2015-05-03 22:32:37 +03:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
2013-07-09 18:45:13 +04:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#include "WindowNamedPropertiesHandler.h"
|
2014-09-09 17:19:10 +04:00
|
|
|
#include "mozilla/dom/EventTargetBinding.h"
|
2014-02-05 22:38:18 +04:00
|
|
|
#include "mozilla/dom/WindowBinding.h"
|
2019-01-12 02:32:24 +03:00
|
|
|
#include "mozilla/dom/WindowProxyHolder.h"
|
2016-01-21 01:48:01 +03:00
|
|
|
#include "nsContentUtils.h"
|
2016-02-10 01:40:45 +03:00
|
|
|
#include "nsDOMWindowList.h"
|
2013-07-09 18:45:13 +04:00
|
|
|
#include "nsGlobalWindow.h"
|
|
|
|
#include "nsHTMLDocument.h"
|
|
|
|
#include "nsJSUtils.h"
|
|
|
|
#include "xpcprivate.h"
|
|
|
|
|
|
|
|
namespace mozilla {
|
|
|
|
namespace dom {
|
|
|
|
|
2016-01-30 20:05:36 +03:00
|
|
|
static bool ShouldExposeChildWindow(nsString& aNameBeingResolved,
|
2019-01-02 16:27:05 +03:00
|
|
|
BrowsingContext* aChild) {
|
|
|
|
nsPIDOMWindowOuter* child = aChild->GetDOMWindow();
|
|
|
|
Element* e = child->GetFrameElementInternal();
|
2015-02-24 17:41:43 +03:00
|
|
|
if (e && e->IsInShadowTree()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2013-09-25 06:02:56 +04:00
|
|
|
// If we're same-origin with the child, go ahead and expose it.
|
2019-01-02 16:27:05 +03:00
|
|
|
nsCOMPtr<nsIScriptObjectPrincipal> sop = do_QueryInterface(child);
|
2013-09-25 06:02:56 +04:00
|
|
|
NS_ENSURE_TRUE(sop, false);
|
2014-05-13 13:58:00 +04:00
|
|
|
if (nsContentUtils::SubjectPrincipal()->Equals(sop->GetPrincipal())) {
|
2013-09-25 06:02:56 +04:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we're not same-origin, expose it _only_ if the name of the browsing
|
|
|
|
// context matches the 'name' attribute of the frame element in the parent.
|
|
|
|
// The motivations behind this heuristic are worth explaining here.
|
|
|
|
//
|
|
|
|
// Historically, all UAs supported global named access to any child browsing
|
|
|
|
// context (that is to say, window.dolske returns a child frame where either
|
|
|
|
// the "name" attribute on the frame element was set to "dolske", or where
|
|
|
|
// the child explicitly set window.name = "dolske").
|
|
|
|
//
|
|
|
|
// This is problematic because it allows possibly-malicious and unrelated
|
|
|
|
// cross-origin subframes to pollute the global namespace of their parent in
|
|
|
|
// unpredictable ways (see bug 860494). This is also problematic for browser
|
|
|
|
// engines like Servo that want to run cross-origin script on different
|
|
|
|
// threads.
|
|
|
|
//
|
|
|
|
// The naive solution here would be to filter out any cross-origin subframes
|
|
|
|
// obtained when doing named lookup in global scope. But that is unlikely to
|
|
|
|
// be web-compatible, since it will break named access for consumers that do
|
|
|
|
// <iframe name="dolske" src="http://cross-origin.com/sadtrombone.html"> and
|
|
|
|
// expect to be able to access the cross-origin subframe via named lookup on
|
|
|
|
// the global.
|
|
|
|
//
|
|
|
|
// The optimal behavior would be to do the following:
|
|
|
|
// (a) Look for any child browsing context with name="dolske".
|
|
|
|
// (b) If the result is cross-origin, null it out.
|
|
|
|
// (c) If we have null, look for a frame element whose 'name' attribute is
|
|
|
|
// "dolske".
|
|
|
|
//
|
|
|
|
// Unfortunately, (c) would require some engineering effort to be performant
|
|
|
|
// in Gecko, and probably in other UAs as well. So we go with a simpler
|
|
|
|
// approximation of the above. This approximation will only break sites that
|
|
|
|
// rely on their cross-origin subframes setting window.name to a known value,
|
|
|
|
// which is unlikely to be very common. And while it does introduce a
|
|
|
|
// dependency on cross-origin state when doing global lookups, it doesn't
|
|
|
|
// allow the child to arbitrarily pollute the parent namespace, and requires
|
|
|
|
// cross-origin communication only in a limited set of cases that can be
|
|
|
|
// computed independently by the parent.
