2018-11-30 22:52:05 +03:00
|
|
|
|
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
2018-11-30 18:39:55 +03:00
|
|
|
|
/* vim:set ts=4 sw=2 sts=2 et cin: */
|
2014-07-24 20:38:55 +04:00
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
2015-11-02 19:27:00 +03:00
|
|
|
|
// HttpLog.h should generally be included first
|
|
|
|
|
#include "HttpLog.h"
|
|
|
|
|
|
2017-06-18 14:37:50 +03:00
|
|
|
|
#include "nsNetUtil.h"
|
|
|
|
|
|
2019-02-27 00:30:27 +03:00
|
|
|
|
#include "mozilla/AntiTrackingCommon.h"
|
2018-02-28 09:14:41 +03:00
|
|
|
|
#include "mozilla/Atomics.h"
|
2017-06-18 14:37:50 +03:00
|
|
|
|
#include "mozilla/Encoding.h"
|
2014-12-15 16:39:00 +03:00
|
|
|
|
#include "mozilla/LoadContext.h"
|
2015-05-20 05:48:00 +03:00
|
|
|
|
#include "mozilla/LoadInfo.h"
|
2015-09-03 05:46:03 +03:00
|
|
|
|
#include "mozilla/BasePrincipal.h"
|
2017-11-09 13:18:08 +03:00
|
|
|
|
#include "mozilla/Monitor.h"
|
2019-04-12 08:30:43 +03:00
|
|
|
|
#include "mozilla/StoragePrincipalHelper.h"
|
2017-11-09 13:18:08 +03:00
|
|
|
|
#include "mozilla/TaskQueue.h"
|
2016-01-09 04:20:50 +03:00
|
|
|
|
#include "mozilla/Telemetry.h"
|
2015-05-20 05:48:00 +03:00
|
|
|
|
#include "nsCategoryCache.h"
|
2015-11-09 05:54:38 +03:00
|
|
|
|
#include "nsContentUtils.h"
|
2018-09-10 02:18:19 +03:00
|
|
|
|
#include "nsFileStreams.h"
|
2015-05-20 05:48:00 +03:00
|
|
|
|
#include "nsHashKeys.h"
|
2014-07-24 20:38:55 +04:00
|
|
|
|
#include "nsHttp.h"
|
2015-05-20 05:48:00 +03:00
|
|
|
|
#include "nsIAsyncStreamCopier.h"
|
|
|
|
|
#include "nsIAuthPrompt.h"
|
|
|
|
|
#include "nsIAuthPrompt2.h"
|
|
|
|
|
#include "nsIAuthPromptAdapterFactory.h"
|
|
|
|
|
#include "nsIBufferedStreams.h"
|
|
|
|
|
#include "nsIChannelEventSink.h"
|
|
|
|
|
#include "nsIContentSniffer.h"
|
2019-01-02 16:05:23 +03:00
|
|
|
|
#include "mozilla/dom/Document.h"
|
2019-02-27 00:30:27 +03:00
|
|
|
|
#include "nsICookieService.h"
|
2015-05-20 05:48:00 +03:00
|
|
|
|
#include "nsIDownloader.h"
|
|
|
|
|
#include "nsIFileProtocolHandler.h"
|
|
|
|
|
#include "nsIFileStreams.h"
|
|
|
|
|
#include "nsIFileURL.h"
|
|
|
|
|
#include "nsIIDNService.h"
|
|
|
|
|
#include "nsIInputStreamChannel.h"
|
|
|
|
|
#include "nsIInputStreamPump.h"
|
|
|
|
|
#include "nsIInterfaceRequestorUtils.h"
|
|
|
|
|
#include "nsILoadContext.h"
|
|
|
|
|
#include "nsIMIMEHeaderParam.h"
|
|
|
|
|
#include "nsIMutable.h"
|
2016-07-28 09:44:22 +03:00
|
|
|
|
#include "nsINode.h"
|
2017-04-20 05:15:06 +03:00
|
|
|
|
#include "nsIObjectLoadingContent.h"
|
2015-05-20 05:48:00 +03:00
|
|
|
|
#include "nsIOfflineCacheUpdate.h"
|
2018-09-15 19:58:31 +03:00
|
|
|
|
#include "nsPersistentProperties.h"
|
2015-05-20 05:48:00 +03:00
|
|
|
|
#include "nsIPrivateBrowsingChannel.h"
|
|
|
|
|
#include "nsIPropertyBag2.h"
|
|
|
|
|
#include "nsIProtocolProxyService.h"
|
2018-08-22 07:37:28 +03:00
|
|
|
|
#include "mozilla/net/RedirectChannelRegistrar.h"
|
2018-10-23 23:07:19 +03:00
|
|
|
|
#include "nsRequestObserverProxy.h"
|
2015-05-20 05:48:00 +03:00
|
|
|
|
#include "nsIScriptSecurityManager.h"
|
2017-08-07 16:56:30 +03:00
|
|
|
|
#include "nsISensitiveInfoHiddenURI.h"
|
2015-05-20 05:48:00 +03:00
|
|
|
|
#include "nsISimpleStreamListener.h"
|
|
|
|
|
#include "nsISocketProvider.h"
|
|
|
|
|
#include "nsISocketProviderService.h"
|
|
|
|
|
#include "nsIStandardURL.h"
|
|
|
|
|
#include "nsIStreamLoader.h"
|
2015-11-30 17:54:11 +03:00
|
|
|
|
#include "nsIIncrementalStreamLoader.h"
|
2015-05-20 05:48:00 +03:00
|
|
|
|
#include "nsIStreamTransportService.h"
|
|
|
|
|
#include "nsStringStream.h"
|
2018-10-23 23:07:29 +03:00
|
|
|
|
#include "nsSyncStreamListener.h"
|
2015-05-20 05:48:00 +03:00
|
|
|
|
#include "nsITransport.h"
|
2018-07-31 11:27:00 +03:00
|
|
|
|
#include "nsIURIWithSpecialOrigin.h"
|
2015-05-20 05:48:00 +03:00
|
|
|
|
#include "nsIURLParser.h"
|
|
|
|
|
#include "nsIUUIDGenerator.h"
|
|
|
|
|
#include "nsIViewSourceChannel.h"
|
|
|
|
|
#include "nsInterfaceRequestorAgg.h"
|
|
|
|
|
#include "plstr.h"
|
|
|
|
|
#include "nsINestedURI.h"
|
2015-11-02 19:27:00 +03:00
|
|
|
|
#include "mozilla/dom/nsCSPUtils.h"
|
2018-10-31 19:04:58 +03:00
|
|
|
|
#include "mozilla/dom/nsMixedContentBlocker.h"
|
2018-07-24 23:15:57 +03:00
|
|
|
|
#include "mozilla/dom/BlobURLProtocolHandler.h"
|
2016-02-18 06:03:41 +03:00
|
|
|
|
#include "mozilla/net/HttpBaseChannel.h"
|
2015-11-02 19:27:00 +03:00
|
|
|
|
#include "nsIScriptError.h"
|
|
|
|
|
#include "nsISiteSecurityService.h"
|
|
|
|
|
#include "nsHttpHandler.h"
|
2016-10-25 17:43:00 +03:00
|
|
|
|
#include "nsNSSComponent.h"
|
2017-05-25 20:42:00 +03:00
|
|
|
|
#include "nsIRedirectHistoryEntry.h"
|
2019-05-03 02:02:13 +03:00
|
|
|
|
#ifdef MOZ_NEW_CERT_STORAGE
|
|
|
|
|
# include "nsICertStorage.h"
|
|
|
|
|
#else
|
|
|
|
|
# include "nsICertBlocklist.h"
|
|
|
|
|
#endif
|
2017-12-20 05:08:15 +03:00
|
|
|
|
#include "nsICertOverrideService.h"
|
2018-02-09 23:17:26 +03:00
|
|
|
|
#include "nsQueryObject.h"
|
|
|
|
|
#include "mozIThirdPartyUtil.h"
|
2018-08-06 22:31:22 +03:00
|
|
|
|
#include "../mime/nsMIMEHeaderParamImpl.h"
|
2019-03-19 18:11:31 +03:00
|
|
|
|
#include "nsStandardURL.h"
|
|
|
|
|
#include "nsChromeProtocolHandler.h"
|
|
|
|
|
#include "nsJSProtocolHandler.h"
|
|
|
|
|
#include "nsDataHandler.h"
|
2019-03-19 18:13:47 +03:00
|
|
|
|
#include "mozilla/dom/BlobURLProtocolHandler.h"
|
2019-05-10 01:04:43 +03:00
|
|
|
|
#include "nsStreamUtils.h"
|
|
|
|
|
#include "nsSocketTransportService2.h"
|
2019-05-28 16:48:49 +03:00
|
|
|
|
#include "nsViewSourceHandler.h"
|
2019-05-28 16:49:07 +03:00
|
|
|
|
#include "nsJARURI.h"
|
2019-05-28 16:49:19 +03:00
|
|
|
|
#include "nsIconURI.h"
|
2019-05-28 16:49:17 +03:00
|
|
|
|
#include "nsAboutProtocolHandler.h"
|
2019-05-28 16:49:05 +03:00
|
|
|
|
#include "nsResProtocolHandler.h"
|
|
|
|
|
#include "mozilla/net/ExtensionProtocolHandler.h"
|
2015-05-20 05:48:00 +03:00
|
|
|
|
#include <limits>
|
|
|
|
|
|
2019-05-29 12:23:04 +03:00
|
|
|
|
#if defined(MOZ_THUNDERBIRD) || defined(MOZ_SUITE)
|
|
|
|
|
# include "nsNewMailnewsURI.h"
|
|
|
|
|
#endif
|
|
|
|
|
|
2016-01-09 04:20:50 +03:00
|
|
|
|
using namespace mozilla;
|
|
|
|
|
using namespace mozilla::net;
|
2018-07-24 23:15:57 +03:00
|
|
|
|
using mozilla::dom::BlobURLProtocolHandler;
|
2018-01-23 18:38:54 +03:00
|
|
|
|
using mozilla::dom::ClientInfo;
|
2018-01-24 19:17:31 +03:00
|
|
|
|
using mozilla::dom::PerformanceStorage;
|
2018-01-23 18:38:54 +03:00
|
|
|
|
using mozilla::dom::ServiceWorkerDescriptor;
|
2016-01-09 04:20:50 +03:00
|
|
|
|
|
2019-05-10 01:04:43 +03:00
|
|
|
|
#define MAX_RECURSION_COUNT 50
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
already_AddRefed<nsIIOService> do_GetIOService(nsresult* error /* = 0 */) {
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsCOMPtr<nsIIOService> io = mozilla::services::GetIOService();
|
|
|
|
|
if (error) *error = io ? NS_OK : NS_ERROR_FAILURE;
|
|
|
|
|
return io.forget();
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_NewLocalFileInputStream(nsIInputStream** result, nsIFile* file,
|
2017-03-02 17:32:37 +03:00
|
|
|
|
int32_t ioFlags /* = -1 */,
|
|
|
|
|
int32_t perm /* = -1 */,
|
|
|
|
|
int32_t behaviorFlags /* = 0 */) {
|
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIFileInputStream> in =
|
|
|
|
|
do_CreateInstance(NS_LOCALFILEINPUTSTREAM_CONTRACTID, &rv);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
rv = in->Init(file, ioFlags, perm, behaviorFlags);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) in.forget(result);
|
|
|
|
|
}
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_NewLocalFileOutputStream(nsIOutputStream** result, nsIFile* file,
|
2017-03-02 17:32:37 +03:00
|
|
|
|
int32_t ioFlags /* = -1 */,
|
|
|
|
|
int32_t perm /* = -1 */,
|
|
|
|
|
int32_t behaviorFlags /* = 0 */) {
|
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIFileOutputStream> out =
|
|
|
|
|
do_CreateInstance(NS_LOCALFILEOUTPUTSTREAM_CONTRACTID, &rv);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
rv = out->Init(file, ioFlags, perm, behaviorFlags);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) out.forget(result);
|
|
|
|
|
}
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult net_EnsureIOService(nsIIOService** ios, nsCOMPtr<nsIIOService>& grip) {
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsresult rv = NS_OK;
|
|
|
|
|
if (!*ios) {
|
|
|
|
|
grip = do_GetIOService(&rv);
|
|
|
|
|
*ios = grip;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2017-03-02 17:32:37 +03:00
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2018-07-23 14:28:47 +03:00
|
|
|
|
nsresult NS_NewFileURI(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIURI** result, nsIFile* spec,
|
|
|
|
|
nsIIOService*
|
|
|
|
|
ioService /* = nullptr */) // pass in nsIIOService to optimize callers
|
2018-07-23 14:28:47 +03:00
|
|
|
|
{
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIIOService> grip;
|
2015-05-20 05:48:00 +03:00
|
|
|
|
rv = net_EnsureIOService(&ioService, grip);
|
2017-03-02 17:32:37 +03:00
|
|
|
|
if (ioService) rv = ioService->NewFileURI(spec, result);
|
|
|
|
|
return rv;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_GetURIWithNewRef(nsIURI* aInput, const nsACString& aRef,
|
|
|
|
|
nsIURI** aOutput) {
|
2018-07-23 14:28:47 +03:00
|
|
|
|
if (NS_WARN_IF(!aInput || !aOutput)) {
|
|
|
|
|
return NS_ERROR_INVALID_ARG;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool hasRef;
|
|
|
|
|
nsresult rv = aInput->GetHasRef(&hasRef);
|
|
|
|
|
|
|
|
|
|
nsAutoCString ref;
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
rv = aInput->GetRef(ref);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// If the ref is already equal to the new ref, we do not need to do anything.
|
|
|
|
|
// Also, if the GetRef failed (it could return NS_ERROR_NOT_IMPLEMENTED)
|
|
|
|
|
// we can assume SetRef would fail as well, so returning the original
|
|
|
|
|
// URI is OK.
|
|
|
|
|
if (NS_FAILED(rv) || (!hasRef && aRef.IsEmpty()) ||
|
|
|
|
|
(!aRef.IsEmpty() && aRef == ref)) {
|
|
|
|
|
nsCOMPtr<nsIURI> uri = aInput;
|
|
|
|
|
uri.forget(aOutput);
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NS_MutateURI(aInput).SetRef(aRef).Finalize(aOutput);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_GetURIWithoutRef(nsIURI* aInput, nsIURI** aOutput) {
|
2018-07-23 14:28:47 +03:00
|
|
|
|
return NS_GetURIWithNewRef(aInput, EmptyCString(), aOutput);
|
|
|
|
|
}
|
|
|
|
|
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsresult NS_NewChannelInternal(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIChannel** outChannel, nsIURI* aUri, nsILoadInfo* aLoadInfo,
|
|
|
|
|
PerformanceStorage* aPerformanceStorage /* = nullptr */,
|
|
|
|
|
nsILoadGroup* aLoadGroup /* = nullptr */,
|
|
|
|
|
nsIInterfaceRequestor* aCallbacks /* = nullptr */,
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsLoadFlags aLoadFlags /* = nsIRequest::LOAD_NORMAL */,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIIOService* aIoService /* = nullptr */) {
|
2017-03-02 17:32:37 +03:00
|
|
|
|
// NS_NewChannelInternal is mostly called for channel redirects. We should
|
|
|
|
|
// allow the creation of a channel even if the original channel did not have a
|
|
|
|
|
// loadinfo attached.
|
|
|
|
|
NS_ENSURE_ARG_POINTER(outChannel);
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIIOService> grip;
|
|
|
|
|
nsresult rv = net_EnsureIOService(&aIoService, grip);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIChannel> channel;
|
|
|
|
|
rv = aIoService->NewChannelFromURIWithLoadInfo(aUri, aLoadInfo,
|
|
|
|
|
getter_AddRefs(channel));
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
if (aLoadGroup) {
|
|
|
|
|
rv = channel->SetLoadGroup(aLoadGroup);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (aCallbacks) {
|
|
|
|
|
rv = channel->SetNotificationCallbacks(aCallbacks);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
}
|
|
|
|
|
|
2017-05-30 19:07:59 +03:00
|
|
|
|
#ifdef DEBUG
|
|
|
|
|
nsLoadFlags channelLoadFlags = 0;
|
|
|
|
|
channel->GetLoadFlags(&channelLoadFlags);
|
|
|
|
|
// Will be removed when we remove LOAD_REPLACE altogether
|
|
|
|
|
// This check is trying to catch protocol handlers that still
|
|
|
|
|
// try to set the LOAD_REPLACE flag.
|
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(!(channelLoadFlags & nsIChannel::LOAD_REPLACE));
|
|
|
|
|
#endif
|
|
|
|
|
|
2017-03-02 17:32:37 +03:00
|
|
|
|
if (aLoadFlags != nsIRequest::LOAD_NORMAL) {
|
2017-05-30 19:07:59 +03:00
|
|
|
|
rv = channel->SetLoadFlags(aLoadFlags);
|
2017-03-02 17:32:37 +03:00
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
}
|
|
|
|
|
|
2018-01-24 19:17:31 +03:00
|
|
|
|
if (aPerformanceStorage) {
|
2019-02-20 15:27:25 +03:00
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = channel->LoadInfo();
|
2018-01-24 19:17:31 +03:00
|
|
|
|
loadInfo->SetPerformanceStorage(aPerformanceStorage);
|
|
|
|
|
}
|
|
|
|
|
|
2017-03-02 17:32:37 +03:00
|
|
|
|
channel.forget(outChannel);
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
|
2018-01-23 18:38:54 +03:00
|
|
|
|
namespace {
|
|
|
|
|
|
|
|
|
|
void AssertLoadingPrincipalAndClientInfoMatch(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIPrincipal* aLoadingPrincipal, const ClientInfo& aLoadingClientInfo,
|
2018-01-23 18:38:54 +03:00
|
|
|
|
nsContentPolicyType aType) {
|
|
|
|
|
#ifdef MOZ_DIAGNOSTIC_ASSERT_ENABLED
|
|
|
|
|
// Verify that the provided loading ClientInfo matches the loading
|
|
|
|
|
// principal. Unfortunately we can't just use nsIPrincipal::Equals() here
|
|
|
|
|
// because of some corner cases:
|
|
|
|
|
//
|
|
|
|
|
// 1. Worker debugger scripts want to use a system loading principal for
|
|
|
|
|
// worker scripts with a content principal. We exempt these from this
|
|
|
|
|
// check.
