalData(do_QueryInterface(global)); NS_ENSURE_TRUE(globalData, NS_ERROR_FAILURE); globalData->GetPrincipal(result); if (*result) { JSStackFrame *inner = nsnull; *frameResult = JS_FrameIterator(cx, &inner); return NS_OK; } } } *result = nsnull; return NS_OK; } nsresult nsScriptSecurityManager::GetSubjectPrincipal(JSContext *cx, nsIPrincipal **result) { JSStackFrame *fp; return GetPrincipalAndFrame(cx, result, &fp); } nsresult nsScriptSecurityManager::GetObjectPrincipal(JSContext *aCx, JSObject *aObj, nsIPrincipal **result) { JSObject *parent = aObj; do { JSClass *jsClass = JS_GetClass(aCx, parent); const uint32 privateNsISupports = JSCLASS_HAS_PRIVATE | JSCLASS_PRIVATE_IS_NSISUPPORTS; if (jsClass && (jsClass->flags & (privateNsISupports)) == privateNsISupports) { nsCOMPtr supports = (nsISupports *) JS_GetPrivate(aCx, parent); nsCOMPtr objPrin = do_QueryInterface(supports); if (!objPrin) { /* * If it's a wrapped native, check the underlying native * instead. */ nsCOMPtr xpcNative = do_QueryInterface(supports); if (xpcNative) xpcNative->GetNative(getter_AddRefs(supports)); objPrin = do_QueryInterface(supports); } if (objPrin && NS_SUCCEEDED(objPrin->GetPrincipal(result))) return NS_OK; } parent = JS_GetParent(aCx, parent); } while (parent); // Couldn't find a principal for this object. return NS_ERROR_FAILURE; } nsresult nsScriptSecurityManager::SavePrincipal(nsIPrincipal* aToSave) { nsresult rv; nsCOMPtr persistent = aToSave; nsCOMPtr aggregate(do_QueryInterface(aToSave, &rv)); if (NS_SUCCEEDED(rv)) if (NS_FAILED(aggregate->GetPrimaryChild(getter_AddRefs(persistent)))) return NS_ERROR_FAILURE; //-- Save to mPrincipals if (!mPrincipals) { mPrincipals = new nsSupportsHashtable(31); if (!mPrincipals) return NS_ERROR_OUT_OF_MEMORY; } nsIPrincipalKey key(persistent); mPrincipals->Put(&key, persistent); //-- Save to prefs nsXPIDLCString idPrefName; nsXPIDLCString id; nsXPIDLCString grantedList; nsXPIDLCString deniedList; rv = persistent->GetPreferences(getter_Copies(idPrefName), getter_Copies(id), getter_Copies(grantedList), getter_Copies(deniedList)); if (NS_FAILED(rv)) return NS_ERROR_FAILURE; nsXPIDLCString grantedPrefName; nsXPIDLCString deniedPrefName; rv = PrincipalPrefNames( idPrefName, getter_Copies(grantedPrefName), getter_Copies(deniedPrefName) ); if (NS_FAILED(rv)) return NS_ERROR_FAILURE; nsCOMPtr securityPref(do_QueryReferent(mPrefBranchWeakRef)); if (!securityPref) return NS_ERROR_FAILURE; mIsWritingPrefs = PR_TRUE; if (grantedList) securityPref->SecuritySetCharPref(grantedPrefName, grantedList); else securityPref->SecurityClearUserPref(grantedPrefName); if (deniedList) securityPref->SecuritySetCharPref(deniedPrefName, deniedList); else securityPref->SecurityClearUserPref(deniedPrefName); if (grantedList || deniedList) securityPref->SecuritySetCharPref(idPrefName, id); else securityPref->SecurityClearUserPref(idPrefName); mIsWritingPrefs = PR_FALSE; nsCOMPtr prefService(do_GetService(NS_PREFSERVICE_CONTRACTID, &rv)); NS_ENSURE_SUCCESS(rv, rv); return prefService->SavePrefFile(nsnull); } ///////////////// Capabilities API ///////////////////// NS_IMETHODIMP nsScriptSecurityManager::IsCapabilityEnabled(const char *capability, PRBool *result) { nsresult rv; JSStackFrame *fp = nsnull; JSContext *cx = GetCurrentContextQuick(); fp = cx ? JS_FrameIterator(cx, &fp) : nsnull; if (!fp) { // No script code on stack. Allow execution. *result = PR_TRUE; return NS_OK; } *result = PR_FALSE; nsCOMPtr previousPrincipal; do { nsCOMPtr principal; if (NS_FAILED(GetFramePrincipal(cx, fp, getter_AddRefs(principal)))) return NS_ERROR_FAILURE; if (!principal) continue; // If caller has a different principal, stop looking up the stack. if(previousPrincipal) { PRBool isEqual = PR_FALSE; if(NS_FAILED(previousPrincipal->Equals(principal, &isEqual)) || !isEqual) break; } else previousPrincipal = principal; // First check if the principal is even able to enable the // given capability. If