|
2013-11-11 20:56:45 +04:00
|
|
|
return e && e->AttrValueIs(kNameSpaceID_None, nsGkAtoms::name,
|
|
|
|
aNameBeingResolved, eCaseMatters);
|
2013-09-25 06:02:56 +04:00
|
|
|
}
|
|
|
|
|
2014-08-02 07:37:14 +04:00
|
|
|
bool WindowNamedPropertiesHandler::getOwnPropDescriptor(
|
|
|
|
JSContext* aCx, JS::Handle<JSObject*> aProxy, JS::Handle<jsid> aId,
|
2016-01-28 13:28:04 +03:00
|
|
|
bool /* unused */, JS::MutableHandle<JS::PropertyDescriptor> aDesc) const {
|
2013-07-09 18:45:13 +04:00
|
|
|
if (!JSID_IS_STRING(aId)) {
|
|
|
|
// Nothing to do if we're resolving a non-string property.
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2015-01-02 23:02:36 +03:00
|
|
|
bool hasOnPrototype;
|
|
|
|
if (!HasPropertyOnPrototype(aCx, aProxy, aId, &hasOnPrototype)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (hasOnPrototype) {
|
2013-07-09 18:45:13 +04:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2014-07-05 19:30:54 +04:00
|
|
|
nsAutoJSString str;
|
|
|
|
if (!str.init(aCx, JSID_TO_STRING(aId))) {
|
|
|
|
return false;
|
|
|
|
}
|
2013-07-09 18:45:13 +04:00
|
|
|
|
2016-05-08 12:18:00 +03:00
|
|
|
if (str.IsEmpty()) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-07-09 18:45:13 +04:00
|
|
|
// Grab the DOM window.
|
2018-07-06 13:54:00 +03:00
|
|
|
nsGlobalWindowInner* win = xpc::WindowGlobalOrNull(aProxy);
|
2018-12-18 23:06:19 +03:00
|
|
|
if (win->Length() > 0) {
|
2019-01-02 16:27:05 +03:00
|
|
|
RefPtr<BrowsingContext> child = win->GetChildWindow(str);
|
|
|
|
if (child && ShouldExposeChildWindow(str, child)) {
|
2013-07-09 18:45:13 +04:00
|
|
|
// We found a subframe of the right name. Shadowing via |var foo| in
|
|
|
|
// global scope is still allowed, since |var| only looks up |own|
|
|
|
|
// properties. But unqualified shadowing will fail, per-spec.
|
|
|
|
JS::Rooted<JS::Value> v(aCx);
|
2019-01-02 16:27:05 +03:00
|
|
|
if (!ToJSValue(aCx, WindowProxyHolder(child.forget()), &v)) {
|
2013-07-09 18:45:13 +04:00
|
|
|
return false;
|
|
|
|
}
|
2015-07-01 21:15:22 +03:00
|
|
|
FillPropertyDescriptor(aDesc, aProxy, 0, v);
|
2013-07-09 18:45:13 +04:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// The rest of this function is for HTML documents only.