|
|
|
|
|
// 2. Null principals currently require exact object identity for
|
|
|
|
|
// nsIPrincipal::Equals() to return true. This doesn't work here because
|
|
|
|
|
// ClientInfo::GetPrincipal() uses PrincipalInfoToPrincipal() to allocate
|
|
|
|
|
// a new object. To work around this we compare the principal origin
|
|
|
|
|
// string itself. If bug 1431771 is fixed then we could switch to
|
|
|
|
|
// Equals().
|
|
|
|
|
|
|
|
|
|
// Allow worker debugger to load with a system principal.
|
2019-01-03 23:55:38 +03:00
|
|
|
|
if (aLoadingPrincipal->IsSystemPrincipal() &&
|
2018-01-23 18:38:54 +03:00
|
|
|
|
(aType == nsIContentPolicy::TYPE_INTERNAL_WORKER ||
|
|
|
|
|
aType == nsIContentPolicy::TYPE_INTERNAL_SHARED_WORKER ||
|
|
|
|
|
aType == nsIContentPolicy::TYPE_INTERNAL_SERVICE_WORKER ||
|
|
|
|
|
aType == nsIContentPolicy::TYPE_INTERNAL_WORKER_IMPORT_SCRIPTS)) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Perform a fast comparison for most principal checks.
|
|
|
|
|
nsCOMPtr<nsIPrincipal> clientPrincipal(aLoadingClientInfo.GetPrincipal());
|
|
|
|
|
if (aLoadingPrincipal->Equals(clientPrincipal)) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Fall back to a slower origin equality test to support null principals.
|
|
|
|
|
nsAutoCString loadingOrigin;
|
|
|
|
|
MOZ_ALWAYS_SUCCEEDS(aLoadingPrincipal->GetOrigin(loadingOrigin));
|
|
|
|
|
|
|
|
|
|
nsAutoCString clientOrigin;
|
|
|
|
|
MOZ_ALWAYS_SUCCEEDS(clientPrincipal->GetOrigin(clientOrigin));
|
|
|
|
|
|
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(loadingOrigin == clientOrigin);
|
|
|
|
|
#endif
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_NewChannel(nsIChannel** outChannel, nsIURI* aUri,
|
|
|
|
|
nsIPrincipal* aLoadingPrincipal,
|
2018-01-23 18:38:54 +03:00
|
|
|
|
nsSecurityFlags aSecurityFlags,
|
|
|
|
|
nsContentPolicyType aContentPolicyType,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsICookieSettings* aCookieSettings /* = nullptr */,
|
|
|
|
|
PerformanceStorage* aPerformanceStorage /* = nullptr */,
|
|
|
|
|
nsILoadGroup* aLoadGroup /* = nullptr */,
|
|
|
|
|
nsIInterfaceRequestor* aCallbacks /* = nullptr */,
|
2018-01-23 18:38:54 +03:00
|
|
|
|
nsLoadFlags aLoadFlags /* = nsIRequest::LOAD_NORMAL */,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIIOService* aIoService /* = nullptr */) {
|
2019-03-08 12:04:11 +03:00
|
|
|
|
return NS_NewChannelInternal(
|
|
|
|
|
outChannel, aUri,
|
|
|
|
|
nullptr, // aLoadingNode,
|
|
|
|
|
aLoadingPrincipal,
|
|
|
|
|
nullptr, // aTriggeringPrincipal
|
|
|
|
|
Maybe<ClientInfo>(), Maybe<ServiceWorkerDescriptor>(), aSecurityFlags,
|
|
|
|
|
aContentPolicyType, aCookieSettings, aPerformanceStorage, aLoadGroup,
|
|
|
|
|
aCallbacks, aLoadFlags, aIoService);
|
2018-01-23 18:38:54 +03:00
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_NewChannel(nsIChannel** outChannel, nsIURI* aUri,
|
|
|
|
|
nsIPrincipal* aLoadingPrincipal,
|
|
|
|
|
const ClientInfo& aLoadingClientInfo,
|
|
|
|
|
const Maybe<ServiceWorkerDescriptor>& aController,
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsSecurityFlags aSecurityFlags,
|
|
|
|
|
nsContentPolicyType aContentPolicyType,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsICookieSettings* aCookieSettings /* = nullptr */,
|
|
|
|
|
PerformanceStorage* aPerformanceStorage /* = nullptr */,
|
|
|
|
|
nsILoadGroup* aLoadGroup /* = nullptr */,
|
|
|
|
|
nsIInterfaceRequestor* aCallbacks /* = nullptr */,
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsLoadFlags aLoadFlags /* = nsIRequest::LOAD_NORMAL */,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIIOService* aIoService /* = nullptr */) {
|
2018-01-23 18:38:54 +03:00
|
|
|
|
AssertLoadingPrincipalAndClientInfoMatch(
|
|
|
|
|
aLoadingPrincipal, aLoadingClientInfo, aContentPolicyType);
|
|
|
|
|
|
|
|
|
|
Maybe<ClientInfo> loadingClientInfo;
|
|
|
|
|
loadingClientInfo.emplace(aLoadingClientInfo);
|
|
|
|
|
|
2017-03-02 17:32:37 +03:00
|
|
|
|
return NS_NewChannelInternal(outChannel, aUri,
|
|
|
|
|
nullptr, // aLoadingNode,
|
|
|
|
|
aLoadingPrincipal,
|
|
|
|
|
nullptr, // aTriggeringPrincipal
|
2018-01-23 18:38:54 +03:00
|
|
|
|
loadingClientInfo, aController, aSecurityFlags,
|
2019-03-08 12:04:11 +03:00
|
|
|
|
aContentPolicyType, aCookieSettings,
|
|
|
|
|
aPerformanceStorage, aLoadGroup, aCallbacks,
|
|
|
|
|
aLoadFlags, aIoService);
|
2017-03-02 17:32:37 +03:00
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsresult NS_NewChannelInternal(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIChannel** outChannel, nsIURI* aUri, nsINode* aLoadingNode,
|
|
|
|
|
nsIPrincipal* aLoadingPrincipal, nsIPrincipal* aTriggeringPrincipal,
|
|
|
|
|
const Maybe<ClientInfo>& aLoadingClientInfo,
|
|
|
|
|
const Maybe<ServiceWorkerDescriptor>& aController,
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsSecurityFlags aSecurityFlags, nsContentPolicyType aContentPolicyType,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsICookieSettings* aCookieSettings /* = nullptr */,
|
|
|
|
|
PerformanceStorage* aPerformanceStorage /* = nullptr */,
|
|
|
|
|
nsILoadGroup* aLoadGroup /* = nullptr */,
|
|
|
|
|
nsIInterfaceRequestor* aCallbacks /* = nullptr */,
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsLoadFlags aLoadFlags /* = nsIRequest::LOAD_NORMAL */,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIIOService* aIoService /* = nullptr */) {
|
2017-03-02 17:32:37 +03:00
|
|
|
|
NS_ENSURE_ARG_POINTER(outChannel);
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIIOService> grip;
|
|
|
|
|
nsresult rv = net_EnsureIOService(&aIoService, grip);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIChannel> channel;
|
2018-01-23 18:38:54 +03:00
|
|
|
|
rv = aIoService->NewChannelFromURIWithClientAndController(
|
2017-03-02 17:32:37 +03:00
|
|
|
|
aUri, aLoadingNode, aLoadingPrincipal, aTriggeringPrincipal,
|
2018-01-23 18:38:54 +03:00
|
|
|
|
aLoadingClientInfo, aController, aSecurityFlags, aContentPolicyType,
|
2017-03-02 17:32:37 +03:00
|
|
|
|
getter_AddRefs(channel));
|
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (aLoadGroup) {
|
|
|
|
|
rv = channel->SetLoadGroup(aLoadGroup);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (aCallbacks) {
|
|
|
|
|
rv = channel->SetNotificationCallbacks(aCallbacks);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
}
|
|
|
|
|
|
2017-05-30 19:07:59 +03:00
|
|
|
|
#ifdef DEBUG
|
|
|
|
|
nsLoadFlags channelLoadFlags = 0;
|
|
|
|
|
channel->GetLoadFlags(&channelLoadFlags);
|
|
|
|
|
// Will be removed when we remove LOAD_REPLACE altogether
|
|
|
|
|
// This check is trying to catch protocol handlers that still
|
|
|
|
|
// try to set the LOAD_REPLACE flag.
|
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(!(channelLoadFlags & nsIChannel::LOAD_REPLACE));
|
|
|
|
|
#endif
|
|
|
|
|
|
2017-03-02 17:32:37 +03:00
|
|
|
|
if (aLoadFlags != nsIRequest::LOAD_NORMAL) {
|
2017-05-30 19:07:59 +03:00
|
|
|
|
rv = channel->SetLoadFlags(aLoadFlags);
|
2017-03-02 17:32:37 +03:00
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
}
|
|
|
|
|
|
2019-03-08 12:04:11 +03:00
|
|
|
|
if (aPerformanceStorage || aCookieSettings) {
|
2019-02-20 15:27:25 +03:00
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = channel->LoadInfo();
|
2019-03-08 12:04:11 +03:00
|
|
|
|
|
|
|
|
|
if (aPerformanceStorage) {
|
|
|
|
|
loadInfo->SetPerformanceStorage(aPerformanceStorage);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (aCookieSettings) {
|
|
|
|
|
loadInfo->SetCookieSettings(aCookieSettings);
|
|
|
|
|
}
|
2018-01-24 19:17:31 +03:00
|
|
|
|
}
|
|
|
|
|
|
2017-03-02 17:32:37 +03:00
|
|
|
|
channel.forget(outChannel);
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult /*NS_NewChannelWithNodeAndTriggeringPrincipal */
|
|
|
|
|
NS_NewChannelWithTriggeringPrincipal(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIChannel** outChannel, nsIURI* aUri, nsINode* aLoadingNode,
|
|
|
|
|
nsIPrincipal* aTriggeringPrincipal, nsSecurityFlags aSecurityFlags,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsContentPolicyType aContentPolicyType,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
PerformanceStorage* aPerformanceStorage /* = nullptr */,
|
|
|
|
|
nsILoadGroup* aLoadGroup /* = nullptr */,
|
|
|
|
|
nsIInterfaceRequestor* aCallbacks /* = nullptr */,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsLoadFlags aLoadFlags /* = nsIRequest::LOAD_NORMAL */,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIIOService* aIoService /* = nullptr */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
MOZ_ASSERT(aLoadingNode);
|
|
|
|
|
NS_ASSERTION(aTriggeringPrincipal,
|
|
|
|
|
"Can not create channel without a triggering Principal!");
|
|
|
|
|
return NS_NewChannelInternal(
|
|
|
|
|
outChannel, aUri, aLoadingNode, aLoadingNode->NodePrincipal(),
|
|
|
|
|
aTriggeringPrincipal, Maybe<ClientInfo>(),
|
2018-01-23 18:38:54 +03:00
|
|
|
|
Maybe<ServiceWorkerDescriptor>(), aSecurityFlags, aContentPolicyType,
|
2019-03-08 12:04:11 +03:00
|
|
|
|
aLoadingNode->OwnerDoc()->CookieSettings(), aPerformanceStorage,
|
|
|
|
|
aLoadGroup, aCallbacks, aLoadFlags, aIoService);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// See NS_NewChannelInternal for usage and argument description
|
|
|
|
|
nsresult NS_NewChannelWithTriggeringPrincipal(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIChannel** outChannel, nsIURI* aUri, nsIPrincipal* aLoadingPrincipal,
|
|
|
|
|
nsIPrincipal* aTriggeringPrincipal, nsSecurityFlags aSecurityFlags,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsContentPolicyType aContentPolicyType,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsICookieSettings* aCookieSettings /* = nullptr */,
|
|
|
|
|
PerformanceStorage* aPerformanceStorage /* = nullptr */,
|
|
|
|
|
nsILoadGroup* aLoadGroup /* = nullptr */,
|
|
|
|
|
nsIInterfaceRequestor* aCallbacks /* = nullptr */,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsLoadFlags aLoadFlags /* = nsIRequest::LOAD_NORMAL */,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIIOService* aIoService /* = nullptr */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
NS_ASSERTION(aLoadingPrincipal,
|
|
|
|
|
"Can not create channel without a loading Principal!");
|
|
|
|
|
return NS_NewChannelInternal(
|
|
|
|
|
outChannel, aUri,
|
|
|
|
|
nullptr, // aLoadingNode
|
|
|
|
|
aLoadingPrincipal, aTriggeringPrincipal, Maybe<ClientInfo>(),
|
2018-01-23 18:38:54 +03:00
|
|
|
|
Maybe<ServiceWorkerDescriptor>(), aSecurityFlags, aContentPolicyType,
|
2019-03-08 12:04:11 +03:00
|
|
|
|
aCookieSettings, aPerformanceStorage, aLoadGroup, aCallbacks, aLoadFlags,
|
|
|
|
|
aIoService);
|
2018-01-23 18:38:54 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// See NS_NewChannelInternal for usage and argument description
|
|
|
|
|
nsresult NS_NewChannelWithTriggeringPrincipal(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIChannel** outChannel, nsIURI* aUri, nsIPrincipal* aLoadingPrincipal,
|
|
|
|
|
nsIPrincipal* aTriggeringPrincipal, const ClientInfo& aLoadingClientInfo,
|
|
|
|
|
const Maybe<ServiceWorkerDescriptor>& aController,
|
2018-01-23 18:38:54 +03:00
|
|
|
|
nsSecurityFlags aSecurityFlags, nsContentPolicyType aContentPolicyType,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsICookieSettings* aCookieSettings /* = nullptr */,
|
|
|
|
|
PerformanceStorage* aPerformanceStorage /* = nullptr */,
|
|
|
|
|
nsILoadGroup* aLoadGroup /* = nullptr */,
|
|
|
|
|
nsIInterfaceRequestor* aCallbacks /* = nullptr */,
|
2018-01-23 18:38:54 +03:00
|
|
|
|
nsLoadFlags aLoadFlags /* = nsIRequest::LOAD_NORMAL */,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIIOService* aIoService /* = nullptr */) {
|
2018-01-23 18:38:54 +03:00
|
|
|
|
AssertLoadingPrincipalAndClientInfoMatch(
|
|
|
|
|
aLoadingPrincipal, aLoadingClientInfo, aContentPolicyType);
|
|
|
|
|
|
|
|
|
|
Maybe<ClientInfo> loadingClientInfo;
|
|
|
|
|
loadingClientInfo.emplace(aLoadingClientInfo);
|
|
|
|
|
|
2019-03-08 12:04:11 +03:00
|
|
|
|
return NS_NewChannelInternal(
|
|
|
|
|
outChannel, aUri,
|
|
|
|
|
nullptr, // aLoadingNode
|
|
|
|
|
aLoadingPrincipal, aTriggeringPrincipal, loadingClientInfo, aController,
|
|
|
|
|
aSecurityFlags, aContentPolicyType, aCookieSettings, aPerformanceStorage,
|
|
|
|
|
aLoadGroup, aCallbacks, aLoadFlags, aIoService);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_NewChannel(nsIChannel** outChannel, nsIURI* aUri,
|
|
|
|
|
nsINode* aLoadingNode, nsSecurityFlags aSecurityFlags,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsContentPolicyType aContentPolicyType,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
PerformanceStorage* aPerformanceStorage /* = nullptr */,
|
|
|
|
|
nsILoadGroup* aLoadGroup /* = nullptr */,
|
|
|
|
|
nsIInterfaceRequestor* aCallbacks /* = nullptr */,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsLoadFlags aLoadFlags /* = nsIRequest::LOAD_NORMAL */,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIIOService* aIoService /* = nullptr */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
NS_ASSERTION(aLoadingNode, "Can not create channel without a loading Node!");
|
|
|
|
|
return NS_NewChannelInternal(
|
|
|
|
|
outChannel, aUri, aLoadingNode, aLoadingNode->NodePrincipal(),
|
|
|
|
|
nullptr, // aTriggeringPrincipal
|
2018-01-23 18:38:54 +03:00
|
|
|
|
Maybe<ClientInfo>(), Maybe<ServiceWorkerDescriptor>(), aSecurityFlags,
|
2019-03-08 12:04:11 +03:00
|
|
|
|
aContentPolicyType, aLoadingNode->OwnerDoc()->CookieSettings(),
|
|
|
|
|
aPerformanceStorage, aLoadGroup, aCallbacks, aLoadFlags, aIoService);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_GetIsDocumentChannel(nsIChannel* aChannel, bool* aIsDocument) {
|
2017-04-20 05:15:06 +03:00
|
|
|
|
// Check if this channel is going to be used to create a document. If it has
|
|
|
|
|
// LOAD_DOCUMENT_URI set it is trivially creating a document. If
|
|
|
|
|
// LOAD_HTML_OBJECT_DATA is set it may or may not be used to create a
|
|
|
|
|
// document, depending on its MIME type.