not, don't look any further. PRInt16 canEnable; rv = principal->CanEnableCapability(capability, &canEnable); if (NS_FAILED(rv)) return rv; if (canEnable != nsIPrincipal::ENABLE_GRANTED && canEnable != nsIPrincipal::ENABLE_WITH_USER_PERMISSION) return NS_OK; // Now see if the capability is enabled. void *annotation = JS_GetFrameAnnotation(cx, fp); rv = principal->IsCapabilityEnabled(capability, annotation, result); if (NS_FAILED(rv)) return rv; if (*result) return NS_OK; } while ((fp = JS_FrameIterator(cx, &fp)) != nsnull); return NS_OK; } #define PROPERTIES_URL "chrome://communicator/locale/security/security.properties" nsresult Localize(const char *genericString, nsString &result) { nsresult ret; /* create a URL for the string resource file */ nsIIOService *pNetService = nsnull; ret = nsServiceManager::GetService(kIOServiceCID, kIIOServiceIID, (nsISupports**) &pNetService); if (NS_FAILED(ret)) { NS_WARNING("cannot get net service\n"); return ret; } nsIURI *uri = nsnull; ret = pNetService->NewURI(PROPERTIES_URL, nsnull, &uri); if (NS_FAILED(ret)) { NS_WARNING("cannot create URI\n"); nsServiceManager::ReleaseService(kIOServiceCID, pNetService); return ret; } nsIURI *url = nsnull; ret = uri->QueryInterface(NS_GET_IID(nsIURI), (void**)&url); nsServiceManager::ReleaseService(kIOServiceCID, pNetService); if (NS_FAILED(ret)) { NS_WARNING("cannot create URL\n"); return ret; } /* create a bundle for the localization */ nsIStringBundleService *pStringService = nsnull; ret = nsServiceManager::GetService(kStringBundleServiceCID, kIStringBundleServiceIID, (nsISupports**) &pStringService); if (NS_FAILED(ret)) { NS_WARNING("cannot get string service\n"); return ret; } char *spec = nsnull; ret = url->GetSpec(&spec); if (NS_FAILED(ret)) { NS_WARNING("cannot get url spec\n"); nsServiceManager::ReleaseService(kStringBundleServiceCID, pStringService); nsCRT::free(spec); return ret; } nsIStringBundle *bundle = nsnull; ret = pStringService->CreateBundle(spec, &bundle); nsCRT::free(spec); nsServiceManager::ReleaseService(kStringBundleServiceCID, pStringService); if (NS_FAILED(ret)) { NS_WARNING("cannot create instance\n"); return ret; } /* localize the given string */ nsAutoString strtmp; strtmp.AssignWithConversion(genericString); PRUnichar *ptrv = nsnull; ret = bundle->GetStringFromName(strtmp.get(), &ptrv); NS_RELEASE(bundle); if (NS_FAILED(ret)) NS_WARNING("cannot get string from name\n"); result = ptrv; nsCRT::free(ptrv); return ret; } static PRBool CheckConfirmDialog(JSContext* cx, const PRUnichar *szMessage, const PRUnichar *szCheckMessage, PRBool *checkValue) { nsresult res; //-- Get a prompter for the current window. nsCOMPtr prompter; nsCOMPtr scriptContext = (nsIScriptContext*)JS_GetContextPrivate(cx); if (scriptContext) { nsCOMPtr globalObject; scriptContext->GetGlobalObject(getter_AddRefs(globalObject)); NS_ASSERTION(globalObject, "script context has no global object"); nsCOMPtr domWin(do_QueryInterface(globalObject)); if (domWin) domWin->GetPrompter(getter_AddRefs(prompter)); } if (!prompter) { //-- Couldn't get prompter from the current window, so get the prompt service. nsCOMPtr wwatch(do_GetService("@mozilla.org/embedcomp/window-watcher;1")); if (wwatch) wwatch->GetNewPrompter(0, getter_AddRefs(prompter)); } if (!prompter) { *checkValue = 0; return PR_FALSE; } PRInt32 buttonPressed = 1; /* in case user exits dialog by clicking X */ nsAutoString dialogTitle; if (NS_FAILED(res = Localize("Titleline", dialogTitle))) return PR_FALSE; res = prompter->ConfirmEx(dialogTitle.get(), szMessage, (nsIPrompt::BUTTON_TITLE_YES * nsIPrompt::BUTTON_POS_0) + (nsIPrompt::BUTTON_TITLE_NO * nsIPrompt::BUTTON_POS_1), nsnull, nsnull, nsnull, szCheckMessage, checkValue, &buttonPressed); if (NS_FAILED(res)) *checkValue = 0; if (*checkValue != 0 && *checkValue != 1) *checkValue = 0; /* this should never happen but it is happening!!! */ return (buttonPressed == 0); } NS_IMETHODIMP