|
|
|
|
nsCOMPtr<nsIHTMLDocument> htmlDoc = do_QueryInterface(win->GetExtantDoc());
|
|
|
|
if (!htmlDoc) {
|
|
|
|
return true;
|
|
|
|
}
|
2013-08-10 09:10:18 +04:00
|
|
|
nsHTMLDocument* document = static_cast<nsHTMLDocument*>(htmlDoc.get());
|
2013-07-09 18:45:13 +04:00
|
|
|
|
2016-12-09 20:02:50 +03:00
|
|
|
JS::Rooted<JS::Value> v(aCx);
|
2013-08-10 09:10:18 +04:00
|
|
|
Element* element = document->GetElementById(str);
|
2013-07-09 18:45:13 +04:00
|
|
|
if (element) {
|
2016-12-09 20:02:50 +03:00
|
|
|
if (!ToJSValue(aCx, element, &v)) {
|
2013-07-09 18:45:13 +04:00
|
|
|
return false;
|
|
|
|
}
|
2015-07-01 21:15:22 +03:00
|
|
|
FillPropertyDescriptor(aDesc, aProxy, 0, v);
|
2013-07-09 18:45:13 +04:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2016-12-09 20:02:50 +03:00
|
|
|
ErrorResult rv;
|
|
|
|
bool found = document->ResolveName(aCx, str, &v, rv);
|
|
|
|
if (rv.MaybeSetPendingException(aCx)) {
|
|
|
|
return false;
|
2013-07-09 18:45:13 +04:00
|
|
|
}
|
|
|
|
|
2016-12-09 20:02:50 +03:00
|
|
|
if (found) {
|
|
|
|
FillPropertyDescriptor(aDesc, aProxy, 0, v);
|
2013-07-09 18:45:13 +04:00
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WindowNamedPropertiesHandler::defineProperty(
|
|
|
|
JSContext* aCx, JS::Handle<JSObject*> aProxy, JS::Handle<jsid> aId,
|
2016-01-28 13:28:04 +03:00
|
|
|
JS::Handle<JS::PropertyDescriptor> aDesc,
|
2015-01-30 20:37:07 +03:00
|
|
|
JS::ObjectOpResult& result) const {
|
2013-07-09 18:45:13 +04:00
|
|
|
ErrorResult rv;
|
2015-10-05 19:38:14 +03:00
|
|
|
rv.ThrowTypeError<MSG_DEFINEPROPERTY_ON_GSP>();
|
2017-02-15 03:17:02 +03:00
|
|
|
MOZ_ALWAYS_TRUE(rv.MaybeSetPendingException(aCx));
|
2013-07-09 18:45:13 +04:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2014-04-16 06:58:44 +04:00
|
|
|
bool WindowNamedPropertiesHandler::ownPropNames(
|
|
|
|
JSContext* aCx, JS::Handle<JSObject*> aProxy, unsigned flags,
|
2019-03-13 15:33:15 +03:00
|
|
|
JS::MutableHandleVector<jsid> aProps) const {
|
2015-07-01 21:15:22 +03:00
|
|
|
if (!(flags & JSITER_HIDDEN)) {
|
|
|
|
// None of our named properties are enumerable.
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-07-09 18:45:13 +04:00
|
|
|
// Grab the DOM window.
|
2018-07-06 13:54:00 +03:00
|
|
|
nsGlobalWindowInner* win = xpc::WindowGlobalOrNull(aProxy);
|
2013-07-09 18:45:13 +04:00
|
|
|
nsTArray<nsString> names;
|
2016-02-10 01:40:45 +03:00
|
|
|
// The names live on the outer window, which might be null
|
2017-11-04 01:25:38 +03:00
|
|
|
nsGlobalWindowOuter* outer = win->GetOuterWindowInternal();
|
2016-02-10 01:40:45 +03:00
|
|
|
if (outer) {
|
2018-05-25 06:32:19 +03:00
|
|
|
nsDOMWindowList* childWindows = outer->GetFrames();
|
2016-03-16 19:40:56 +03:00
|
|
|
if (childWindows) {
|
|
|
|
uint32_t length = childWindows->GetLength();
|
|
|
|
for (uint32_t i = 0; i < length; ++i) {
|
|
|
|
nsCOMPtr<nsIDocShellTreeItem> item =
|
|
|
|
childWindows->GetDocShellTreeItemAt(i);
|
|
|
|
// This is a bit silly, since we could presumably just do
|
|
|
|
// item->GetWindow(). But it's not obvious whether this does the same
|
|
|
|
// thing as GetChildWindow() with the item's name (due to the complexity
|
|
|
|
// of FindChildWithName). Since GetChildWindow is what we use in
|
|
|
|
// getOwnPropDescriptor, let's try to be consistent.
|
|
|
|
nsString name;
|
|
|
|
item->GetName(name);
|
|
|
|
if (!names.Contains(name)) {
|
|
|
|
// Make sure we really would expose it from getOwnPropDescriptor.
|
2019-01-02 16:27:05 +03:00
|
|
|
RefPtr<BrowsingContext> child = win->GetChildWindow(name);
|
|
|
|
if (child && ShouldExposeChildWindow(name, child)) {
|
2016-03-16 19:40:56 +03:00
|
|
|
names.AppendElement(name);
|
|
|
|
}
|
2016-02-10 01:40:45 +03:00
|
|
|
}
|
|
|
|
}
|
2014-06-11 06:50:21 +04:00
|
|
|
}
|
|
|
|
}
|
2013-07-09 18:45:13 +04:00
|
|
|
if (!AppendNamedPropertyIds(aCx, aProxy, names, false, aProps)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
names.Clear();
|
|
|
|
nsCOMPtr<nsIHTMLDocument> htmlDoc = do_QueryInterface(win->GetExtantDoc());
|
|
|
|
if (!htmlDoc) {
|
|
|
|
return true;
|
|
|
|
}
|
2013-08-10 09:10:18 +04:00
|
|
|
nsHTMLDocument* document = static_cast<nsHTMLDocument*>(htmlDoc.get());
|
2016-05-10 05:25:40 +03:00
|
|
|
// Document names are enumerable, so we want to get them no matter what flags
|
|
|
|
// is.