|
|
|
|
|
|
|
|
|
|
if (!aChannel || !aIsDocument) {
|
|
|
|
|
return NS_ERROR_NULL_POINTER;
|
|
|
|
|
}
|
2017-04-25 14:38:03 +03:00
|
|
|
|
*aIsDocument = false;
|
2017-04-20 05:15:06 +03:00
|
|
|
|
nsLoadFlags loadFlags;
|
|
|
|
|
nsresult rv = aChannel->GetLoadFlags(&loadFlags);
|
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
if (loadFlags & nsIChannel::LOAD_DOCUMENT_URI) {
|
|
|
|
|
*aIsDocument = true;
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
if (!(loadFlags & nsIRequest::LOAD_HTML_OBJECT_DATA)) {
|
|
|
|
|
*aIsDocument = false;
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
nsAutoCString mimeType;
|
|
|
|
|
rv = aChannel->GetContentType(mimeType);
|
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
2015-05-20 16:30:05 +03:00
|
|
|
|
if (nsContentUtils::HtmlObjectContentTypeForMIMEType(
|
2017-04-20 05:15:06 +03:00
|
|
|
|
mimeType, false, nullptr) == nsIObjectLoadingContent::TYPE_DOCUMENT) {
|
|
|
|
|
*aIsDocument = true;
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
*aIsDocument = false;
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_MakeAbsoluteURI(nsACString& result, const nsACString& spec,
|
|
|
|
|
nsIURI* baseURI) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
if (!baseURI) {
|
|
|
|
|
NS_WARNING("It doesn't make sense to not supply a base URI");
|
|
|
|
|
result = spec;
|
|
|
|
|
rv = NS_OK;
|
|
|
|
|
} else if (spec.IsEmpty())
|
|
|
|
|
rv = baseURI->GetSpec(result);
|
|
|
|
|
else
|
|
|
|
|
rv = baseURI->Resolve(spec, result);
|
2017-03-02 17:32:37 +03:00
|
|
|
|
return rv;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_MakeAbsoluteURI(char** result, const char* spec, nsIURI* baseURI) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsAutoCString resultBuf;
|
|
|
|
|
rv = NS_MakeAbsoluteURI(resultBuf, nsDependentCString(spec), baseURI);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
*result = ToNewCString(resultBuf);
|
|
|
|
|
if (!*result) rv = NS_ERROR_OUT_OF_MEMORY;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_MakeAbsoluteURI(nsAString& result, const nsAString& spec,
|
|
|
|
|
nsIURI* baseURI) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
if (!baseURI) {
|
|
|
|
|
NS_WARNING("It doesn't make sense to not supply a base URI");
|
|
|
|
|
result = spec;
|
|
|
|
|
rv = NS_OK;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
} else {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsAutoCString resultBuf;
|
|
|
|
|
if (spec.IsEmpty())
|
|
|
|
|
rv = baseURI->GetSpec(resultBuf);
|
|
|
|
|
else
|
|
|
|
|
rv = baseURI->Resolve(NS_ConvertUTF16toUTF8(spec), resultBuf);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) CopyUTF8toUTF16(resultBuf, result);
|
|
|
|
|
}
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
int32_t NS_GetDefaultPort(const char* scheme,
|
|
|
|
|
nsIIOService* ioService /* = nullptr */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
|
2017-05-07 01:49:19 +03:00
|
|
|
|
// Getting the default port through the protocol handler has a lot of XPCOM
|
|
|
|
|
// overhead involved. We optimize the protocols that matter for Web pages
|
|
|
|
|
// (HTTP and HTTPS) by hardcoding their default ports here.
|
|
|
|
|
if (strncmp(scheme, "http", 4) == 0) {
|
|
|
|
|
if (scheme[4] == 's' && scheme[5] == '\0') {
|
|
|
|
|
return 443;
|
|
|
|
|
}
|
|
|
|
|
if (scheme[4] == '\0') {
|
|
|
|
|
return 80;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsCOMPtr<nsIIOService> grip;
|
|
|
|
|
net_EnsureIOService(&ioService, grip);
|
|
|
|
|
if (!ioService) return -1;
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIProtocolHandler> handler;
|
|
|
|
|
rv = ioService->GetProtocolHandler(scheme, getter_AddRefs(handler));
|
|
|
|
|
if (NS_FAILED(rv)) return -1;
|
|
|
|
|
int32_t port;
|
|
|
|
|
rv = handler->GetDefaultPort(&port);
|
|
|
|
|
return NS_SUCCEEDED(rv) ? port : -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* This function is a helper function to apply the ToAscii conversion
|
|
|
|
|
* to a string
|
|
|
|
|
*/
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_StringToACE(const nsACString& idn, nsACString& result) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsCOMPtr<nsIIDNService> idnSrv = do_GetService(NS_IDNSERVICE_CONTRACTID);
|
|
|
|
|
if (!idnSrv) return false;
|
|
|
|
|
nsresult rv = idnSrv->ConvertUTF8toACE(idn, result);
|
|
|
|
|
if (NS_FAILED(rv)) return false;
|
|
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
int32_t NS_GetRealPort(nsIURI* aURI) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
int32_t port;
|
|
|
|
|
nsresult rv = aURI->GetPort(&port);
|
|
|
|
|
if (NS_FAILED(rv)) return -1;
|
|
|
|
|
|
|
|
|
|
if (port != -1) return port; // explicitly specified
|
|
|
|
|
|
|
|
|
|
// Otherwise, we have to get the default port from the protocol handler
|
|
|
|
|
|
|
|
|
|
// Need the scheme first
|
|
|
|
|
nsAutoCString scheme;
|
|
|
|
|
rv = aURI->GetScheme(scheme);
|
|
|
|
|
if (NS_FAILED(rv)) return -1;
|
|
|
|
|
|
|
|
|
|
return NS_GetDefaultPort(scheme.get());
|
|
|
|
|
}
|
|
|
|
|
|
2017-11-22 13:18:18 +03:00
|
|
|
|
nsresult NS_NewInputStreamChannelInternal(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIChannel** outChannel, nsIURI* aUri,
|
|
|
|
|
already_AddRefed<nsIInputStream> aStream, const nsACString& aContentType,
|
|
|
|
|
const nsACString& aContentCharset, nsILoadInfo* aLoadInfo) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIInputStreamChannel> isc =
|
|
|
|
|
do_CreateInstance(NS_INPUTSTREAMCHANNEL_CONTRACTID, &rv);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
rv = isc->SetURI(aUri);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
2017-11-22 13:18:18 +03:00
|
|
|
|
|
2018-05-30 22:15:35 +03:00
|
|
|
|
nsCOMPtr<nsIInputStream> stream = std::move(aStream);
|
2017-11-22 13:18:18 +03:00
|
|
|
|
rv = isc->SetContentStream(stream);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIChannel> channel = do_QueryInterface(isc, &rv);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
if (!aContentType.IsEmpty()) {
|
|
|
|
|
rv = channel->SetContentType(aContentType);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!aContentCharset.IsEmpty()) {
|
|
|
|
|
rv = channel->SetContentCharset(aContentCharset);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
}
|
|
|
|
|
|
2019-02-20 15:27:25 +03:00
|
|
|
|
MOZ_ASSERT(aLoadInfo, "need a loadinfo to create a inputstreamchannel");
|
2015-05-20 05:48:00 +03:00
|
|
|
|
channel->SetLoadInfo(aLoadInfo);
|
|
|
|
|
|
|
|
|
|
// If we're sandboxed, make sure to clear any owner the channel
|
|
|
|
|
// might already have.
|
|
|
|
|
if (aLoadInfo && aLoadInfo->GetLoadingSandboxed()) {
|
|
|
|
|
channel->SetOwner(nullptr);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
channel.forget(outChannel);
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
|
2017-11-22 13:18:18 +03:00
|
|
|
|
nsresult NS_NewInputStreamChannelInternal(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIChannel** outChannel, nsIURI* aUri,
|
|
|
|
|
already_AddRefed<nsIInputStream> aStream, const nsACString& aContentType,
|
|
|
|
|
const nsACString& aContentCharset, nsINode* aLoadingNode,
|
|
|
|
|
nsIPrincipal* aLoadingPrincipal, nsIPrincipal* aTriggeringPrincipal,
|
2015-08-19 20:43:30 +03:00
|
|
|
|
nsSecurityFlags aSecurityFlags, nsContentPolicyType aContentPolicyType) {
|
2018-05-30 22:21:17 +03:00
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = new mozilla::net::LoadInfo(
|
|
|
|
|
aLoadingPrincipal, aTriggeringPrincipal, aLoadingNode, aSecurityFlags,
|
|
|
|
|
aContentPolicyType);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
if (!loadInfo) {
|
|
|
|
|
return NS_ERROR_UNEXPECTED;
|
|
|
|
|
}
|
2017-11-22 13:18:18 +03:00
|
|
|
|
|
2018-05-30 22:15:35 +03:00
|
|
|
|
nsCOMPtr<nsIInputStream> stream = std::move(aStream);
|
2017-11-22 13:18:18 +03:00
|
|
|
|
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return NS_NewInputStreamChannelInternal(outChannel, aUri, stream.forget(),
|
|
|
|
|
aContentType, aContentCharset,
|
|
|
|
|
loadInfo);
|
|
|
|
|
}
|
|
|
|
|
|
2017-11-22 13:18:36 +03:00
|
|
|
|
nsresult NS_NewInputStreamChannel(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIChannel** outChannel, nsIURI* aUri,
|
|
|
|
|
already_AddRefed<nsIInputStream> aStream, nsIPrincipal* aLoadingPrincipal,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsSecurityFlags aSecurityFlags, nsContentPolicyType aContentPolicyType,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
const nsACString& aContentType /* = EmptyCString() */,
|
|
|
|
|
const nsACString& aContentCharset /* = EmptyCString() */) {
|
2017-11-22 13:18:18 +03:00
|
|
|
|
nsCOMPtr<nsIInputStream> stream = aStream;
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return NS_NewInputStreamChannelInternal(outChannel, aUri, stream.forget(),
|
|
|
|
|
aContentType, aContentCharset,
|
|
|
|
|
nullptr, // aLoadingNode
|
|
|
|
|
aLoadingPrincipal,
|
|
|
|
|
nullptr, // aTriggeringPrincipal
|
|
|
|
|
aSecurityFlags, aContentPolicyType);
|
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_NewInputStreamChannelInternal(nsIChannel** outChannel, nsIURI* aUri,
|
|
|
|
|
const nsAString& aData,
|
|
|
|
|
const nsACString& aContentType,
|
|
|
|
|
nsILoadInfo* aLoadInfo,
|
2015-08-19 20:43:30 +03:00
|
|
|
|
bool aIsSrcdocChannel /* = false */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIStringInputStream> stream;
|
|
|
|
|
stream = do_CreateInstance(NS_STRINGINPUTSTREAM_CONTRACTID, &rv);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
uint32_t len;
|
2019-05-01 11:47:10 +03:00
|
|
|
|
char* utf8Bytes = ToNewUTF8String(aData, &len);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
rv = stream->AdoptData(utf8Bytes, len);
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIChannel> channel;
|
|
|
|
|
rv = NS_NewInputStreamChannelInternal(getter_AddRefs(channel), aUri,
|
2017-11-22 13:18:18 +03:00
|
|
|
|
stream.forget(), aContentType,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
NS_LITERAL_CSTRING("UTF-8"), aLoadInfo);
|
|
|
|
|
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
if (aIsSrcdocChannel) {
|
|
|
|
|
nsCOMPtr<nsIInputStreamChannel> inStrmChan = do_QueryInterface(channel);
|
|
|
|
|
NS_ENSURE_TRUE(inStrmChan, NS_ERROR_FAILURE);
|
|
|
|
|
inStrmChan->SetSrcdocData(aData);
|
|
|
|
|
}
|
|
|
|
|
channel.forget(outChannel);
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
|
2016-03-04 19:54:07 +03:00
|
|
|
|
nsresult NS_NewInputStreamChannelInternal(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIChannel** outChannel, nsIURI* aUri, const nsAString& aData,
|
|
|
|
|
const nsACString& aContentType, nsINode* aLoadingNode,
|
|
|
|
|
nsIPrincipal* aLoadingPrincipal, nsIPrincipal* aTriggeringPrincipal,
|
2016-03-04 19:54:07 +03:00
|
|
|
|
nsSecurityFlags aSecurityFlags, nsContentPolicyType aContentPolicyType,
|
|
|
|
|
bool aIsSrcdocChannel /* = false */) {
|
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = new mozilla::net::LoadInfo(
|
2018-05-30 22:21:17 +03:00
|
|
|
|
aLoadingPrincipal, aTriggeringPrincipal, aLoadingNode, aSecurityFlags,
|
|
|
|
|
aContentPolicyType);
|
2016-03-04 19:54:07 +03:00
|
|
|
|
return NS_NewInputStreamChannelInternal(outChannel, aUri, aData, aContentType,
|
|
|
|
|
loadInfo, aIsSrcdocChannel);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_NewInputStreamChannel(nsIChannel** outChannel, nsIURI* aUri,
|
|
|
|
|
const nsAString& aData,
|
|
|
|
|
const nsACString& aContentType,
|
|
|
|
|
nsIPrincipal* aLoadingPrincipal,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsSecurityFlags aSecurityFlags,
|
|
|
|
|
nsContentPolicyType aContentPolicyType,
|
2015-08-19 20:43:30 +03:00
|
|
|
|
bool aIsSrcdocChannel /* = false */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return NS_NewInputStreamChannelInternal(outChannel, aUri, aData, aContentType,
|
|
|
|
|
nullptr, // aLoadingNode
|
|
|
|
|
aLoadingPrincipal,
|
|
|
|
|
nullptr, // aTriggeringPrincipal
|
|
|
|
|
aSecurityFlags, aContentPolicyType,
|
2015-08-19 20:43:30 +03:00
|
|
|
|
aIsSrcdocChannel);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
|
|
|
|
|
2017-11-22 13:18:57 +03:00
|
|
|
|
nsresult NS_NewInputStreamPump(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIInputStreamPump** aResult, already_AddRefed<nsIInputStream> aStream,
|
2017-11-22 13:18:57 +03:00
|
|
|
|
uint32_t aSegsize /* = 0 */, uint32_t aSegcount /* = 0 */,
|
|
|
|
|
bool aCloseWhenDone /* = false */,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIEventTarget* aMainThreadTarget /* = nullptr */) {
|
2018-05-30 22:15:35 +03:00
|
|
|
|
nsCOMPtr<nsIInputStream> stream = std::move(aStream);
|
2017-11-22 13:18:57 +03:00
|
|
|
|
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIInputStreamPump> pump =
|
|
|
|
|
do_CreateInstance(NS_INPUTSTREAMPUMP_CONTRACTID, &rv);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
2017-11-22 13:18:57 +03:00
|
|
|
|
rv = pump->Init(stream, aSegsize, aSegcount, aCloseWhenDone,
|
|
|
|
|
aMainThreadTarget);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
2017-11-22 13:18:57 +03:00
|
|
|
|
*aResult = nullptr;
|
|
|
|
|
pump.swap(*aResult);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_NewLoadGroup(nsILoadGroup** result, nsIRequestObserver* obs) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsILoadGroup> group =
|
|
|
|
|
do_CreateInstance(NS_LOADGROUP_CONTRACTID, &rv);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
rv = group->SetGroupObserver(obs);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
*result = nullptr;
|
|
|
|
|
group.swap(*result);
|
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_IsReasonableHTTPHeaderValue(const nsACString& aValue) {
|
2014-07-24 20:38:55 +04:00
|
|
|
|
return mozilla::net::nsHttp::IsReasonableHeaderValue(aValue);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_IsValidHTTPToken(const nsACString& aToken) {
|
2014-07-24 20:38:55 +04:00
|
|
|
|
return mozilla::net::nsHttp::IsValidToken(aToken);
|
|
|
|
|
}
|
2014-12-15 16:39:00 +03:00
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
void NS_TrimHTTPWhitespace(const nsACString& aSource, nsACString& aDest) {
|
2017-04-10 11:15:29 +03:00
|
|
|
|
mozilla::net::nsHttp::TrimHTTPWhitespace(aSource, aDest);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_NewLoadGroup(nsILoadGroup** aResult, nsIPrincipal* aPrincipal) {
|
2014-12-15 16:39:00 +03:00
|
|
|
|
using mozilla::LoadContext;
|
|
|
|
|
nsresult rv;
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsILoadGroup> group =
|
|
|
|
|
do_CreateInstance(NS_LOADGROUP_CONTRACTID, &rv);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
|
RefPtr<LoadContext> loadContext = new LoadContext(aPrincipal);
|
2014-12-15 16:39:00 +03:00
|
|
|
|
rv = group->SetNotificationCallbacks(loadContext);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
group.forget(aResult);
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_LoadGroupMatchesPrincipal(nsILoadGroup* aLoadGroup,
|
|
|
|
|
nsIPrincipal* aPrincipal) {
|
2014-12-15 16:39:00 +03:00
|
|
|
|
if (!aPrincipal) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// If this is a null principal then the load group doesn't really matter.
|
|
|
|
|
// The principal will not be allowed to perform any actions that actually
|
|
|
|
|
// use the load group. Unconditionally treat null principals as a match.