nsScriptSecurityManager::RequestCapability(nsIPrincipal* aPrincipal, const char *capability, PRInt16* canEnable) { if (NS_FAILED(aPrincipal->CanEnableCapability(capability, canEnable))) return NS_ERROR_FAILURE; if (*canEnable == nsIPrincipal::ENABLE_WITH_USER_PERMISSION) { // Prompt user for permission to enable capability. // "Remember This Decision" is unchecked by default. static PRBool remember = PR_FALSE; nsAutoString query, check; if (NS_FAILED(Localize("EnableCapabilityQuery", query))) return NS_ERROR_FAILURE; if (NS_FAILED(Localize("CheckMessage", check))) return NS_ERROR_FAILURE; char *source; if (NS_FAILED(aPrincipal->ToUserVisibleString(&source))) return NS_ERROR_FAILURE; PRUnichar *message = nsTextFormatter::smprintf(query.get(), source); Recycle(source); JSContext *cx = GetCurrentContextQuick(); if (CheckConfirmDialog(cx, message, check.get(), &remember)) *canEnable = nsIPrincipal::ENABLE_GRANTED; else *canEnable = nsIPrincipal::ENABLE_DENIED; PR_FREEIF(message); if (remember) { //-- Save principal to prefs and to mPrincipals if (NS_FAILED(aPrincipal->SetCanEnableCapability(capability, *canEnable))) return NS_ERROR_FAILURE; if (NS_FAILED(SavePrincipal(aPrincipal))) return NS_ERROR_FAILURE; } } return NS_OK; } NS_IMETHODIMP nsScriptSecurityManager::EnableCapability(const char *capability) { JSContext *cx = GetCurrentContextQuick(); JSStackFrame *fp; //-- Error checks for capability string length (200) if(PL_strlen(capability)>200) { static const char msg[] = "Capability name too long"; JS_SetPendingException(cx, STRING_TO_JSVAL(JS_NewStringCopyZ(cx, msg))); return NS_ERROR_FAILURE; } nsCOMPtr principal; if (NS_FAILED(GetPrincipalAndFrame(cx, getter_AddRefs(principal), &fp))) return NS_ERROR_FAILURE; void *annotation = JS_GetFrameAnnotation(cx, fp); PRBool enabled; if (NS_FAILED(principal->IsCapabilityEnabled(capability, annotation, &enabled))) return NS_ERROR_FAILURE; if (enabled) return NS_OK; PRInt16 canEnable; if (NS_FAILED(RequestCapability(principal, capability, &canEnable))) return NS_ERROR_FAILURE; if (canEnable != nsIPrincipal::ENABLE_GRANTED) { static const char msg[] = "enablePrivilege not granted"; JS_SetPendingException(cx, STRING_TO_JSVAL(JS_NewStringCopyZ(cx, msg))); return NS_ERROR_FAILURE; // XXX better error code? } if (NS_FAILED(principal->EnableCapability(capability, &annotation))) return NS_ERROR_FAILURE; JS_SetFrameAnnotation(cx, fp, annotation); return NS_OK; } NS_IMETHODIMP nsScriptSecurityManager::RevertCapability(const char *capability) { JSContext *cx = GetCurrentContextQuick(); JSStackFrame *fp; nsCOMPtr principal; if (NS_FAILED(GetPrincipalAndFrame(cx, getter_AddRefs(principal), &fp))) return NS_ERROR_FAILURE; void *annotation = JS_GetFrameAnnotation(cx, fp); principal->RevertCapability(capability, &annotation); JS_SetFrameAnnotation(cx, fp, annotation); return NS_OK; } NS_IMETHODIMP nsScriptSecurityManager::DisableCapability(const char *capability) { JSContext *cx = GetCurrentContextQuick(); JSStackFrame *fp; nsCOMPtr principal; if (NS_FAILED(GetPrincipalAndFrame(cx, getter_AddRefs(principal), &fp))) return NS_ERROR_FAILURE; void *annotation = JS_GetFrameAnnotation(cx, fp); principal->DisableCapability(capability, &annotation); JS_SetFrameAnnotation(cx, fp, annotation); return NS_OK; } //////////////// Master Certificate Functions /////////////////////////////////////// NS_IMETHODIMP nsScriptSecurityManager::SetCanEnableCapability(const char* certificateID, const char* capability, PRInt16 canEnable) { nsresult rv; nsCOMPtr subjectPrincipal; rv = GetSubjectPrincipal(getter_AddRefs(subjectPrincipal)); if (NS_FAILED(rv)) return NS_ERROR_FAILURE; //-- Get the system certificate if (!mSystemCertificate) { nsCOMPtr systemCertFile; nsCOMPtr directoryService = do_GetService(NS_DIRECTORY_SERVICE_CONTRACTID, &rv); if (!directoryService) return NS_ERROR_FAILURE; rv = directoryService->Get(NS_XPCOM_CURRENT_PROCESS_DIR, NS_GET_IID(nsIFile), getter_AddRefs(systemCertFile)); if (NS_FAILED(rv)) return NS_ERROR_FAILURE; #ifdef XP_MAC // On Mac, this file will be located in the Essential Files folder systemCertFile->Append("Essential Files"); if (NS_FAILED(rv)) return NS_ERROR_FAILURE; #endif systemCertFile->Append("systemSignature.jar"); if (NS_FAILED(rv)) return NS_ERROR_FAILURE; nsCOMPtr systemCertZip; rv = nsComponentManager::CreateInstance(kZipReaderCID, nsnull, NS_GET_IID(nsIZipReader), getter_AddRefs(systemCertZip)); if (NS_FAILED(rv)) return NS_ERROR_FAILURE; systemCertZip->Init(systemCertFile); rv = systemCertZip->Open(); if (NS_SUCCEEDED(rv)) { nsCOMPtr systemCertJar(do_QueryInterface(systemCertZip, &rv)); if (NS_FAILED(rv)) return NS_ERROR_FAILURE; rv = systemCertJar->GetCertificatePrincipal(nsnull, getter_AddRefs(mSystemCertificate)); if (NS_FAILED(rv)) return NS_ERROR_FAILURE; } } //-- Make sure the caller's principal is the system certificate PRBool isEqual = PR_FALSE; if (mSystemCertificate) { rv = mSystemCertificate->Equals(subjectPrincipal, &isEqual); if (NS_FAILED(rv)) return NS_ERROR_FAILURE; } if (!isEqual) { JSContext* cx = GetCurrentContextQuick(); if (!cx) return NS_ERROR_FAILURE; static const char msg1[] = "Only code signed by the system certificate may call SetCanEnableCapability or Invalidate"; static const char msg2[] = "Attempt to call SetCanEnableCapability or Invalidate when no system certificate has been established"; JS_SetPendingException(cx, STRING_TO_JSVAL(JS_NewStringCopyZ(cx, mSystemCertificate ? msg1 : msg2))); return NS_ERROR_FAILURE; } //-- Get the target principal nsCOMPtr objectPrincipal; rv = GetCertificatePrincipal(certificateID, getter_AddRefs(objectPrincipal)); if (NS_FAILED(rv)) return NS_ERROR_FAILURE; rv = objectPrincipal->SetCanEnableCapability(capability, canEnable); if (NS_FAILED(rv)) return NS_ERROR_FAILURE; return SavePrincipal(objectPrincipal); } //////////////////////////////////////////////// // Methods implementing nsIXPCSecurityManager // //////////////////////////////////////////////// NS_IMETHODIMP nsScriptSecurityManager::CanCreateWrapper(JSContext *aJSContext, const nsIID &aIID, nsISupports *aObj, nsIClassInfo *aClassInfo, void **aPolicy) { #if 0 char* iidStr = aIID.ToString(); printf("### CanCreateWrapper(%s) ", iidStr); PR_FREEIF(iidStr); #endif // XXX Special case for nsIXPCException ? if (IsDOMClass(aClassInfo)) { #if 0 printf("DOM class - GRANTED.\n"); #endif return NS_OK; } //--See if the object advertises a non-default level of access // using nsISecurityCheckedComponent nsCOMPtr checkedComponent = do_QueryInterface(aObj); nsXPIDLCString objectSecurityLevel; if (checkedComponent) checkedComponent->CanCreateWrapper((nsIID *)&aIID, getter_Copies(objectSecurityLevel)); nsresult rv = CheckXPCPermissions(aObj, objectSecurityLevel); if (NS_FAILED(rv)) { //-- Access denied, report an error nsCAutoString errorMsg("Permission denied to create wrapper for object "); // XXX get class name nsXPIDLCString className; if (aClassInfo) { aClassInfo->GetClassDescription(getter_Copies(className)); if (className) { errorMsg += "of class "; errorMsg += className; } } JS_SetPendingException(aJSContext, STRING_TO_JSVAL(JS_NewStringCopyZ(aJSContext, errorMsg.get()))); } return rv; } NS_IMETHODIMP nsScriptSecurityManager::CanCreateInstance(JSContext *aJSContext, const nsCID &aCID) { nsresult rv = CheckXPCPermissions(nsnull, nsnull); if (NS_FAILED(rv)) { //-- Access denied, report an error nsCAutoString errorMsg("Permission denied to create instance of class. CID="); nsXPIDLCString cidStr; cidStr += aCID.ToString(); errorMsg.Append(cidStr); JS_SetPendingException(aJSContext, STRING_TO_JSVAL(JS_NewStringCopyZ(aJSContext, errorMsg.get()))); } return rv; } NS_IMETHODIMP nsScriptSecurityManager::CanGetService(JSContext *aJSContext, const nsCID &aCID) { #if 0 char* cidStr = aCID.ToString(); printf("### CanGetService(%s) ", cidStr); PR_FREEIF(cidStr); #endif