|
|
|
|
document->GetSupportedNames(names);
|
2013-07-09 18:45:13 +04:00
|
|
|
|
2019-03-13 15:33:15 +03:00
|
|
|
JS::RootedVector<jsid> docProps(aCx);
|
|
|
|
if (!AppendNamedPropertyIds(aCx, aProxy, names, false, &docProps)) {
|
2013-07-09 18:45:13 +04:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return js::AppendUnique(aCx, aProps, docProps);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool WindowNamedPropertiesHandler::delete_(JSContext* aCx,
|
|
|
|
JS::Handle<JSObject*> aProxy,
|
2015-02-04 19:20:04 +03:00
|
|
|
JS::Handle<jsid> aId,
|
|
|
|
JS::ObjectOpResult& aResult) const {
|
|
|
|
return aResult.failCantDeleteWindowNamedProperty();
|
2013-07-09 18:45:13 +04:00
|
|
|
}
|
|
|
|
|
2017-04-29 15:41:49 +03:00
|
|
|
// Note that this class doesn't need any reserved slots, but SpiderMonkey
|
|
|
|
// asserts all proxy classes have at least one reserved slot.
|
2014-09-06 00:09:50 +04:00
|
|
|
static const DOMIfaceAndProtoJSClass WindowNamedPropertiesClass = {
|
2017-04-29 15:41:49 +03:00
|
|
|
PROXY_CLASS_DEF("WindowProperties", JSCLASS_IS_DOMIFACEANDPROTOJSCLASS |
|
|
|
|
JSCLASS_HAS_RESERVED_SLOTS(1)),
|
2014-09-09 17:19:10 +04:00
|
|
|
eNamedPropertiesObject,
|
2016-08-04 04:32:07 +03:00
|
|
|
false,
|
2014-09-06 00:09:50 +04:00
|
|
|
prototypes::id::_ID_Count,
|
|
|
|
0,
|
2017-10-16 17:58:09 +03:00
|
|
|
&sEmptyNativePropertyHooks,
|
2016-03-23 21:54:38 +03:00
|
|
|
"[object WindowProperties]",
|
2018-06-26 00:20:54 +03:00
|
|
|
EventTarget_Binding::GetProtoObject};
|
2014-09-06 00:09:50 +04:00
|
|
|
|
2013-07-09 18:45:13 +04:00
|
|
|
// static
|
2014-09-06 00:36:36 +04:00
|
|
|
JSObject* WindowNamedPropertiesHandler::Create(JSContext* aCx,
|
|
|
|
JS::Handle<JSObject*> aProto) {
|
2013-09-20 02:24:48 +04:00
|
|
|
// Note: since the scope polluter proxy lives on the window's prototype
|
|
|
|
// chain, it needs a singleton type to avoid polluting type information
|
|
|
|
// for properties on the window.
|
2013-10-04 15:29:35 +04:00
|
|
|
js::ProxyOptions options;
|
|
|
|
options.setSingleton(true);
|
2014-09-06 00:09:50 +04:00
|
|
|
options.setClass(&WindowNamedPropertiesClass.mBase);
|
2015-10-09 01:07:57 +03:00
|
|
|
|
|
|
|
JS::Rooted<JSObject*> gsp(aCx);
|
|
|
|
gsp = js::NewProxyObject(aCx, WindowNamedPropertiesHandler::getInstance(),
|
|
|
|
JS::NullHandleValue, aProto, options);
|
|
|
|
if (!gsp) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool succeeded;
|
|
|
|
if (!JS_SetImmutablePrototype(aCx, gsp, &succeeded)) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
MOZ_ASSERT(succeeded,
|
|
|
|
"errors making the [[Prototype]] of the named properties object "
|
|
|
|
"immutable should have been JSAPI failures, not !succeeded");
|
|
|
|
|
|
|
|
return gsp;
|
2013-07-09 18:45:13 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace dom
|
|
|
|
} // namespace mozilla
|