|
2016-08-12 08:19:29 +03:00
|
|
|
|
if (aPrincipal->GetIsNullPrincipal()) {
|
2014-12-15 16:39:00 +03:00
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!aLoadGroup) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsILoadContext> loadContext;
|
|
|
|
|
NS_QueryNotificationCallbacks(nullptr, aLoadGroup, NS_GET_IID(nsILoadContext),
|
|
|
|
|
getter_AddRefs(loadContext));
|
|
|
|
|
NS_ENSURE_TRUE(loadContext, false);
|
|
|
|
|
|
2016-10-15 04:46:26 +03:00
|
|
|
|
// Verify load context browser flag match the principal
|
2016-02-18 05:55:57 +03:00
|
|
|
|
bool contextInIsolatedBrowser;
|
2016-10-15 04:46:26 +03:00
|
|
|
|
nsresult rv =
|
|
|
|
|
loadContext->GetIsInIsolatedMozBrowserElement(&contextInIsolatedBrowser);
|
2014-12-15 16:39:00 +03:00
|
|
|
|
NS_ENSURE_SUCCESS(rv, false);
|
|
|
|
|
|
2016-11-20 00:53:32 +03:00
|
|
|
|
return contextInIsolatedBrowser ==
|
|
|
|
|
aPrincipal->GetIsInIsolatedMozBrowserElement();
|
2014-12-15 16:39:00 +03:00
|
|
|
|
}
|
2015-05-20 05:48:00 +03:00
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_NewDownloader(nsIStreamListener** result,
|
|
|
|
|
nsIDownloadObserver* observer,
|
|
|
|
|
nsIFile* downloadLocation /* = nullptr */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIDownloader> downloader =
|
|
|
|
|
do_CreateInstance(NS_DOWNLOADER_CONTRACTID, &rv);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
rv = downloader->Init(observer, downloadLocation);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
downloader.forget(result);
|
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2015-11-30 17:54:11 +03:00
|
|
|
|
nsresult NS_NewIncrementalStreamLoader(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIIncrementalStreamLoader** result,
|
|
|
|
|
nsIIncrementalStreamLoaderObserver* observer) {
|
2015-11-30 17:54:11 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIIncrementalStreamLoader> loader =
|
|
|
|
|
do_CreateInstance(NS_INCREMENTALSTREAMLOADER_CONTRACTID, &rv);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
2015-11-30 17:54:11 +03:00
|
|
|
|
rv = loader->Init(observer);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
*result = nullptr;
|
|
|
|
|
loader.swap(*result);
|
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2015-11-30 17:54:11 +03:00
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsresult NS_NewStreamLoader(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIStreamLoader** result, nsIStreamLoaderObserver* observer,
|
|
|
|
|
nsIRequestObserver* requestObserver /* = nullptr */) {
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIStreamLoader> loader =
|
|
|
|
|
do_CreateInstance(NS_STREAMLOADER_CONTRACTID, &rv);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
2017-03-02 17:32:37 +03:00
|
|
|
|
rv = loader->Init(observer, requestObserver);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
*result = nullptr;
|
|
|
|
|
loader.swap(*result);
|
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2017-03-02 17:32:37 +03:00
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult NS_NewStreamLoaderInternal(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIStreamLoader** outStream, nsIURI* aUri,
|
|
|
|
|
nsIStreamLoaderObserver* aObserver, nsINode* aLoadingNode,
|
|
|
|
|
nsIPrincipal* aLoadingPrincipal, nsSecurityFlags aSecurityFlags,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsContentPolicyType aContentPolicyType,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsILoadGroup* aLoadGroup /* = nullptr */,
|
|
|
|
|
nsIInterfaceRequestor* aCallbacks /* = nullptr */,
|
2019-05-02 15:34:52 +03:00
|
|
|
|
nsLoadFlags aLoadFlags /* = nsIRequest::LOAD_NORMAL */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsCOMPtr<nsIChannel> channel;
|
|
|
|
|
nsresult rv = NS_NewChannelInternal(
|
|
|
|
|
getter_AddRefs(channel), aUri, aLoadingNode, aLoadingPrincipal,
|
|
|
|
|
nullptr, // aTriggeringPrincipal
|
2018-01-23 18:38:54 +03:00
|
|
|
|
Maybe<ClientInfo>(), Maybe<ServiceWorkerDescriptor>(), aSecurityFlags,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
aContentPolicyType,
|
2019-03-08 12:04:11 +03:00
|
|
|
|
nullptr, // nsICookieSettings
|
2018-01-24 19:17:31 +03:00
|
|
|
|
nullptr, // PerformanceStorage
|
2015-05-20 05:48:00 +03:00
|
|
|
|
aLoadGroup, aCallbacks, aLoadFlags);
|
|
|
|
|
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
rv = NS_NewStreamLoader(outStream, aObserver);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
2019-02-12 19:08:25 +03:00
|
|
|
|
return channel->AsyncOpen(*outStream);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsresult NS_NewStreamLoader(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIStreamLoader** outStream, nsIURI* aUri,
|
|
|
|
|
nsIStreamLoaderObserver* aObserver, nsINode* aLoadingNode,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsSecurityFlags aSecurityFlags, nsContentPolicyType aContentPolicyType,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsILoadGroup* aLoadGroup /* = nullptr */,
|
|
|
|
|
nsIInterfaceRequestor* aCallbacks /* = nullptr */,
|
2019-05-02 15:34:52 +03:00
|
|
|
|
nsLoadFlags aLoadFlags /* = nsIRequest::LOAD_NORMAL */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
NS_ASSERTION(aLoadingNode,
|
|
|
|
|
"Can not create stream loader without a loading Node!");
|
|
|
|
|
return NS_NewStreamLoaderInternal(
|
|
|
|
|
outStream, aUri, aObserver, aLoadingNode, aLoadingNode->NodePrincipal(),
|
2019-05-02 15:34:52 +03:00
|
|
|
|
aSecurityFlags, aContentPolicyType, aLoadGroup, aCallbacks, aLoadFlags);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult NS_NewStreamLoader(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIStreamLoader** outStream, nsIURI* aUri,
|
|
|
|
|
nsIStreamLoaderObserver* aObserver, nsIPrincipal* aLoadingPrincipal,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsSecurityFlags aSecurityFlags, nsContentPolicyType aContentPolicyType,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsILoadGroup* aLoadGroup /* = nullptr */,
|
|
|
|
|
nsIInterfaceRequestor* aCallbacks /* = nullptr */,
|
2019-05-02 15:34:52 +03:00
|
|
|
|
nsLoadFlags aLoadFlags /* = nsIRequest::LOAD_NORMAL */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return NS_NewStreamLoaderInternal(outStream, aUri, aObserver,
|
|
|
|
|
nullptr, // aLoadingNode
|
|
|
|
|
aLoadingPrincipal, aSecurityFlags,
|
|
|
|
|
aContentPolicyType, aLoadGroup, aCallbacks,
|
2019-05-02 15:34:52 +03:00
|
|
|
|
aLoadFlags);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_NewSyncStreamListener(nsIStreamListener** result,
|
|
|
|
|
nsIInputStream** stream) {
|
2018-10-23 23:07:29 +03:00
|
|
|
|
nsCOMPtr<nsISyncStreamListener> listener = nsSyncStreamListener::Create();
|
|
|
|
|
if (listener) {
|
|
|
|
|
nsresult rv = listener->GetInputStream(stream);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
listener.forget(result);
|
|
|
|
|
}
|
2018-10-23 23:07:29 +03:00
|
|
|
|
return rv;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2018-10-23 23:07:29 +03:00
|
|
|
|
return NS_ERROR_FAILURE;
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_ImplementChannelOpen(nsIChannel* channel, nsIInputStream** result) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsCOMPtr<nsIStreamListener> listener;
|
|
|
|
|
nsCOMPtr<nsIInputStream> stream;
|
|
|
|
|
nsresult rv = NS_NewSyncStreamListener(getter_AddRefs(listener),
|
|
|
|
|
getter_AddRefs(stream));
|
2016-05-12 20:38:59 +03:00
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
2019-02-12 19:08:25 +03:00
|
|
|
|
rv = NS_MaybeOpenChannelUsingAsyncOpen(channel, listener);
|
2016-05-12 20:38:59 +03:00
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
uint64_t n;
|
|
|
|
|
// block until the initial response is received or an error occurs.
|
|
|
|
|
rv = stream->Available(&n);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
*result = nullptr;
|
|
|
|
|
stream.swap(*result);
|
|
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
2015-05-20 05:48:00 +03:00
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_NewRequestObserverProxy(nsIRequestObserver** result,
|
|
|
|
|
nsIRequestObserver* observer,
|
|
|
|
|
nsISupports* context) {
|
2018-10-23 23:07:19 +03:00
|
|
|
|
nsCOMPtr<nsIRequestObserverProxy> proxy = new nsRequestObserverProxy();
|
|
|
|
|
nsresult rv = proxy->Init(observer, context);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
2018-10-23 23:07:19 +03:00
|
|
|
|
proxy.forget(result);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsresult NS_NewSimpleStreamListener(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIStreamListener** result, nsIOutputStream* sink,
|
|
|
|
|
nsIRequestObserver* observer /* = nullptr */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsISimpleStreamListener> listener =
|
|
|
|
|
do_CreateInstance(NS_SIMPLESTREAMLISTENER_CONTRACTID, &rv);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
rv = listener->Init(sink, observer);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
listener.forget(result);
|
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_CheckPortSafety(int32_t port, const char* scheme,
|
|
|
|
|
nsIIOService* ioService /* = nullptr */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIIOService> grip;
|
|
|
|
|
rv = net_EnsureIOService(&ioService, grip);
|
|
|
|
|
if (ioService) {
|
|
|
|
|
bool allow;
|
|
|
|
|
rv = ioService->AllowPort(port, scheme, &allow);
|
|
|
|
|
if (NS_SUCCEEDED(rv) && !allow) {
|
|
|
|
|
NS_WARNING("port blocked");
|
|
|
|
|
rv = NS_ERROR_PORT_ACCESS_NOT_ALLOWED;
|
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_CheckPortSafety(nsIURI* uri) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
int32_t port;
|
|
|
|
|
nsresult rv = uri->GetPort(&port);
|
|
|
|
|
if (NS_FAILED(rv) || port == -1) // port undefined or default-valued
|
|
|
|
|
return NS_OK;
|
|
|
|
|
nsAutoCString scheme;
|
|
|
|
|
uri->GetScheme(scheme);
|
|
|
|
|
return NS_CheckPortSafety(port, scheme.get());
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_NewProxyInfo(const nsACString& type, const nsACString& host,
|
|
|
|
|
int32_t port, uint32_t flags, nsIProxyInfo** result) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIProtocolProxyService> pps =
|
|
|
|
|
do_GetService(NS_PROTOCOLPROXYSERVICE_CONTRACTID, &rv);
|
|
|
|
|
if (NS_SUCCEEDED(rv))
|
2019-05-06 10:22:18 +03:00
|
|
|
|
rv = pps->NewProxyInfo(type, host, port, EmptyCString(), EmptyCString(),
|
|
|
|
|
flags, UINT32_MAX, nullptr, result);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_GetFileProtocolHandler(nsIFileProtocolHandler** result,
|
|
|
|
|
nsIIOService* ioService /* = nullptr */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIIOService> grip;
|
|
|
|
|
rv = net_EnsureIOService(&ioService, grip);
|
|
|
|
|
if (ioService) {
|
|
|
|
|
nsCOMPtr<nsIProtocolHandler> handler;
|
|
|
|
|
rv = ioService->GetProtocolHandler("file", getter_AddRefs(handler));
|
|
|
|
|
if (NS_SUCCEEDED(rv)) rv = CallQueryInterface(handler, result);
|
|
|
|
|
}
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_GetFileFromURLSpec(const nsACString& inURL, nsIFile** result,
|
|
|
|
|
nsIIOService* ioService /* = nullptr */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIFileProtocolHandler> fileHandler;
|
|
|
|
|
rv = NS_GetFileProtocolHandler(getter_AddRefs(fileHandler), ioService);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) rv = fileHandler->GetFileFromURLSpec(inURL, result);
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_GetURLSpecFromFile(nsIFile* file, nsACString& url,
|
|
|
|
|
nsIIOService* ioService /* = nullptr */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIFileProtocolHandler> fileHandler;
|
|
|
|
|
rv = NS_GetFileProtocolHandler(getter_AddRefs(fileHandler), ioService);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) rv = fileHandler->GetURLSpecFromFile(file, url);
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_GetURLSpecFromActualFile(nsIFile* file, nsACString& url,
|
|
|
|
|
nsIIOService* ioService /* = nullptr */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIFileProtocolHandler> fileHandler;
|
|
|
|
|
rv = NS_GetFileProtocolHandler(getter_AddRefs(fileHandler), ioService);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) rv = fileHandler->GetURLSpecFromActualFile(file, url);
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_GetURLSpecFromDir(nsIFile* file, nsACString& url,
|
|
|
|
|
nsIIOService* ioService /* = nullptr */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIFileProtocolHandler> fileHandler;
|
|
|
|
|
rv = NS_GetFileProtocolHandler(getter_AddRefs(fileHandler), ioService);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) rv = fileHandler->GetURLSpecFromDir(file, url);
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-02 15:34:52 +03:00
|
|
|
|
void NS_GetReferrerFromChannel(nsIChannel* channel, nsIURI** referrer) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
*referrer = nullptr;
|
|
|
|
|
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsCOMPtr<nsIPropertyBag2> props(do_QueryInterface(channel));
|
|
|
|
|
if (props) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
// We have to check for a property on a property bag because the
|
|
|
|
|
// referrer may be empty for security reasons (for example, when loading
|
|
|
|
|
// an http page with an https referrer).