nsresult rv = CheckXPCPermissions(nsnull, nsnull); if (NS_FAILED(rv)) { //-- Access denied, report an error nsCAutoString errorMsg("Permission denied to get service. CID="); nsXPIDLCString cidStr; cidStr += aCID.ToString(); errorMsg.Append(cidStr); JS_SetPendingException(aJSContext, STRING_TO_JSVAL(JS_NewStringCopyZ(aJSContext, errorMsg.get()))); } return rv; } /* void CanAccess (in PRUint32 aAction, in nsIXPCNativeCallContext aCallContext, in JSContextPtr aJSContext, in JSObjectPtr aJSObject, in nsISupports aObj, in nsIClassInfo aClassInfo, in JSVal aName, inout voidPtr aPolicy); */ NS_IMETHODIMP nsScriptSecurityManager::CanAccess(PRUint32 aAction, nsIXPCNativeCallContext* aCallContext, JSContext* aJSContext, JSObject* aJSObject, nsISupports* aObj, nsIClassInfo* aClassInfo, jsval aName, void** aPolicy) { return CheckPropertyAccessImpl(aAction, aCallContext, aJSContext, aJSObject, aObj, nsnull, aClassInfo, aName, nsnull, nsnull, aPolicy); } nsresult nsScriptSecurityManager::CheckXPCPermissions(nsISupports* aObj, const char* aObjectSecurityLevel) { //-- Check for the all-powerful UniversalXPConnect privilege PRBool ok = PR_FALSE; if (NS_SUCCEEDED(IsCapabilityEnabled("UniversalXPConnect", &ok)) && ok) return NS_OK; //-- If the object implements nsISecurityCheckedComponent, it has a non-default policy. if (aObjectSecurityLevel) { if (PL_strcasecmp(aObjectSecurityLevel, "AllAccess") == 0) return NS_OK; else if (PL_strcasecmp(aObjectSecurityLevel, "NoAccess") != 0) { PRBool canAccess = PR_FALSE; if (NS_SUCCEEDED(IsCapabilityEnabled(aObjectSecurityLevel, &canAccess)) && canAccess) return NS_OK; } } //-- If user allows scripting of plugins by untrusted scripts, // and the target object is a plugin, allow the access. if(aObj) { nsresult rv; nsCOMPtr plugin(do_QueryInterface(aObj, &rv)); if (NS_SUCCEEDED(rv)) { static PRBool prefSet = PR_FALSE; static PRBool allowPluginAccess = PR_FALSE; if (!prefSet) { nsCOMPtr securityPref(do_QueryReferent(mPrefBranchWeakRef)); if (!securityPref) return NS_ERROR_FAILURE; rv = securityPref->SecurityGetBoolPref("security.xpconnect.plugin.unrestricted", &allowPluginAccess); prefSet = PR_TRUE; } if (allowPluginAccess) return NS_OK; } } //-- Access tests failed return NS_ERROR_DOM_XPCONNECT_ACCESS_DENIED; } ///////////////////////////////////// // Method implementing nsIObserver // ///////////////////////////////////// static const char sPrincipalPrefix[] = "capability.principal"; static const char sPolicyPrefix[] = "capability.policy"; NS_IMETHODIMP nsScriptSecurityManager::Observe(nsISupports* aObject, const char* aAction, const PRUnichar* aPrefName) { nsresult rv = NS_OK; nsCAutoString prefNameStr; prefNameStr.AssignWithConversion(aPrefName); char* prefName = ToNewCString(prefNameStr); if (!prefName) return NS_ERROR_OUT_OF_MEMORY; nsCOMPtr securityPref(do_QueryReferent(mPrefBranchWeakRef)); if (!securityPref) return NS_ERROR_FAILURE; static const char jsPrefix[] = "javascript."; if(PL_strncmp(prefName, jsPrefix, sizeof(jsPrefix)-1) == 0) JSEnabledPrefChanged(securityPref); else if((PL_strncmp(prefName, sPrincipalPrefix, sizeof(sPrincipalPrefix)-1) == 0) && !mIsWritingPrefs) { static const char id[] = "id"; char* lastDot = PL_strrchr(prefName, '.'); //-- This check makes sure the string copy below doesn't overwrite its bounds if(PL_strlen(lastDot) >= sizeof(id)) { PL_strcpy(lastDot + 1, id); const char** idPrefArray = (const char**)&prefName; rv = InitPrincipals(1, idPrefArray, securityPref); } } else if((PL_strncmp(prefName, sPolicyPrefix, sizeof(sPolicyPrefix)-1) == 0)) { const char** prefArray = (const char**)&prefName; rv = InitPolicies(1, prefArray, securityPref); } PR_Free(prefName); return rv; } ///////////////////////////////////////////// // Constructor, Destructor, Initialization // ///////////////////////////////////////////// nsScriptSecurityManager::nsScriptSecurityManager(void) : mOriginToPolicyMap(nsnull), mClassPolicies(nsnull), mSystemPrincipal(nsnull), mPrincipals(nsnull), mIsJavaScriptEnabled(PR_FALSE), mIsMailJavaScriptEnabled(PR_FALSE), mIsWritingPrefs(PR_FALSE), mNameSetRegistered(PR_FALSE) { NS_INIT_REFCNT(); InitPrefs(); mThreadJSContextStack = do_GetService("@mozilla.org/js/xpc/ContextStack;1"); //-- Register security check callback in the JS engine // Currently this is used to control access to function.caller nsresult rv; nsCOMPtr runtimeService = do_GetService("@mozilla.org/js/xpc/RuntimeService;1", &rv); NS_ASSERTION(NS_SUCCEEDED(rv), "Failed to get runtime service"); JSRuntime *rt; rv = runtimeService->GetRuntime(&rt); NS_ASSERTION(NS_SUCCEEDED(rv), "Failed to get current JS runtime"); #ifdef DEBUG JSCheckAccessOp oldCallback = JS_SetCheckObjectAccessCallback(rt, CheckJSFunctionCallerAccess); // For now, assert that no callback was set previously NS_ASSERTION(!oldCallback, "Someone already set a JS CheckObjectAccess callback"); #endif } nsScriptSecurityManager::~nsScriptSecurityManager(void) { delete mOriginToPolicyMap; delete mClassPolicies; NS_IF_RELEASE(mSystemPrincipal); delete mPrincipals; } static nsScriptSecurityManager *ssecMan = NULL; nsScriptSecurityManager * nsScriptSecurityManager::GetScriptSecurityManager() { if (!ssecMan) { ssecMan = new nsScriptSecurityManager(); if (!ssecMan) return NULL; nsresult rv; rv = nsJSPrincipals::Startup(); if (NS_FAILED(rv)) NS_WARNING("can't initialize JS engine security protocol glue!"); nsCOMPtr xpc = do_GetService(nsIXPConnect::GetCID(), &rv); if (NS_SUCCEEDED(rv) && xpc) { rv = xpc->SetDefaultSecurityManager( NS_STATIC_CAST(nsIXPCSecurityManager*, ssecMan), nsIXPCSecurityManager::HOOK_ALL); if (NS_FAILED(rv)) NS_WARNING("failed to install xpconnect security manager!"); #ifdef DEBUG_jband else printf("!!!!! xpc security manager registered\n"); #endif } else NS_WARNING("can't get xpconnect to install security manager!"); } return ssecMan; } // Currently this nsGenericFactory constructor is used only from FastLoad // (XPCOM object deserialization) code, when "creating" the system principal // singleton. nsSystemPrincipal * nsScriptSecurityManager::SystemPrincipalSingletonConstructor() { nsIPrincipal *sysprin = nsnull; if (ssecMan) ssecMan->GetSystemPrincipal(&sysprin); return NS_STATIC_CAST(nsSystemPrincipal*, sysprin); } const char* nsScriptSecurityManager::sJSEnabledPrefName = "javascript.enabled"; const char* nsScriptSecurityManager::sJSMailEnabledPrefName = "javascript.allow.mailnews"; PR_STATIC_CALLBACK(PRBool) DeleteEntry(nsHashKey *aKey, void *aData, void* closure) { nsDomainEntry *entry = (nsDomainEntry *) aData; do { nsDomainEntry *next = entry->mNext; delete entry; entry = next; } while (entry); return PR_TRUE; } nsresult nsScriptSecurityManager::InitPolicies(PRUint32 aPrefCount, const char** aPrefNames, nsISecurityPref* aSecurityPref) { for (PRUint32 c = 0; c < aPrefCount; c++) { unsigned count = 0; const char *dots[5]; const char *p; for (p=aPrefNames[c]; *p; p++) { if (*p == '.') { dots[count++] = p; if (count == sizeof(dots)/sizeof(dots[0])) break; } } if (count < sizeof(dots)/sizeof(dots[0])) dots[count] = p; if (count < 3) continue; const char *policyName = dots[1] + 1; int policyLength = dots[2] - policyName; PRBool isDefault = PL_strncmp("default", policyName, policyLength) == 0; if (!isDefault && count == 3) { // capability.policy..sites const char *sitesName = dots[2] + 1; int sitesLength = dots[3] - sitesName; if (PL_strncmp("sites", sitesName, sitesLength) == 0) { if (!mOriginToPolicyMap) { mOriginToPolicyMap = new nsObjectHashtable(nsnull, nsnull, DeleteEntry, nsnull); if (!mOriginToPolicyMap) return NS_ERROR_OUT_OF_MEMORY; } char *s; if (NS_FAILED(aSecurityPref->SecurityGetCharPref(aPrefNames[c], &s))) return NS_ERROR_FAILURE; char *q=s; char *r=s; char *lastDot = nsnull; char *nextToLastDot = nsnull; PRBool working = PR_TRUE; while (working) { if (*r == ' ' || *r == '\0') { working = (*r != '\0'); *r = '\0'; nsCStringKey key(nextToLastDot ? nextToLastDot+1 : q); nsDomainEntry *value = new nsDomainEntry(q, policyName, policyLength); if (!value) break; nsDomainEntry *de = (nsDomainEntry *) mOriginToPolicyMap->Get(&key); if (!de) mOriginToPolicyMap->Put(&key, value); else { if (de->Matches(q)) { value->mNext = de; mOriginToPolicyMap->Put(&key, value); } else { while (de->mNext) { if (de->mNext->Matches(q)) { value->mNext = de->mNext; de->mNext = value; break; } de = de->mNext; } if (!de->mNext) de->mNext = value; } } q = r + 1; lastDot = nextToLastDot = nsnull; } else if (*r == '.') { nextToLastDot = lastDot; lastDot = r; } r++; } PR_Free(s); } } else if (count > 3) { // capability.policy...[.(get|set)] // Store a notation for this class name in the classes hashtable. // The stored value contains several bits of information. if (!(mClassPolicies)) mClassPolicies = new nsHashtable(31); // In most cases, we hash on the class name at dots[2]+1, // unless the class name is '*' (wildcard), in which case we hash on // '*.propertyname' // Shoving nulls into the pref name string is unorthodox // but it saves a malloc & copy - hash keys require null-terminated strings if (!( (dots[2][1] == '*') && (dots[2][2] == '.') )) *(char*)dots[3] = '\0'; else if (count > 4) { // There's a .get or .set at the end *(char*)dots[4] = '\0'; } nsCStringKey classNameKey(dots[2] + 1); PRInt32 classPolicy = NS_PTR_TO_INT32(mClassPolicies->Get(&classNameKey)); if (isDefault) classPolicy |= CLASS_HAS_DEFAULT_POLICY; else classPolicy |= CLASS_HAS_SITE_POLICY; if (count > 4) classPolicy |= CLASS_HAS_ACCESSTYPE; mClassPolicies->Put(&classNameKey, NS_INT32_TO_PTR(classPolicy)); } } return NS_OK; } nsresult nsScriptSecurityManager::PrincipalPrefNames(const char* pref, char** grantedPref, char** deniedPref) { char* lastDot = PL_strrchr(pref, '.'); if (!lastDot) return NS_ERROR_FAILURE; PRInt32 prefLen = lastDot - pref + 1; *grantedPref = nsnull; *deniedPref = nsnull; static const char granted[] = "granted"; *grantedPref = (char*)PR_MALLOC(prefLen + sizeof(granted)); if (!grantedPref) return NS_ERROR_OUT_OF_MEMORY; PL_strncpy(*grantedPref, pref, prefLen); PL_strcpy(*grantedPref + prefLen, granted); static const char denied[] = "denied"; *deniedPref = (char*)PR_MALLOC(prefLen + sizeof(denied)); if (!deniedPref) { PR_FREEIF(*grantedPref); return NS_ERROR_OUT_OF_MEMORY; } PL_strncpy(*deniedPref, pref, prefLen); PL_strcpy(*deniedPref + prefLen, denied); return NS_OK; } nsresult nsScriptSecurityManager::InitPrincipals(PRUint32 aPrefCount, const char** aPrefNames, nsISecurityPref* aSecurityPref) { /* This is the principal preference syntax: * capability.principal.[codebase|codebaseTrusted|certificate]..[id|granted|denied] * For example: * user_pref("capability.principal.certificate.p1.id","12:34:AB:CD"); * user_pref("capability.principal.certificate.p1.granted","Capability1 Capability2"); * user_pref("capability.principal.certificate.p1.denied","Capability3"); */ /* codebaseTrusted means a codebase principal that can enable capabilities even if * codebase principals are disabled. Don't use trustedCodebase except with unspoofable * URLs such as HTTPS URLs. */ static const char idSuffix[] = ".id"; for (PRUint32 c = 0; c < aPrefCount; c++) { PRInt32 prefNameLen = PL_strlen(aPrefNames[c]) - (sizeof(idSuffix)-1); if (PL_strcasecmp(aPrefNames[c] + prefNameLen, idSuffix) != 0) continue; nsXPIDLCString id; if (NS_FAILED(aSecurityPref->SecurityGetCharPref(aPrefNames[c], getter_Copies(id)))) return NS_ERROR_FAILURE; nsXPIDLCString grantedPrefName; nsXPIDLCString deniedPrefName; nsresult rv = PrincipalPrefNames(aPrefNames[c], getter_Copies(grantedPrefName), getter_Copies(deniedPrefName)); if (rv == NS_ERROR_OUT_OF_MEMORY) return rv; else if (NS_FAILED(rv)) continue; char* grantedList = nsnull; aSecurityPref->SecurityGetCharPref(grantedPrefName, &grantedList); char* deniedList = nsnull; aSecurityPref->SecurityGetCharPref(deniedPrefName, &deniedList); //-- Delete prefs if their value is the empty string if ((!id || id[0] == '\0') || ((!grantedList || grantedList[0] == '\0') && (!deniedList || deniedList[0] == '\0'))) { aSecurityPref->SecurityClearUserPref(aPrefNames[c]); aSecurityPref->SecurityClearUserPref(grantedPrefName); aSecurityPref->SecurityClearUserPref(deniedPrefName); PR_FREEIF(grantedList); PR_FREEIF(deniedList); continue; } //-- Create a principal based on the prefs static const char certificateName[] = "capability.principal.certificate"; static const char codebaseName[] = "capability.principal.codebase"; static const char codebaseTrustedName[] = "capability.principal.codebaseTrusted"; nsCOMPtr principal; if (PL_strncmp(aPrefNames[c], certificateName, sizeof(certificateName)-1) == 0) { nsCertificatePrincipal *certificate = new nsCertificatePrincipal(); if (certificate) { NS_ADDREF(certificate); if (NS_SUCCEEDED(certificate->InitFromPersistent(aPrefNames[c], id, grantedList, deniedList))) principal = do_QueryInterface((nsBasePrincipal*)certificate); NS_RELEASE(certificate); } } else if(PL_strncmp(aPrefNames[c], codebaseName, sizeof(codebaseName)-1) == 0) { nsCodebasePrincipal *codebase = new nsCodebasePrincipal(); if (codebase) { NS_ADDREF(codebase); PRBool trusted = (PL_strncmp(aPrefNames[c], codebaseTrustedName, sizeof(codebaseTrustedName)-1) == 0); if (NS_SUCCEEDED(codebase->InitFromPersistent(aPrefNames[c], id, grantedList, deniedList, trusted))) principal = do_QueryInterface((nsBasePrincipal*)codebase); NS_RELEASE(codebase); } } PR_FREEIF(grantedList); PR_FREEIF(deniedList); if (principal) { if (!mPrincipals) { mPrincipals = new nsSupportsHashtable(31); if (!mPrincipals) return NS_ERROR_OUT_OF_MEMORY; } nsIPrincipalKey key(principal); mPrincipals->Put(&key, principal); } } return NS_OK; } inline void nsScriptSecurityManager::JSEnabledPrefChanged(nsISecurityPref* aSecurityPref) { if (NS_FAILED(aSecurityPref->SecurityGetBoolPref(sJSEnabledPrefName, &mIsJavaScriptEnabled))) // Default to enabled. mIsJavaScriptEnabled = PR_TRUE; if (NS_FAILED(aSecurityPref->SecurityGetBoolPref(sJSMailEnabledPrefName, &mIsMailJavaScriptEnabled))) // Default to enabled. mIsMailJavaScriptEnabled = PR_TRUE; } nsresult nsScriptSecurityManager::InitPrefs() { nsresult rv; nsCOMPtr prefService(do_GetService(NS_PREFSERVICE_CONTRACTID, &rv)); NS_ENSURE_SUCCESS(rv, rv); nsCOMPtr prefBranch; rv = prefService->GetBranch(nsnull, getter_AddRefs(prefBranch)); NS_ENSURE_SUCCESS(rv, rv); mPrefBranchWeakRef = getter_AddRefs(NS_GetWeakReference(prefBranch)); nsCOMPtr prefBranchInternal(do_QueryInterface(prefBranch, &rv)); NS_ENSURE_SUCCESS(rv, rv); nsCOMPtr securityPref(do_QueryInterface(prefBranch)); // Set the initial value of the "javascript.enabled" prefs JSEnabledPrefChanged(securityPref); // set observer callbacks in case the value of the pref changes prefBranchInternal->AddObserver(sJSEnabledPrefName, this, PR_FALSE); prefBranchInternal->AddObserver(sJSMailEnabledPrefName, this, PR_FALSE); PRUint32 prefCount; char** prefNames; //-- Initialize the policy database from prefs rv = prefBranch->GetChildList(sPolicyPrefix, &prefCount, &prefNames); if (NS_SUCCEEDED(rv) && prefCount > 0) { rv = InitPolicies(prefCount, (const char**)prefNames, securityPref); NS_ENSURE_SUCCESS(rv, rv); NS_FREE_XPCOM_ALLOCATED_POINTER_ARRAY(prefCount, prefNames); } //-- Set a callback for policy changes prefBranchInternal->AddObserver(sPolicyPrefix, this, PR_FALSE); //-- Initialize the principals database from prefs rv = prefBranch->GetChildList(sPrincipalPrefix, &prefCount, &prefNames); if (NS_SUCCEEDED(rv) && prefCount > 0) { rv = InitPrincipals(prefCount, (const char**)prefNames, securityPref); NS_ENSURE_SUCCESS(rv, rv); NS_FREE_XPCOM_ALLOCATED_POINTER_ARRAY(prefCount, prefNames); } //-- Set a callback for principal changes prefBranchInternal->AddObserver(sPrincipalPrefix, this, PR_FALSE); return NS_OK; }