|
2019-05-02 15:34:52 +03:00
|
|
|
|
nsresult rv = props->GetPropertyAsInterface(
|
2017-03-02 17:32:37 +03:00
|
|
|
|
NS_LITERAL_STRING("docshell.internalReferrer"), NS_GET_IID(nsIURI),
|
2019-05-01 11:47:10 +03:00
|
|
|
|
reinterpret_cast<void**>(referrer));
|
2017-03-02 17:32:37 +03:00
|
|
|
|
if (NS_FAILED(rv)) *referrer = nullptr;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2017-03-02 17:32:37 +03:00
|
|
|
|
|
2019-05-02 15:34:52 +03:00
|
|
|
|
if (*referrer) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2017-03-02 17:32:37 +03:00
|
|
|
|
// if that didn't work, we can still try to get the referrer from the
|
2015-05-20 05:48:00 +03:00
|
|
|
|
// nsIHttpChannel (if we can QI to it)
|
2019-05-02 15:34:52 +03:00
|
|
|
|
nsCOMPtr<nsIHttpChannel> chan(do_QueryInterface(channel));
|
|
|
|
|
if (!chan) {
|
|
|
|
|
return;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2019-05-02 15:34:52 +03:00
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIReferrerInfo> referrerInfo = chan->GetReferrerInfo();
|
|
|
|
|
if (!referrerInfo) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
referrerInfo->GetOriginalReferrer(referrer);
|
2017-03-02 17:32:37 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
already_AddRefed<nsINetUtil> do_GetNetUtil(nsresult* error /* = 0 */) {
|
2015-10-01 21:36:19 +03:00
|
|
|
|
nsCOMPtr<nsIIOService> io = mozilla::services::GetIOService();
|
|
|
|
|
nsCOMPtr<nsINetUtil> util;
|
|
|
|
|
if (io) util = do_QueryInterface(io);
|
|
|
|
|
|
2015-05-20 05:48:00 +03:00
|
|
|
|
if (error) *error = !!util ? NS_OK : NS_ERROR_FAILURE;
|
|
|
|
|
return util.forget();
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_ParseRequestContentType(const nsACString& rawContentType,
|
|
|
|
|
nsCString& contentType,
|
|
|
|
|
nsCString& contentCharset) {
|
2015-10-01 21:36:19 +03:00
|
|
|
|
// contentCharset is left untouched if not present in rawContentType
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsCOMPtr<nsINetUtil> util = do_GetNetUtil(&rv);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
2015-10-01 21:36:19 +03:00
|
|
|
|
nsCString charset;
|
|
|
|
|
bool hadCharset;
|
2015-10-01 19:50:13 +03:00
|
|
|
|
rv = util->ParseRequestContentType(rawContentType, charset, &hadCharset,
|
2015-10-01 21:36:19 +03:00
|
|
|
|
contentType);
|
|
|
|
|
if (NS_SUCCEEDED(rv) && hadCharset) contentCharset = charset;
|
2018-10-23 23:07:29 +03:00
|
|
|
|
return rv;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_ParseResponseContentType(const nsACString& rawContentType,
|
|
|
|
|
nsCString& contentType,
|
|
|
|
|
nsCString& contentCharset) {
|
2015-10-01 21:36:19 +03:00
|
|
|
|
// contentCharset is left untouched if not present in rawContentType
|
|
|
|
|
nsresult rv;
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsCOMPtr<nsINetUtil> util = do_GetNetUtil(&rv);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
2015-10-01 21:36:19 +03:00
|
|
|
|
nsCString charset;
|
|
|
|
|
bool hadCharset;
|
2015-10-01 19:50:13 +03:00
|
|
|
|
rv = util->ParseResponseContentType(rawContentType, charset, &hadCharset,
|
2015-10-01 21:36:19 +03:00
|
|
|
|
contentType);
|
|
|
|
|
if (NS_SUCCEEDED(rv) && hadCharset) contentCharset = charset;
|
2018-10-23 23:07:29 +03:00
|
|
|
|
return rv;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_ExtractCharsetFromContentType(const nsACString& rawContentType,
|
|
|
|
|
nsCString& contentCharset,
|
|
|
|
|
bool* hadCharset,
|
|
|
|
|
int32_t* charsetStart,
|
|
|
|
|
int32_t* charsetEnd) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
// contentCharset is left untouched if not present in rawContentType
|
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsINetUtil> util = do_GetNetUtil(&rv);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
return util->ExtractCharsetFromContentType(
|
|
|
|
|
rawContentType, contentCharset, charsetStart, charsetEnd, hadCharset);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_NewAtomicFileOutputStream(nsIOutputStream** result, nsIFile* file,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
int32_t ioFlags /* = -1 */,
|
|
|
|
|
int32_t perm /* = -1 */,
|
|
|
|
|
int32_t behaviorFlags /* = 0 */) {
|
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIFileOutputStream> out =
|
|
|
|
|
do_CreateInstance(NS_ATOMICLOCALFILEOUTPUTSTREAM_CONTRACTID, &rv);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
rv = out->Init(file, ioFlags, perm, behaviorFlags);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) out.forget(result);
|
|
|
|
|
}
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_NewSafeLocalFileOutputStream(nsIOutputStream** result,
|
|
|
|
|
nsIFile* file,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
int32_t ioFlags /* = -1 */,
|
|
|
|
|
int32_t perm /* = -1 */,
|
|
|
|
|
int32_t behaviorFlags /* = 0 */) {
|
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIFileOutputStream> out =
|
|
|
|
|
do_CreateInstance(NS_SAFELOCALFILEOUTPUTSTREAM_CONTRACTID, &rv);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
rv = out->Init(file, ioFlags, perm, behaviorFlags);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) out.forget(result);
|
|
|
|
|
}
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_NewLocalFileStream(nsIFileStream** result, nsIFile* file,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
int32_t ioFlags /* = -1 */,
|
|
|
|
|
int32_t perm /* = -1 */,
|
|
|
|
|
int32_t behaviorFlags /* = 0 */) {
|
2018-09-10 02:18:19 +03:00
|
|
|
|
nsCOMPtr<nsIFileStream> stream = new nsFileStream();
|
|
|
|
|
nsresult rv = stream->Init(file, ioFlags, perm, behaviorFlags);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
2018-09-10 02:18:19 +03:00
|
|
|
|
stream.forget(result);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2017-10-24 15:38:23 +03:00
|
|
|
|
nsresult NS_NewBufferedOutputStream(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIOutputStream** aResult, already_AddRefed<nsIOutputStream> aOutputStream,
|
2017-10-24 15:38:23 +03:00
|
|
|
|
uint32_t aBufferSize) {
|
2018-05-30 22:15:35 +03:00
|
|
|
|
nsCOMPtr<nsIOutputStream> outputStream = std::move(aOutputStream);
|
2017-10-24 15:38:23 +03:00
|
|
|
|
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIBufferedOutputStream> out =
|
|
|
|
|
do_CreateInstance(NS_BUFFEREDOUTPUTSTREAM_CONTRACTID, &rv);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
2017-10-24 15:38:23 +03:00
|
|
|
|
rv = out->Init(outputStream, aBufferSize);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
2017-10-24 15:38:23 +03:00
|
|
|
|
out.forget(aResult);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2017-10-19 12:39:30 +03:00
|
|
|
|
MOZ_MUST_USE nsresult NS_NewBufferedInputStream(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIInputStream** aResult, already_AddRefed<nsIInputStream> aInputStream,
|
2017-10-19 12:39:30 +03:00
|
|
|
|
uint32_t aBufferSize) {
|
2018-05-30 22:15:35 +03:00
|
|
|
|
nsCOMPtr<nsIInputStream> inputStream = std::move(aInputStream);
|
2017-10-19 12:39:30 +03:00
|
|
|
|
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIBufferedInputStream> in =
|
|
|
|
|
do_CreateInstance(NS_BUFFEREDINPUTSTREAM_CONTRACTID, &rv);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
2017-10-19 12:39:30 +03:00
|
|
|
|
rv = in->Init(inputStream, aBufferSize);
|
2017-03-02 17:32:37 +03:00
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
2017-10-19 12:39:30 +03:00
|
|
|
|
in.forget(aResult);
|
2017-03-02 17:32:37 +03:00
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2017-03-02 17:32:37 +03:00
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
namespace {
|
|
|
|
|
|
2018-06-18 03:30:58 +03:00
|
|
|
|
#define BUFFER_SIZE 8192
|
2017-11-09 13:18:08 +03:00
|
|
|
|
|
2018-06-19 02:41:29 +03:00
|
|
|
|
class BufferWriter final : public nsIInputStreamCallback {
|
2017-11-09 13:18:08 +03:00
|
|
|
|
public:
|
2018-06-19 02:41:29 +03:00
|
|
|
|
NS_DECL_THREADSAFE_ISUPPORTS
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
BufferWriter(nsIInputStream* aInputStream, void* aBuffer, int64_t aCount)
|
2018-06-19 02:41:29 +03:00
|
|
|
|
: mMonitor("BufferWriter.mMonitor"),
|
2017-11-09 13:18:08 +03:00
|
|
|
|
mInputStream(aInputStream),
|
|
|
|
|
mBuffer(aBuffer),
|
|
|
|
|
mCount(aCount),
|
|
|
|
|
mWrittenData(0),
|
2017-11-20 17:18:26 +03:00
|
|
|
|
mBufferType(aBuffer ? eExternal : eInternal),
|
2017-11-09 13:18:08 +03:00
|
|
|
|
mBufferSize(0) {
|
|
|
|
|
MOZ_ASSERT(aInputStream);
|
|
|
|
|
MOZ_ASSERT(aCount == -1 || aCount > 0);
|
|
|
|
|
MOZ_ASSERT_IF(mBuffer, aCount > 0);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
nsresult Write() {
|
2018-06-19 02:41:29 +03:00
|
|
|
|
NS_ASSERT_OWNINGTHREAD(BufferWriter);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
// Let's make the inputStream buffered if it's not.
|
|
|
|
|
if (!NS_InputStreamIsBuffered(mInputStream)) {
|
|
|
|
|
nsCOMPtr<nsIInputStream> bufferedStream;
|
2018-02-12 20:49:36 +03:00
|
|
|
|
nsresult rv = NS_NewBufferedInputStream(
|
2017-11-09 13:18:08 +03:00
|
|
|
|
getter_AddRefs(bufferedStream), mInputStream.forget(), BUFFER_SIZE);
|
2015-10-01 21:36:19 +03:00
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
mInputStream = bufferedStream;
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-19 02:41:29 +03:00
|
|
|
|
mAsyncInputStream = do_QueryInterface(mInputStream);
|
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
if (!mAsyncInputStream) {
|
|
|
|
|
return WriteSync();
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2017-11-09 13:18:08 +03:00
|
|
|
|
|
|
|
|
|
// Let's use mAsyncInputStream only.
|
|
|
|
|
mInputStream = nullptr;
|
|
|
|
|
|
|
|
|
|
return WriteAsync();
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2017-11-09 13:18:08 +03:00
|
|
|
|
|
|
|
|
|
uint64_t WrittenData() const {
|
|
|
|
|
NS_ASSERT_OWNINGTHREAD(BufferWriter);
|
|
|
|
|
return mWrittenData;
|
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
void* StealBuffer() {
|
2018-06-19 02:41:29 +03:00
|
|
|
|
NS_ASSERT_OWNINGTHREAD(BufferWriter);
|
2017-11-09 13:18:08 +03:00
|
|
|
|
MOZ_ASSERT(mBufferType == eInternal);
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
void* buffer = mBuffer;
|
2017-11-09 13:18:08 +03:00
|
|
|
|
|
|
|
|
|
mBuffer = nullptr;
|
2017-11-20 17:18:26 +03:00
|
|
|
|
mBufferSize = 0;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
return buffer;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private:
|
2017-11-09 13:18:08 +03:00
|
|
|
|
~BufferWriter() {
|
|
|
|
|
if (mBuffer && mBufferType == eInternal) {
|
|
|
|
|
free(mBuffer);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
if (mTaskQueue) {
|
|
|
|
|
mTaskQueue->BeginShutdown();
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
nsresult WriteSync() {
|
|
|
|
|
NS_ASSERT_OWNINGTHREAD(BufferWriter);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
uint64_t length = (uint64_t)mCount;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
if (mCount == -1) {
|
|
|
|
|
nsresult rv = mInputStream->Available(&length);
|
2015-10-01 21:36:19 +03:00
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
if (length == 0) {
|
|
|
|
|
// nothing to read.
|
|
|
|
|
return NS_OK;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2017-11-09 13:18:08 +03:00
|
|
|
|
}
|
|
|
|
|
|
2018-06-19 02:41:29 +03:00
|
|
|
|
if (mBufferType == eInternal) {
|
|
|
|
|
mBuffer = malloc(length);
|
|
|
|
|
if (NS_WARN_IF(!mBuffer)) {
|
2017-11-09 13:18:08 +03:00
|
|
|
|
return NS_ERROR_OUT_OF_MEMORY;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2017-11-09 13:18:08 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
uint32_t writtenData;
|
2018-06-19 02:41:29 +03:00
|
|
|
|
nsresult rv = mInputStream->ReadSegments(NS_CopySegmentToBuffer, mBuffer,
|
|
|
|
|
length, &writtenData);
|
2017-11-09 13:18:08 +03:00
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
mWrittenData = writtenData;
|
|
|
|
|
return NS_OK;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2017-11-20 17:18:26 +03:00
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
nsresult WriteAsync() {
|
|
|
|
|
NS_ASSERT_OWNINGTHREAD(BufferWriter);
|
|
|
|
|
|
|
|
|
|
if (mCount > 0 && mBufferType == eInternal) {
|
|
|
|
|
mBuffer = malloc(mCount);
|
|
|
|
|
if (NS_WARN_IF(!mBuffer)) {
|
|
|
|
|
return NS_ERROR_OUT_OF_MEMORY;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2017-11-09 13:18:08 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
|
if (mCount == -1 && !MaybeExpandBufferSize()) {
|
|
|
|
|
return NS_ERROR_OUT_OF_MEMORY;
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-19 02:41:29 +03:00
|
|
|
|
uint64_t offset = mWrittenData;
|
|
|
|
|
uint64_t length = mCount == -1 ? BUFFER_SIZE : mCount;
|
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
// Let's try to read data directly.
|
|
|
|
|
uint32_t writtenData;
|
|
|
|
|
nsresult rv = mAsyncInputStream->ReadSegments(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
NS_CopySegmentToBuffer, static_cast<char*>(mBuffer) + offset, length,
|
2017-11-09 13:18:08 +03:00
|
|
|
|
&writtenData);
|
|
|
|
|
|
|
|
|
|
// Operation completed. Nothing more to read.
|
|
|
|
|
if (NS_SUCCEEDED(rv) && writtenData == 0) {
|
|
|
|
|
return NS_OK;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2017-11-09 13:18:08 +03:00
|
|
|
|
|
|
|
|
|
// If we succeeded, let's try to read again.
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
mWrittenData += writtenData;
|
2018-06-18 03:30:58 +03:00
|
|
|
|
if (mCount != -1) {
|
|
|
|
|
MOZ_ASSERT(mCount >= writtenData);
|
|
|
|
|
mCount -= writtenData;
|
2017-11-09 13:18:08 +03:00
|
|
|
|
|
|
|
|
|
// Is this the end of the reading?
|
|
|
|
|
if (mCount == 0) {
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
continue;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2017-11-09 13:18:08 +03:00
|
|
|
|
|
|
|
|
|
// Async wait...
|
2018-06-18 03:30:58 +03:00
|
|
|
|
if (rv == NS_BASE_STREAM_WOULD_BLOCK) {
|
2017-11-09 13:18:08 +03:00
|
|
|
|
rv = MaybeCreateTaskQueue();
|
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-19 02:41:29 +03:00
|
|
|
|
MonitorAutoLock lock(mMonitor);
|
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
rv = mAsyncInputStream->AsyncWait(this, 0, length, mTaskQueue);
|
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2018-06-18 03:30:58 +03:00
|
|
|
|
lock.Wait();
|
|
|
|
|
continue;
|
|
|
|
|
}
|
2017-11-09 13:18:08 +03:00
|
|
|
|
|
2018-06-18 03:30:58 +03:00
|
|
|
|
// Otherwise, let's propagate the error.
|
|
|
|
|
return rv;
|
2017-11-09 13:18:08 +03:00
|
|
|
|
}
|
|
|
|
|
|
2018-06-19 02:41:29 +03:00
|
|
|
|
MOZ_ASSERT_UNREACHABLE("We should not be here");
|
|
|
|
|
return NS_ERROR_FAILURE;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2018-06-19 02:41:29 +03:00
|
|
|
|
|
|
|
|
|
nsresult MaybeCreateTaskQueue() {
|
|
|
|
|
NS_ASSERT_OWNINGTHREAD(BufferWriter);
|
|
|
|
|
|
|
|
|
|
if (!mTaskQueue) {
|
|
|
|
|
nsCOMPtr<nsIEventTarget> target =
|
|
|
|
|
do_GetService(NS_STREAMTRANSPORTSERVICE_CONTRACTID);
|
|
|
|
|
if (!target) {
|
|
|
|
|
return NS_ERROR_FAILURE;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
mTaskQueue = new TaskQueue(target.forget());
|
2017-11-09 13:18:08 +03:00
|
|
|
|
}
|
|
|
|
|
|
2018-06-19 02:41:29 +03:00
|
|
|
|
return NS_OK;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2017-11-09 13:18:08 +03:00
|
|
|
|
|
2018-06-19 02:41:29 +03:00
|
|
|
|
NS_IMETHOD
|
2019-05-01 11:47:10 +03:00
|
|
|
|
OnInputStreamReady(nsIAsyncInputStream* aStream) override {
|
2018-06-19 02:41:29 +03:00
|
|
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
2017-11-09 13:18:08 +03:00
|
|
|
|
|
2018-06-19 02:41:29 +03:00
|
|
|
|
// We have something to read. Let's unlock the main-thread.
|
|
|
|
|
MonitorAutoLock lock(mMonitor);
|
|
|
|
|
lock.Notify();
|
|
|
|
|
return NS_OK;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2018-06-19 02:41:29 +03:00
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
bool MaybeExpandBufferSize() {
|
|
|
|
|
NS_ASSERT_OWNINGTHREAD(BufferWriter);
|
|
|
|
|
|
|
|
|
|
MOZ_ASSERT(mCount == -1);
|
|
|
|
|
|
|
|
|
|
if (mBufferSize >= mWrittenData + BUFFER_SIZE) {
|
|
|
|
|
// The buffer is big enough.
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
CheckedUint32 bufferSize =
|
|
|
|
|
std::max<uint32_t>(static_cast<uint32_t>(mWrittenData), BUFFER_SIZE);
|
|
|
|
|
while (bufferSize.isValid() &&
|
|
|
|
|
bufferSize.value() < mWrittenData + BUFFER_SIZE) {
|
|
|
|
|
bufferSize *= 2;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!bufferSize.isValid()) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
void* buffer = realloc(mBuffer, bufferSize.value());
|
2017-11-09 13:18:08 +03:00
|
|
|
|
if (!buffer) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
mBuffer = buffer;
|
|
|
|
|
mBufferSize = bufferSize.value();
|
|
|
|
|
return true;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
|
|
|
|
|
2018-06-19 02:41:29 +03:00
|
|
|
|
// All the members of this class are touched on the owning thread only. The
|
|
|
|
|
// monitor is only used to communicate when there is more data to read.
|
2017-11-09 13:18:08 +03:00
|
|
|
|
Monitor mMonitor;
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIInputStream> mInputStream;
|
|
|
|
|
nsCOMPtr<nsIAsyncInputStream> mAsyncInputStream;
|
|
|
|
|
|
|
|
|
|
RefPtr<TaskQueue> mTaskQueue;
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
void* mBuffer;
|
2017-11-09 13:18:08 +03:00
|
|
|
|
int64_t mCount;
|
|
|
|
|
uint64_t mWrittenData;
|
|
|
|
|
|
|
|
|
|
enum {
|
|
|
|
|
// The buffer is allocated internally and this object must release it
|
|
|
|
|
// in the DTOR if not stolen. The buffer can be reallocated.
|
|
|
|
|
eInternal,
|
|
|
|
|
|
|
|
|
|
// The buffer is not owned by this object and it cannot be reallocated.
|
|
|
|
|
eExternal,
|
|
|
|
|
} mBufferType;
|
|
|
|
|
|
|
|
|
|
// The following set if needed for the async read.
|
|
|
|
|
uint64_t mBufferSize;
|
|
|
|
|
};
|
|
|
|
|
|
2018-06-19 02:41:29 +03:00
|
|
|
|
NS_IMPL_ISUPPORTS(BufferWriter, nsIInputStreamCallback)
|
2017-11-09 13:18:08 +03:00
|
|
|
|
|
|
|
|
|
} // anonymous namespace
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_ReadInputStreamToBuffer(nsIInputStream* aInputStream, void** aDest,
|
|
|
|
|
int64_t aCount, uint64_t* aWritten) {
|
2017-11-09 13:18:08 +03:00
|
|
|
|
MOZ_ASSERT(aInputStream);
|
|
|
|
|
MOZ_ASSERT(aCount >= -1);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
uint64_t dummyWritten;
|
|
|
|
|
if (!aWritten) {
|
|
|
|
|
aWritten = &dummyWritten;
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
if (aCount == 0) {
|
|
|
|
|
*aWritten = 0;
|
|
|
|
|
return NS_OK;
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
2017-11-09 13:18:08 +03:00
|
|
|
|
|
|
|
|
|
// This will take care of allocating and reallocating aDest.
|
|
|
|
|
RefPtr<BufferWriter> writer = new BufferWriter(aInputStream, *aDest, aCount);
|
|
|
|
|
|
|
|
|
|
nsresult rv = writer->Write();
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
*aWritten = writer->WrittenData();
|
|
|
|
|
|
|
|
|
|
if (!*aDest) {
|
|
|
|
|
*aDest = writer->StealBuffer();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NS_OK;
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_ReadInputStreamToString(nsIInputStream* aInputStream,
|
|
|
|
|
nsACString& aDest, int64_t aCount,
|
|
|
|
|
uint64_t* aWritten) {
|
2017-11-09 13:18:08 +03:00
|
|
|
|
uint64_t dummyWritten;
|
2018-02-12 19:40:17 +03:00
|
|
|
|
if (!aWritten) {
|
|
|
|
|
aWritten = &dummyWritten;
|
|
|
|
|
}
|
2018-02-12 20:49:36 +03:00
|
|
|
|
|
|
|
|
|
// Nothing to do if aCount is 0.
|
|
|
|
|
if (aCount == 0) {
|
|
|
|
|
aDest.Truncate();
|
|
|
|
|
*aWritten = 0;
|
2018-06-18 03:30:58 +03:00
|
|
|
|
return NS_OK;
|
2018-02-12 20:49:36 +03:00
|
|
|
|
}
|
|
|
|
|
|
2018-02-12 19:40:17 +03:00
|
|
|
|
// If we have the size, we can pre-allocate the buffer.
|
|
|
|
|
if (aCount > 0) {
|
|
|
|
|
if (NS_WARN_IF(aCount >= INT32_MAX) ||
|
|
|
|
|
NS_WARN_IF(!aDest.SetLength(aCount, mozilla::fallible))) {
|
2018-02-12 20:49:36 +03:00
|
|
|
|
return NS_ERROR_OUT_OF_MEMORY;
|
2018-02-12 19:40:17 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
void* dest = aDest.BeginWriting();
|
2017-11-09 13:18:08 +03:00
|
|
|
|
nsresult rv =
|
|
|
|
|
NS_ReadInputStreamToBuffer(aInputStream, &dest, aCount, aWritten);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
if ((uint64_t)aCount > *aWritten) {
|
|
|
|
|
aDest.Truncate(*aWritten);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NS_OK;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
|
|
|
|
|
2018-02-12 19:40:17 +03:00
|
|
|
|
// If the size is unknown, BufferWriter will allocate the buffer.
|
2019-05-01 11:47:10 +03:00
|
|
|
|
void* dest = nullptr;
|
2017-11-09 13:18:08 +03:00
|
|
|
|
nsresult rv =
|
2018-02-12 20:49:36 +03:00
|
|
|
|
NS_ReadInputStreamToBuffer(aInputStream, &dest, aCount, aWritten);
|
2017-11-09 13:18:08 +03:00
|
|
|
|
MOZ_ASSERT_IF(NS_FAILED(rv), dest == nullptr);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2017-11-09 13:18:08 +03:00
|
|
|
|
if (!dest) {
|
2018-06-18 03:30:58 +03:00
|
|
|
|
MOZ_ASSERT(*aWritten == 0);
|
2018-02-12 19:40:17 +03:00
|
|
|
|
aDest.Truncate();
|
2018-06-18 03:30:58 +03:00
|
|
|
|
return NS_OK;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
aDest.Adopt(reinterpret_cast<char*>(dest), *aWritten);
|
2018-06-18 03:30:58 +03:00
|
|
|
|
return NS_OK;
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-07-15 16:39:51 +03:00
|
|
|
|
nsresult NS_NewURI(nsIURI** result, const nsACString& spec,
|
|
|
|
|
NotNull<const Encoding*> encoding,
|
|
|
|
|
nsIURI* baseURI /* = nullptr */) {
|
2017-06-18 14:37:50 +03:00
|
|
|
|
nsAutoCString charset;
|
|
|
|
|
encoding->Name(charset);
|
2019-07-15 16:39:51 +03:00
|
|
|
|
return NS_NewURI(result, spec, charset.get(), baseURI);
|
2017-06-18 14:37:50 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-07-15 16:39:51 +03:00
|
|
|
|
nsresult NS_NewURI(nsIURI** result, const nsAString& aSpec,
|
|
|
|
|
const char* charset /* = nullptr */,
|
|
|
|
|
nsIURI* baseURI /* = nullptr */) {
|
2019-03-07 20:23:35 +03:00
|
|
|
|
nsAutoCString spec;
|
|
|
|
|
if (!AppendUTF16toUTF8(aSpec, spec, mozilla::fallible)) {
|
|
|
|
|
return NS_ERROR_OUT_OF_MEMORY;
|
|
|
|
|
}
|
2019-07-15 16:39:51 +03:00
|
|
|
|
return NS_NewURI(result, spec, charset, baseURI);
|
2017-03-02 17:32:37 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-07-15 16:39:51 +03:00
|
|
|
|
nsresult NS_NewURI(nsIURI** result, const nsAString& aSpec,
|
|
|
|
|
NotNull<const Encoding*> encoding,
|
|
|
|
|
nsIURI* baseURI /* = nullptr */) {
|
2019-03-07 20:23:35 +03:00
|
|
|
|
nsAutoCString spec;
|
|
|
|
|
if (!AppendUTF16toUTF8(aSpec, spec, mozilla::fallible)) {
|
|
|
|
|
return NS_ERROR_OUT_OF_MEMORY;
|
|
|
|
|
}
|
2019-07-15 16:39:51 +03:00
|
|
|
|
return NS_NewURI(result, spec, encoding, baseURI);
|
2017-06-18 14:37:50 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-07-15 16:39:51 +03:00
|
|
|
|
nsresult NS_NewURI(nsIURI** result, const char* spec,
|
|
|
|
|
nsIURI* baseURI /* = nullptr */) {
|
|
|
|
|
return NS_NewURI(result, nsDependentCString(spec), nullptr, baseURI);
|
2017-03-02 17:32:37 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
static nsresult NewStandardURI(const nsACString& aSpec, const char* aCharset,
|
|
|
|
|
nsIURI* aBaseURI, int32_t aDefaultPort,
|
|
|
|
|
nsIURI** aURI) {
|
2019-03-19 18:11:31 +03:00
|
|
|
|
nsCOMPtr<nsIURI> base(aBaseURI);
|
|
|
|
|
return NS_MutateURI(new nsStandardURL::Mutator())
|
|
|
|
|
.Apply(NS_MutatorMethod(&nsIStandardURLMutator::Init,
|
|
|
|
|
nsIStandardURL::URLTYPE_AUTHORITY, aDefaultPort,
|
|
|
|
|
nsCString(aSpec), aCharset, base, nullptr))
|
|
|
|
|
.Finalize(aURI);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
extern MOZ_THREAD_LOCAL(uint32_t) gTlsURLRecursionCount;
|
|
|
|
|
|
|
|
|
|
template <typename T>
|
|
|
|
|
class TlsAutoIncrement {
|
|
|
|
|
public:
|
2019-05-01 11:47:10 +03:00
|
|
|
|
explicit TlsAutoIncrement(T& var) : mVar(var) {
|
2019-03-19 18:11:31 +03:00
|
|
|
|
mValue = mVar.get();
|
|
|
|
|
mVar.set(mValue + 1);
|
|
|
|
|
}
|
|
|
|
|
~TlsAutoIncrement() {
|
|
|
|
|
typename T::Type value = mVar.get();
|
|
|
|
|
MOZ_ASSERT(value == mValue + 1);
|
|
|
|
|
mVar.set(value - 1);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
typename T::Type value() { return mValue; }
|
|
|
|
|
|
|
|
|
|
private:
|
|
|
|
|
typename T::Type mValue;
|
2019-05-01 11:47:10 +03:00
|
|
|
|
T& mVar;
|
2019-03-19 18:11:31 +03:00
|
|
|
|
};
|
|
|
|
|
|
2019-05-28 17:17:04 +03:00
|
|
|
|
nsresult NS_NewURI(nsIURI** aURI, const nsACString& aSpec,
|
|
|
|
|
const char* aCharset /* = nullptr */,
|
2019-07-15 16:39:51 +03:00
|
|
|
|
nsIURI* aBaseURI /* = nullptr */) {
|
2019-03-19 18:11:31 +03:00
|
|
|
|
TlsAutoIncrement<decltype(gTlsURLRecursionCount)> inc(gTlsURLRecursionCount);
|
|
|
|
|
if (inc.value() >= MAX_RECURSION_COUNT) {
|
|
|
|
|
return NS_ERROR_MALFORMED_URI;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsAutoCString scheme;
|
|
|
|
|
nsresult rv = net_ExtractURLScheme(aSpec, scheme);
|
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
|
// then aSpec is relative
|
|
|
|
|
if (!aBaseURI) {
|
|
|
|
|
return NS_ERROR_MALFORMED_URI;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!aSpec.IsEmpty() && aSpec[0] == '#') {
|
|
|
|
|
// Looks like a reference instead of a fully-specified URI.
|
|
|
|
|
// --> initialize |uri| as a clone of |aBaseURI|, with ref appended.
|
|
|
|
|
return NS_GetURIWithNewRef(aBaseURI, aSpec, aURI);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
rv = aBaseURI->GetScheme(scheme);
|
|
|
|
|
if (NS_FAILED(rv)) return rv;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (scheme.EqualsLiteral("http") || scheme.EqualsLiteral("ws")) {
|
|
|
|
|
return NewStandardURI(aSpec, aCharset, aBaseURI, NS_HTTP_DEFAULT_PORT,
|
|
|
|
|
aURI);
|
|
|
|
|
}
|
|
|
|
|
if (scheme.EqualsLiteral("https") || scheme.EqualsLiteral("wss")) {
|
|
|
|
|
return NewStandardURI(aSpec, aCharset, aBaseURI, NS_HTTPS_DEFAULT_PORT,
|
|
|
|
|
aURI);
|
|
|
|
|
}
|
|
|
|
|
if (scheme.EqualsLiteral("ftp")) {
|
|
|
|
|
return NewStandardURI(aSpec, aCharset, aBaseURI, 21, aURI);
|
|
|
|
|
}
|
2019-05-28 16:50:43 +03:00
|
|
|
|
if (scheme.EqualsLiteral("ssh")) {
|
|
|
|
|
return NewStandardURI(aSpec, aCharset, aBaseURI, 22, aURI);
|
|
|
|
|
}
|
2019-03-19 18:11:31 +03:00
|
|
|
|
|
|
|
|
|
if (scheme.EqualsLiteral("file")) {
|
|
|
|
|
nsAutoCString buf(aSpec);
|
|
|
|
|
#if defined(XP_WIN)
|
|
|
|
|
buf.Truncate();
|
|
|
|
|
if (!net_NormalizeFileURL(aSpec, buf)) {
|
|
|
|
|
buf = aSpec;
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIURI> base(aBaseURI);
|
|
|
|
|
return NS_MutateURI(new nsStandardURL::Mutator())
|
|
|
|
|
.Apply(NS_MutatorMethod(&nsIFileURLMutator::MarkFileURL))
|
|
|
|
|
.Apply(NS_MutatorMethod(&nsIStandardURLMutator::Init,
|
|
|
|
|
nsIStandardURL::URLTYPE_NO_AUTHORITY, -1, buf,
|
|
|
|
|
aCharset, base, nullptr))
|
|
|
|
|
.Finalize(aURI);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (scheme.EqualsLiteral("data")) {
|
|
|
|
|
return nsDataHandler::CreateNewURI(aSpec, aCharset, aBaseURI, aURI);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (scheme.EqualsLiteral("moz-safe-about") ||
|
|
|
|
|
scheme.EqualsLiteral("page-icon") || scheme.EqualsLiteral("moz") ||
|
|
|
|
|
scheme.EqualsLiteral("moz-anno") ||
|
|
|
|
|
scheme.EqualsLiteral("moz-page-thumb") ||
|
|
|
|
|
scheme.EqualsLiteral("moz-fonttable")) {
|
|
|
|
|
return NS_MutateURI(new nsSimpleURI::Mutator())
|
|
|
|
|
.SetSpec(aSpec)
|
|
|
|
|
.Finalize(aURI);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (scheme.EqualsLiteral("chrome")) {
|
|
|
|
|
return nsChromeProtocolHandler::CreateNewURI(aSpec, aCharset, aBaseURI,
|
|
|
|
|
aURI);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (scheme.EqualsLiteral("javascript")) {
|
|
|
|
|
return nsJSProtocolHandler::CreateNewURI(aSpec, aCharset, aBaseURI, aURI);
|
|
|
|
|
}
|
|
|
|
|
|
2019-03-19 18:13:47 +03:00
|
|
|
|
if (scheme.EqualsLiteral("blob")) {
|
|
|
|
|
return BlobURLProtocolHandler::CreateNewURI(aSpec, aCharset, aBaseURI,
|
|
|
|
|
aURI);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-28 16:48:49 +03:00
|
|
|
|
if (scheme.EqualsLiteral("view-source")) {
|
|
|
|
|
return nsViewSourceHandler::CreateNewURI(aSpec, aCharset, aBaseURI, aURI);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-28 16:48:56 +03:00
|
|
|
|
if (scheme.EqualsLiteral("resource")) {
|
2019-05-28 16:49:05 +03:00
|
|
|
|
RefPtr<nsResProtocolHandler> handler = nsResProtocolHandler::GetSingleton();
|
2019-05-28 16:48:56 +03:00
|
|
|
|
if (!handler) {
|
|
|
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
|
|
|
}
|
|
|
|
|
return handler->NewURI(aSpec, aCharset, aBaseURI, aURI);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-28 16:49:45 +03:00
|
|
|
|
if (scheme.EqualsLiteral("indexeddb")) {
|
|
|
|
|
nsCOMPtr<nsIURI> base(aBaseURI);
|
|
|
|
|
return NS_MutateURI(new nsStandardURL::Mutator())
|
|
|
|
|
.Apply(NS_MutatorMethod(&nsIStandardURLMutator::Init,
|
|
|
|
|
nsIStandardURL::URLTYPE_AUTHORITY, 0,
|
|
|
|
|
nsCString(aSpec), aCharset, base, nullptr))
|
|
|
|
|
.Finalize(aURI);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-28 16:48:56 +03:00
|
|
|
|
if (scheme.EqualsLiteral("moz-extension")) {
|
2019-05-28 16:49:05 +03:00
|
|
|
|
RefPtr<mozilla::net::ExtensionProtocolHandler> handler =
|
|
|
|
|
mozilla::net::ExtensionProtocolHandler::GetSingleton();
|
2019-05-28 16:48:56 +03:00
|
|
|
|
if (!handler) {
|
|
|
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
|
|
|
}
|
|
|
|
|
return handler->NewURI(aSpec, aCharset, aBaseURI, aURI);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-28 16:49:17 +03:00
|
|
|
|
if (scheme.EqualsLiteral("about")) {
|
|
|
|
|
return nsAboutProtocolHandler::CreateNewURI(aSpec, aCharset, aBaseURI,
|
|
|
|
|
aURI);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-28 16:49:07 +03:00
|
|
|
|
if (scheme.EqualsLiteral("jar")) {
|
|
|
|
|
nsCOMPtr<nsIURI> base(aBaseURI);
|
|
|
|
|
return NS_MutateURI(new nsJARURI::Mutator())
|
|
|
|
|
.Apply(NS_MutatorMethod(&nsIJARURIMutator::SetSpecBaseCharset,
|
|
|
|
|
nsCString(aSpec), base, aCharset))
|
|
|
|
|
.Finalize(aURI);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-28 16:49:19 +03:00
|
|
|
|
if (scheme.EqualsLiteral("moz-icon")) {
|
|
|
|
|
return NS_MutateURI(new nsMozIconURI::Mutator())
|
|
|
|
|
.SetSpec(aSpec)
|
|
|
|
|
.Finalize(aURI);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-28 16:47:18 +03:00
|
|
|
|
#ifdef MOZ_WIDGET_GTK
|
|
|
|
|
if (scheme.EqualsLiteral("smb") || scheme.EqualsLiteral("sftp")) {
|
|
|
|
|
nsCOMPtr<nsIURI> base(aBaseURI);
|
|
|
|
|
return NS_MutateURI(new nsStandardURL::Mutator())
|
|
|
|
|
.Apply(NS_MutatorMethod(&nsIStandardURLMutator::Init,
|
|
|
|
|
nsIStandardURL::URLTYPE_STANDARD, -1,
|
|
|
|
|
nsCString(aSpec), aCharset, base, nullptr))
|
|
|
|
|
.Finalize(aURI);
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
2019-05-28 16:49:45 +03:00
|
|
|
|
if (scheme.EqualsLiteral("android")) {
|
|
|
|
|
nsCOMPtr<nsIURI> base(aBaseURI);
|
|
|
|
|
return NS_MutateURI(NS_STANDARDURLMUTATOR_CONTRACTID)
|
|
|
|
|
.Apply(NS_MutatorMethod(&nsIStandardURLMutator::Init,
|
|
|
|
|
nsIStandardURL::URLTYPE_STANDARD, -1,
|
|
|
|
|
nsCString(aSpec), aCharset, base, nullptr))
|
|
|
|
|
.Finalize(aURI);
|
|
|
|
|
}
|
|
|
|
|
|
2019-06-28 16:12:49 +03:00
|
|
|
|
if (scheme.EqualsLiteral("dweb") || scheme.EqualsLiteral("dat")) {
|
|
|
|
|
return NewStandardURI(aSpec, aCharset, aBaseURI, -1, aURI);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-31 12:53:59 +03:00
|
|
|
|
#if defined(MOZ_THUNDERBIRD) || defined(MOZ_SUITE)
|
2019-07-15 16:39:51 +03:00
|
|
|
|
rv = NS_NewMailnewsURI(aURI, aSpec, aCharset, aBaseURI);
|
2019-05-31 12:53:59 +03:00
|
|
|
|
if (rv != NS_ERROR_UNKNOWN_PROTOCOL) {
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
|
2019-05-28 16:50:00 +03:00
|
|
|
|
if (aBaseURI) {
|
|
|
|
|
nsAutoCString newSpec;
|
|
|
|
|
rv = aBaseURI->Resolve(aSpec, newSpec);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
nsAutoCString newScheme;
|
|
|
|
|
rv = net_ExtractURLScheme(newSpec, newScheme);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
// The scheme shouldn't really change at this point.
|
|
|
|
|
MOZ_DIAGNOSTIC_ASSERT(newScheme == scheme);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NS_MutateURI(new nsSimpleURI::Mutator())
|
|
|
|
|
.SetSpec(newSpec)
|
|
|
|
|
.Finalize(aURI);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-28 16:48:49 +03:00
|
|
|
|
// Falls back to external protocol handler.
|
|
|
|
|
return NS_MutateURI(new nsSimpleURI::Mutator()).SetSpec(aSpec).Finalize(aURI);
|
2019-03-19 18:11:31 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_GetSanitizedURIStringFromURI(nsIURI* aUri,
|
|
|
|
|
nsAString& aSanitizedSpec) {
|
2017-08-07 16:56:30 +03:00
|
|
|
|
aSanitizedSpec.Truncate();
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsISensitiveInfoHiddenURI> safeUri = do_QueryInterface(aUri);
|
|
|
|
|
nsAutoCString cSpec;
|
|
|
|
|
nsresult rv;
|
|
|
|
|
if (safeUri) {
|
|
|
|
|
rv = safeUri->GetSensitiveInfoHiddenSpec(cSpec);
|
|
|
|
|
} else {
|
|
|
|
|
rv = aUri->GetSpec(cSpec);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
aSanitizedSpec.Assign(NS_ConvertUTF8toUTF16(cSpec));
|
|
|
|
|
}
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2015-11-09 05:54:38 +03:00
|
|
|
|
nsresult NS_LoadPersistentPropertiesFromURISpec(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIPersistentProperties** outResult, const nsACString& aSpec) {
|
2015-11-09 05:54:38 +03:00
|
|
|
|
nsCOMPtr<nsIURI> uri;
|
|
|
|
|
nsresult rv = NS_NewURI(getter_AddRefs(uri), aSpec);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsCOMPtr<nsIChannel> channel;
|
2015-11-09 05:54:38 +03:00
|
|
|
|
rv = NS_NewChannel(getter_AddRefs(channel), uri,
|
|
|
|
|
nsContentUtils::GetSystemPrincipal(),
|
|
|
|
|
nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_DATA_IS_NULL,
|
|
|
|
|
nsIContentPolicy::TYPE_OTHER);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
nsCOMPtr<nsIInputStream> in;
|
2019-02-12 19:08:25 +03:00
|
|
|
|
rv = channel->Open(getter_AddRefs(in));
|
2015-05-20 05:48:00 +03:00
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
2018-09-15 19:58:31 +03:00
|
|
|
|
nsCOMPtr<nsIPersistentProperties> properties = new nsPersistentProperties();
|
2015-05-20 05:48:00 +03:00
|
|
|
|
rv = properties->Load(in);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
properties.swap(*outResult);
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_UsePrivateBrowsing(nsIChannel* channel) {
|
2017-05-03 05:08:14 +03:00
|
|
|
|
OriginAttributes attrs;
|
2019-04-12 08:30:43 +03:00
|
|
|
|
bool result = NS_GetOriginAttributes(channel, attrs, false);
|
2017-05-03 05:08:14 +03:00
|
|
|
|
NS_ENSURE_TRUE(result, result);
|
|
|
|
|
return attrs.mPrivateBrowsingId > 0;
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_GetOriginAttributes(nsIChannel* aChannel,
|
|
|
|
|
mozilla::OriginAttributes& aAttributes,
|
2019-04-12 08:30:43 +03:00
|
|
|
|
bool aUsingStoragePrincipal) {
|
2019-02-20 15:27:25 +03:00
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = aChannel->LoadInfo();
|
|
|
|
|
loadInfo->GetOriginAttributes(&aAttributes);
|
2015-09-03 05:46:03 +03:00
|
|
|
|
|
2017-05-03 05:08:14 +03:00
|
|
|
|
bool isPrivate = false;
|
|
|
|
|
nsCOMPtr<nsIPrivateBrowsingChannel> pbChannel = do_QueryInterface(aChannel);
|
|
|
|
|
if (pbChannel) {
|
|
|
|
|
nsresult rv = pbChannel->GetIsChannelPrivate(&isPrivate);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, false);
|
|
|
|
|
} else {
|
|
|
|
|
// Some channels may not implement nsIPrivateBrowsingChannel
|
|
|
|
|
nsCOMPtr<nsILoadContext> loadContext;
|
|
|
|
|
NS_QueryNotificationCallbacks(aChannel, loadContext);
|
|
|
|
|
isPrivate = loadContext && loadContext->UsePrivateBrowsing();
|
|
|
|
|
}
|
|
|
|
|
aAttributes.SyncAttributesWithPrivateBrowsing(isPrivate);
|
2019-04-12 08:30:43 +03:00
|
|
|
|
|
|
|
|
|
if (aUsingStoragePrincipal) {
|
|
|
|
|
StoragePrincipalHelper::PrepareOriginAttributes(aChannel, aAttributes);
|
|
|
|
|
}
|
2015-09-03 05:46:03 +03:00
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_HasBeenCrossOrigin(nsIChannel* aChannel, bool aReport) {
|
2019-02-20 15:27:25 +03:00
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = aChannel->LoadInfo();
|
2017-01-03 22:59:30 +03:00
|
|
|
|
// TYPE_DOCUMENT loads have a null LoadingPrincipal and can not be cross
|
|
|
|
|
// origin.
|
|
|
|
|
if (!loadInfo->LoadingPrincipal()) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
2015-12-07 02:33:15 +03:00
|
|
|
|
|
|
|
|
|
// Always treat tainted channels as cross-origin.
|
|
|
|
|
if (loadInfo->GetTainting() != LoadTainting::Basic) {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIPrincipal> loadingPrincipal = loadInfo->LoadingPrincipal();
|
|
|
|
|
uint32_t mode = loadInfo->GetSecurityMode();
|
|
|
|
|
bool dataInherits =
|
|
|
|
|
mode == nsILoadInfo::SEC_REQUIRE_SAME_ORIGIN_DATA_INHERITS ||
|
|
|
|
|
mode == nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_DATA_INHERITS ||
|
|
|
|
|
mode == nsILoadInfo::SEC_REQUIRE_CORS_DATA_INHERITS;
|
|
|
|
|
|
|
|
|
|
bool aboutBlankInherits = dataInherits && loadInfo->GetAboutBlankInherits();
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
for (nsIRedirectHistoryEntry* redirectHistoryEntry :
|
2017-05-25 20:42:00 +03:00
|
|
|
|
loadInfo->RedirectChain()) {
|
|
|
|
|
nsCOMPtr<nsIPrincipal> principal;
|
|
|
|
|
redirectHistoryEntry->GetPrincipal(getter_AddRefs(principal));
|
|
|
|
|
if (!principal) {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
2015-12-07 02:33:15 +03:00
|
|
|
|
nsCOMPtr<nsIURI> uri;
|
|
|
|
|
principal->GetURI(getter_AddRefs(uri));
|
|
|
|
|
if (!uri) {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (aboutBlankInherits && NS_IsAboutBlank(uri)) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (NS_FAILED(loadingPrincipal->CheckMayLoad(uri, aReport, dataInherits))) {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIURI> uri;
|
|
|
|
|
NS_GetFinalChannelURI(aChannel, getter_AddRefs(uri));
|
|
|
|
|
if (!uri) {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (aboutBlankInherits && NS_IsAboutBlank(uri)) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NS_FAILED(loadingPrincipal->CheckMayLoad(uri, aReport, dataInherits));
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_IsSafeTopLevelNav(nsIChannel* aChannel) {
|
2018-04-08 20:52:05 +03:00
|
|
|
|
if (!aChannel) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
2019-02-20 15:27:25 +03:00
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = aChannel->LoadInfo();
|
2018-04-08 20:52:05 +03:00
|
|
|
|
if (loadInfo->GetExternalContentPolicyType() !=
|
|
|
|
|
nsIContentPolicy::TYPE_DOCUMENT) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
RefPtr<HttpBaseChannel> baseChan = do_QueryObject(aChannel);
|
|
|
|
|
if (!baseChan) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsHttpRequestHead* requestHead = baseChan->GetRequestHead();
|
2018-04-08 20:52:05 +03:00
|
|
|
|
if (!requestHead) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
return requestHead->IsSafeMethod();
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_IsSameSiteForeign(nsIChannel* aChannel, nsIURI* aHostURI) {
|
2018-04-08 20:52:05 +03:00
|
|
|
|
if (!aChannel) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
2019-02-20 15:27:25 +03:00
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = aChannel->LoadInfo();
|
2018-04-19 21:00:37 +03:00
|
|
|
|
// Do not treat loads triggered by web extensions as foreign
|
|
|
|
|
nsCOMPtr<nsIURI> channelURI;
|
|
|
|
|
NS_GetFinalChannelURI(aChannel, getter_AddRefs(channelURI));
|
|
|
|
|
if (BasePrincipal::Cast(loadInfo->TriggeringPrincipal())
|
|
|
|
|
->AddonAllowsLoad(channelURI)) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2018-04-12 13:52:51 +03:00
|
|
|
|
nsCOMPtr<nsIURI> uri;
|
|
|
|
|
if (loadInfo->GetExternalContentPolicyType() ==
|
|
|
|
|
nsIContentPolicy::TYPE_DOCUMENT) {
|
|
|
|
|
// for loads of TYPE_DOCUMENT we query the hostURI from the
|
|
|
|
|
// triggeringPricnipal which returns the URI of the document that caused the
|
|
|
|
|
// navigation.
|
|
|
|
|
loadInfo->TriggeringPrincipal()->GetURI(getter_AddRefs(uri));
|
|
|
|
|
} else {
|
|
|
|
|
uri = aHostURI;
|
2018-04-08 20:52:05 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<mozIThirdPartyUtil> thirdPartyUtil =
|
|
|
|
|
do_GetService(THIRDPARTYUTIL_CONTRACTID);
|
|
|
|
|
if (!thirdPartyUtil) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2018-04-17 19:25:59 +03:00
|
|
|
|
bool isForeign = true;
|
|
|
|
|
nsresult rv = thirdPartyUtil->IsThirdPartyChannel(aChannel, uri, &isForeign);
|
2018-04-13 16:42:00 +03:00
|
|
|
|
// if we are dealing with a cross origin request, we can return here
|
|
|
|
|
// because we already know the request is 'foreign'.
|
2018-04-17 19:25:59 +03:00
|
|
|
|
if (NS_FAILED(rv) || isForeign) {
|
2018-04-13 16:42:00 +03:00
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
2018-04-17 19:25:59 +03:00
|
|
|
|
// for loads of TYPE_SUBDOCUMENT we have to perform an additional test,
|
|
|
|
|
// because a cross-origin iframe might perform a navigation to a same-origin
|
|
|
|
|
// iframe which would send same-site cookies. Hence, if the iframe navigation
|
|
|
|
|
// was triggered by a cross-origin triggeringPrincipal, we treat the load as
|
|
|
|
|
// foreign.
|
|
|
|
|
if (loadInfo->GetExternalContentPolicyType() ==
|
|
|
|
|
nsIContentPolicy::TYPE_SUBDOCUMENT) {
|
|
|
|
|
nsCOMPtr<nsIURI> triggeringPrincipalURI;
|
|
|
|
|
loadInfo->TriggeringPrincipal()->GetURI(
|
|
|
|
|
getter_AddRefs(triggeringPrincipalURI));
|
|
|
|
|
rv = thirdPartyUtil->IsThirdPartyChannel(aChannel, triggeringPrincipalURI,
|
|
|
|
|
&isForeign);
|
|
|
|
|
if (NS_FAILED(rv) || isForeign) {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2018-04-13 16:42:00 +03:00
|
|
|
|
// for the purpose of same-site cookies we have to treat any cross-origin
|
|
|
|
|
// redirects as foreign. E.g. cross-site to same-site redirect is a problem
|
|
|
|
|
// with regards to CSRF.
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIPrincipal> redirectPrincipal;
|
|
|
|
|
nsCOMPtr<nsIURI> redirectURI;
|
2019-05-01 11:47:10 +03:00
|
|
|
|
for (nsIRedirectHistoryEntry* entry : loadInfo->RedirectChain()) {
|
2018-04-13 16:42:00 +03:00
|
|
|
|
entry->GetPrincipal(getter_AddRefs(redirectPrincipal));
|
|
|
|
|
if (redirectPrincipal) {
|
|
|
|
|
redirectPrincipal->GetURI(getter_AddRefs(redirectURI));
|
2018-04-17 19:25:59 +03:00
|
|
|
|
rv = thirdPartyUtil->IsThirdPartyChannel(aChannel, redirectURI,
|
|
|
|
|
&isForeign);
|
2018-04-13 16:42:00 +03:00
|
|
|
|
// if at any point we encounter a cross-origin redirect we can return.
|
2018-04-17 19:25:59 +03:00
|
|
|
|
if (NS_FAILED(rv) || isForeign) {
|
2018-04-13 16:42:00 +03:00
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2018-04-08 20:52:05 +03:00
|
|
|
|
return isForeign;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_ShouldCheckAppCache(nsIPrincipal* aPrincipal) {
|
2017-05-03 05:47:17 +03:00
|
|
|
|
uint32_t privateBrowsingId = 0;
|
|
|
|
|
nsresult rv = aPrincipal->GetPrivateBrowsingId(&privateBrowsingId);
|
|
|
|
|
if (NS_SUCCEEDED(rv) && (privateBrowsingId > 0)) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIOfflineCacheUpdateService> offlineService =
|
|
|
|
|
do_GetService("@mozilla.org/offlinecacheupdate-service;1");
|
|
|
|
|
if (!offlineService) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool allowed;
|
2017-05-03 05:47:17 +03:00
|
|
|
|
rv = offlineService->OfflineAppAllowed(aPrincipal, nullptr, &allowed);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return NS_SUCCEEDED(rv) && allowed;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
void NS_WrapAuthPrompt(nsIAuthPrompt* aAuthPrompt,
|
|
|
|
|
nsIAuthPrompt2** aAuthPrompt2) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsCOMPtr<nsIAuthPromptAdapterFactory> factory =
|
|
|
|
|
do_GetService(NS_AUTHPROMPT_ADAPTER_FACTORY_CONTRACTID);
|
|
|
|
|
if (!factory) return;
|
|
|
|
|
|
|
|
|
|
NS_WARNING("Using deprecated nsIAuthPrompt");
|
|
|
|
|
factory->CreateAdapter(aAuthPrompt, aAuthPrompt2);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
void NS_QueryAuthPrompt2(nsIInterfaceRequestor* aCallbacks,
|
|
|
|
|
nsIAuthPrompt2** aAuthPrompt) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
CallGetInterface(aCallbacks, aAuthPrompt);
|
|
|
|
|
if (*aAuthPrompt) return;
|
|
|
|
|
|
|
|
|
|
// Maybe only nsIAuthPrompt is provided and we have to wrap it.
|
|
|
|
|
nsCOMPtr<nsIAuthPrompt> prompt(do_GetInterface(aCallbacks));
|
|
|
|
|
if (!prompt) return;
|
|
|
|
|
|
|
|
|
|
NS_WrapAuthPrompt(prompt, aAuthPrompt);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
void NS_QueryAuthPrompt2(nsIChannel* aChannel, nsIAuthPrompt2** aAuthPrompt) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
*aAuthPrompt = nullptr;
|
|
|
|
|
|
|
|
|
|
// We want to use any auth prompt we can find on the channel's callbacks,
|
|
|
|
|
// and if that fails use the loadgroup's prompt (if any)
|
|
|
|
|
// Therefore, we can't just use NS_QueryNotificationCallbacks, because
|
|
|
|
|
// that would prefer a loadgroup's nsIAuthPrompt2 over a channel's
|
|
|
|
|
// nsIAuthPrompt.
|
|
|
|
|
nsCOMPtr<nsIInterfaceRequestor> callbacks;
|
|
|
|
|
aChannel->GetNotificationCallbacks(getter_AddRefs(callbacks));
|
|
|
|
|
if (callbacks) {
|
|
|
|
|
NS_QueryAuthPrompt2(callbacks, aAuthPrompt);
|
|
|
|
|
if (*aAuthPrompt) return;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
|
|
|
|
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsCOMPtr<nsILoadGroup> group;
|
|
|
|
|
aChannel->GetLoadGroup(getter_AddRefs(group));
|
2018-07-23 14:28:47 +03:00
|
|
|
|
if (!group) return;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2015-05-20 05:48:00 +03:00
|
|
|
|
group->GetNotificationCallbacks(getter_AddRefs(callbacks));
|
|
|
|
|
if (!callbacks) return;
|
|
|
|
|
NS_QueryAuthPrompt2(callbacks, aAuthPrompt);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsresult NS_NewNotificationCallbacksAggregation(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIInterfaceRequestor* callbacks, nsILoadGroup* loadGroup,
|
|
|
|
|
nsIEventTarget* target, nsIInterfaceRequestor** result) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsCOMPtr<nsIInterfaceRequestor> cbs;
|
|
|
|
|
if (loadGroup) loadGroup->GetNotificationCallbacks(getter_AddRefs(cbs));
|
|
|
|
|
return NS_NewInterfaceRequestorAggregation(callbacks, cbs, target, result);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsresult NS_NewNotificationCallbacksAggregation(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIInterfaceRequestor* callbacks, nsILoadGroup* loadGroup,
|
|
|
|
|
nsIInterfaceRequestor** result) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return NS_NewNotificationCallbacksAggregation(callbacks, loadGroup, nullptr,
|
|
|
|
|
result);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_DoImplGetInnermostURI(nsINestedURI* nestedURI, nsIURI** result) {
|
2018-04-28 22:50:58 +03:00
|
|
|
|
MOZ_ASSERT(nestedURI, "Must have a nested URI!");
|
|
|
|
|
MOZ_ASSERT(!*result, "Must have null *result");
|
2015-05-20 05:48:00 +03:00
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIURI> inner;
|
|
|
|
|
nsresult rv = nestedURI->GetInnerURI(getter_AddRefs(inner));
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
// We may need to loop here until we reach the innermost
|
|
|
|
|
// URI.
|
|
|
|
|
nsCOMPtr<nsINestedURI> nestedInner(do_QueryInterface(inner));
|
|
|
|
|
while (nestedInner) {
|
|
|
|
|
rv = nestedInner->GetInnerURI(getter_AddRefs(inner));
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
nestedInner = do_QueryInterface(inner);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Found the innermost one if we reach here.
|
|
|
|
|
inner.swap(*result);
|
|
|
|
|
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_ImplGetInnermostURI(nsINestedURI* nestedURI, nsIURI** result) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
// Make it safe to use swap()
|
|
|
|
|
*result = nullptr;
|
|
|
|
|
|
|
|
|
|
return NS_DoImplGetInnermostURI(nestedURI, result);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
already_AddRefed<nsIURI> NS_GetInnermostURI(nsIURI* aURI) {
|
2018-04-28 22:50:58 +03:00
|
|
|
|
MOZ_ASSERT(aURI, "Must have URI");
|
2015-05-20 05:48:00 +03:00
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIURI> uri = aURI;
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsINestedURI> nestedURI(do_QueryInterface(uri));
|
|
|
|
|
if (!nestedURI) {
|
|
|
|
|
return uri.forget();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsresult rv = nestedURI->GetInnermostURI(getter_AddRefs(uri));
|
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
|
return nullptr;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return uri.forget();
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_GetFinalChannelURI(nsIChannel* channel, nsIURI** uri) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
*uri = nullptr;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2019-02-20 15:27:25 +03:00
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = channel->LoadInfo();
|
|
|
|
|
nsCOMPtr<nsIURI> resultPrincipalURI;
|
|
|
|
|
loadInfo->GetResultPrincipalURI(getter_AddRefs(resultPrincipalURI));
|
|
|
|
|
if (resultPrincipalURI) {
|
|
|
|
|
resultPrincipalURI.forget(uri);
|
|
|
|
|
return NS_OK;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2017-05-13 14:55:11 +03:00
|
|
|
|
return channel->GetOriginalURI(uri);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_URIChainHasFlags(nsIURI* uri, uint32_t flags, bool* result) {
|
2017-03-02 17:32:37 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsINetUtil> util = do_GetNetUtil(&rv);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
|
|
|
|
return util->URIChainHasFlags(uri, flags, result);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
uint32_t NS_SecurityHashURI(nsIURI* aURI) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsCOMPtr<nsIURI> baseURI = NS_GetInnermostURI(aURI);
|
|
|
|
|
|
|
|
|
|
nsAutoCString scheme;
|
|
|
|
|
uint32_t schemeHash = 0;
|
|
|
|
|
if (NS_SUCCEEDED(baseURI->GetScheme(scheme)))
|
|
|
|
|
schemeHash = mozilla::HashString(scheme);
|
|
|
|
|
|
|
|
|
|
// TODO figure out how to hash file:// URIs
|
|
|
|
|
if (scheme.EqualsLiteral("file")) return schemeHash; // sad face
|
|
|
|
|
|
2017-02-18 00:25:48 +03:00
|
|
|
|
#if IS_ORIGIN_IS_FULL_SPEC_DEFINED
|
2016-01-20 22:02:23 +03:00
|
|
|
|
bool hasFlag;
|
|
|
|
|
if (NS_FAILED(NS_URIChainHasFlags(
|
|
|
|
|
baseURI, nsIProtocolHandler::ORIGIN_IS_FULL_SPEC, &hasFlag)) ||
|
|
|
|
|
hasFlag) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsAutoCString spec;
|
|
|
|
|
uint32_t specHash;
|
|
|
|
|
nsresult res = baseURI->GetSpec(spec);
|
|
|
|
|
if (NS_SUCCEEDED(res))
|
|
|
|
|
specHash = mozilla::HashString(spec);
|
|
|
|
|
else
|
|
|
|
|
specHash = static_cast<uint32_t>(res);
|
|
|
|
|
return specHash;
|
|
|
|
|
}
|
2017-02-18 00:25:48 +03:00
|
|
|
|
#endif
|
2015-05-20 05:48:00 +03:00
|
|
|
|
|
|
|
|
|
nsAutoCString host;
|
|
|
|
|
uint32_t hostHash = 0;
|
|
|
|
|
if (NS_SUCCEEDED(baseURI->GetAsciiHost(host)))
|
|
|
|
|
hostHash = mozilla::HashString(host);
|
|
|
|
|
|
|
|
|
|
return mozilla::AddToHash(schemeHash, hostHash, NS_GetRealPort(baseURI));
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_SecurityCompareURIs(nsIURI* aSourceURI, nsIURI* aTargetURI,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
bool aStrictFileOriginPolicy) {
|
2018-07-31 11:27:00 +03:00
|
|
|
|
nsresult rv;
|
2015-05-20 05:48:00 +03:00
|
|
|
|
|
|
|
|
|
// Note that this is not an Equals() test on purpose -- for URIs that don't
|
|
|
|
|
// support host/port, we want equality to basically be object identity, for
|
|
|
|
|
// security purposes. Otherwise, for example, two javascript: URIs that
|
|
|
|
|
// are otherwise unrelated could end up "same origin", which would be
|
|
|
|
|
// unfortunate.
|
|
|
|
|
if (aSourceURI && aSourceURI == aTargetURI) {
|
2015-12-07 02:33:15 +03:00
|
|
|
|
return true;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
|
|
|
|
|
2015-05-20 05:48:00 +03:00
|
|
|
|
if (!aTargetURI || !aSourceURI) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// If either URI is a nested URI, get the base URI
|
|
|
|
|
nsCOMPtr<nsIURI> sourceBaseURI = NS_GetInnermostURI(aSourceURI);
|
|
|
|
|
nsCOMPtr<nsIURI> targetBaseURI = NS_GetInnermostURI(aTargetURI);
|
|
|
|
|
|
2018-07-31 11:27:00 +03:00
|
|
|
|
#if defined(MOZ_THUNDERBIRD) || defined(MOZ_SUITE)
|
|
|
|
|
// Check if either URI has a special origin.
|
|
|
|
|
nsCOMPtr<nsIURI> origin;
|
|
|
|
|
nsCOMPtr<nsIURIWithSpecialOrigin> uriWithSpecialOrigin =
|
|
|
|
|
do_QueryInterface(sourceBaseURI);
|
|
|
|
|
if (uriWithSpecialOrigin) {
|
|
|
|
|
rv = uriWithSpecialOrigin->GetOrigin(getter_AddRefs(origin));
|
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
MOZ_ASSERT(origin);
|
|
|
|
|
sourceBaseURI = origin;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2018-07-31 11:27:00 +03:00
|
|
|
|
uriWithSpecialOrigin = do_QueryInterface(targetBaseURI);
|
|
|
|
|
if (uriWithSpecialOrigin) {
|
|
|
|
|
rv = uriWithSpecialOrigin->GetOrigin(getter_AddRefs(origin));
|
|
|
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
MOZ_ASSERT(origin);
|
|
|
|
|
targetBaseURI = origin;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2018-07-31 11:27:00 +03:00
|
|
|
|
#endif
|
|
|
|
|
|
2018-07-24 23:15:57 +03:00
|
|
|
|
nsCOMPtr<nsIPrincipal> sourceBlobPrincipal;
|
|
|
|
|
if (BlobURLProtocolHandler::GetBlobURLPrincipal(
|
|
|
|
|
sourceBaseURI, getter_AddRefs(sourceBlobPrincipal))) {
|
|
|
|
|
nsCOMPtr<nsIURI> sourceBlobOwnerURI;
|
2018-07-31 11:27:00 +03:00
|
|
|
|
rv = sourceBlobPrincipal->GetURI(getter_AddRefs(sourceBlobOwnerURI));
|
2018-07-24 23:15:57 +03:00
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
sourceBaseURI = sourceBlobOwnerURI;
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2015-05-20 05:48:00 +03:00
|
|
|
|
|
2018-07-24 23:15:57 +03:00
|
|
|
|
nsCOMPtr<nsIPrincipal> targetBlobPrincipal;
|
|
|
|
|
if (BlobURLProtocolHandler::GetBlobURLPrincipal(
|
|
|
|
|
targetBaseURI, getter_AddRefs(targetBlobPrincipal))) {
|
|
|
|
|
nsCOMPtr<nsIURI> targetBlobOwnerURI;
|
2018-07-31 11:27:00 +03:00
|
|
|
|
rv = targetBlobPrincipal->GetURI(getter_AddRefs(targetBlobOwnerURI));
|
2018-07-24 23:15:57 +03:00
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
targetBaseURI = targetBlobOwnerURI;
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2015-05-20 05:48:00 +03:00
|
|
|
|
|
|
|
|
|
if (!sourceBaseURI || !targetBaseURI) return false;
|
|
|
|
|
|
|
|
|
|
// Compare schemes
|
|
|
|
|
nsAutoCString targetScheme;
|
|
|
|
|
bool sameScheme = false;
|
|
|
|
|
if (NS_FAILED(targetBaseURI->GetScheme(targetScheme)) ||
|
|
|
|
|
NS_FAILED(sourceBaseURI->SchemeIs(targetScheme.get(), &sameScheme)) ||
|
|
|
|
|
!sameScheme) {
|
|
|
|
|
// Not same-origin if schemes differ
|
|
|
|
|
return false;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
}
|
2015-05-20 05:48:00 +03:00
|
|
|
|
|
|
|
|
|
// For file scheme, reject unless the files are identical. See
|
|
|
|
|
// NS_RelaxStrictFileOriginPolicy for enforcing file same-origin checking
|
|
|
|
|
if (targetScheme.EqualsLiteral("file")) {
|
|
|
|
|
// in traditional unsafe behavior all files are the same origin
|
|
|
|
|
if (!aStrictFileOriginPolicy) return true;
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIFileURL> sourceFileURL(do_QueryInterface(sourceBaseURI));
|
|
|
|
|
nsCOMPtr<nsIFileURL> targetFileURL(do_QueryInterface(targetBaseURI));
|
|
|
|
|
|
|
|
|
|
if (!sourceFileURL || !targetFileURL) return false;
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIFile> sourceFile, targetFile;
|
|
|
|
|
|
|
|
|
|
sourceFileURL->GetFile(getter_AddRefs(sourceFile));
|
|
|
|
|
targetFileURL->GetFile(getter_AddRefs(targetFile));
|
|
|
|
|
|
|
|
|
|
if (!sourceFile || !targetFile) return false;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
|
2015-05-20 05:48:00 +03:00
|
|
|
|
// Otherwise they had better match
|
|
|
|
|
bool filesAreEqual = false;
|
2018-07-31 11:27:00 +03:00
|
|
|
|
rv = sourceFile->Equals(targetFile, &filesAreEqual);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return NS_SUCCEEDED(rv) && filesAreEqual;
|
|
|
|
|
}
|
|
|
|
|
|
2017-02-18 00:25:48 +03:00
|
|
|
|
#if IS_ORIGIN_IS_FULL_SPEC_DEFINED
|
2016-01-20 22:02:23 +03:00
|
|
|
|
bool hasFlag;
|
|
|
|
|
if (NS_FAILED(NS_URIChainHasFlags(
|
|
|
|
|
targetBaseURI, nsIProtocolHandler::ORIGIN_IS_FULL_SPEC, &hasFlag)) ||
|
|
|
|
|
hasFlag) {
|
|
|
|
|
// URIs with this flag have the whole spec as a distinct trust
|
|
|
|
|
// domain; use the whole spec for comparison
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsAutoCString targetSpec;
|
|
|
|
|
nsAutoCString sourceSpec;
|
|
|
|
|
return (NS_SUCCEEDED(targetBaseURI->GetSpec(targetSpec)) &&
|
|
|
|
|
NS_SUCCEEDED(sourceBaseURI->GetSpec(sourceSpec)) &&
|
|
|
|
|
targetSpec.Equals(sourceSpec));
|
|
|
|
|
}
|
2017-02-18 00:25:48 +03:00
|
|
|
|
#endif
|
2015-05-20 05:48:00 +03:00
|
|
|
|
|
|
|
|
|
// Compare hosts
|
|
|
|
|
nsAutoCString targetHost;
|
|
|
|
|
nsAutoCString sourceHost;
|
|
|
|
|
if (NS_FAILED(targetBaseURI->GetAsciiHost(targetHost)) ||
|
|
|
|
|
NS_FAILED(sourceBaseURI->GetAsciiHost(sourceHost))) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIStandardURL> targetURL(do_QueryInterface(targetBaseURI));
|
|
|
|
|
nsCOMPtr<nsIStandardURL> sourceURL(do_QueryInterface(sourceBaseURI));
|
|
|
|
|
if (!targetURL || !sourceURL) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!targetHost.Equals(sourceHost, nsCaseInsensitiveCStringComparator())) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NS_GetRealPort(targetBaseURI) == NS_GetRealPort(sourceBaseURI);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_URIIsLocalFile(nsIURI* aURI) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsCOMPtr<nsINetUtil> util = do_GetNetUtil();
|
|
|
|
|
|
|
|
|
|
bool isFile;
|
|
|
|
|
return util &&
|
|
|
|
|
NS_SUCCEEDED(util->ProtocolHasFlags(
|
|
|
|
|
aURI, nsIProtocolHandler::URI_IS_LOCAL_FILE, &isFile)) &&
|
|
|
|
|
isFile;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_RelaxStrictFileOriginPolicy(nsIURI* aTargetURI, nsIURI* aSourceURI,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
bool aAllowDirectoryTarget /* = false */) {
|
|
|
|
|
if (!NS_URIIsLocalFile(aTargetURI)) {
|
|
|
|
|
// This is probably not what the caller intended
|
2018-06-18 08:43:11 +03:00
|
|
|
|
MOZ_ASSERT_UNREACHABLE(
|
|
|
|
|
"NS_RelaxStrictFileOriginPolicy called with non-file URI");
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!NS_URIIsLocalFile(aSourceURI)) {
|
|
|
|
|
// If the source is not also a file: uri then forget it
|
|
|
|
|
// (don't want resource: principals in a file: doc)
|
|
|
|
|
//
|
|
|
|
|
// note: we're not de-nesting jar: uris here, we want to
|
|
|
|
|
// keep archive content bottled up in its own little island
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
|
|
|
// pull out the internal files
|
|
|
|
|
//
|
|
|
|
|
nsCOMPtr<nsIFileURL> targetFileURL(do_QueryInterface(aTargetURI));
|
|
|
|
|
nsCOMPtr<nsIFileURL> sourceFileURL(do_QueryInterface(aSourceURI));
|
|
|
|
|
nsCOMPtr<nsIFile> targetFile;
|
|
|
|
|
nsCOMPtr<nsIFile> sourceFile;
|
|
|
|
|
bool targetIsDir;
|
|
|
|
|
|
|
|
|
|
// Make sure targetFile is not a directory (bug 209234)
|
|
|
|
|
// and that it exists w/out unescaping (bug 395343)
|
|
|
|
|
if (!sourceFileURL || !targetFileURL ||
|
|
|
|
|
NS_FAILED(targetFileURL->GetFile(getter_AddRefs(targetFile))) ||
|
|
|
|
|
NS_FAILED(sourceFileURL->GetFile(getter_AddRefs(sourceFile))) ||
|
|
|
|
|
!targetFile || !sourceFile || NS_FAILED(targetFile->Normalize()) ||
|
|
|
|
|
#ifndef MOZ_WIDGET_ANDROID
|
|
|
|
|
NS_FAILED(sourceFile->Normalize()) ||
|
|
|
|
|
#endif
|
|
|
|
|
(!aAllowDirectoryTarget &&
|
|
|
|
|
(NS_FAILED(targetFile->IsDirectory(&targetIsDir)) || targetIsDir))) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2019-07-05 12:16:06 +03:00
|
|
|
|
if (!StaticPrefs::privacy_file_unique_origin()) {
|
|
|
|
|
//
|
|
|
|
|
// If the file to be loaded is in a subdirectory of the source
|
|
|
|
|
// (or same-dir if source is not a directory) then it will
|
|
|
|
|
// inherit its source principal and be scriptable by that source.
|
|
|
|
|
//
|
|
|
|
|
bool sourceIsDir;
|
|
|
|
|
bool allowed = false;
|
|
|
|
|
nsresult rv = sourceFile->IsDirectory(&sourceIsDir);
|
|
|
|
|
if (NS_SUCCEEDED(rv) && sourceIsDir) {
|
|
|
|
|
rv = sourceFile->Contains(targetFile, &allowed);
|
|
|
|
|
} else {
|
|
|
|
|
nsCOMPtr<nsIFile> sourceParent;
|
|
|
|
|
rv = sourceFile->GetParent(getter_AddRefs(sourceParent));
|
|
|
|
|
if (NS_SUCCEEDED(rv) && sourceParent) {
|
|
|
|
|
rv = sourceParent->Equals(targetFile, &allowed);
|
|
|
|
|
if (NS_FAILED(rv) || !allowed) {
|
|
|
|
|
rv = sourceParent->Contains(targetFile, &allowed);
|
|
|
|
|
} else {
|
|
|
|
|
MOZ_ASSERT(aAllowDirectoryTarget,
|
|
|
|
|
"sourceFile->Parent == targetFile, but targetFile "
|
|
|
|
|
"should've been disallowed if it is a directory");
|
|
|
|
|
}
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2019-07-05 12:16:06 +03:00
|
|
|
|
if (NS_SUCCEEDED(rv) && allowed) {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_IsInternalSameURIRedirect(nsIChannel* aOldChannel,
|
|
|
|
|
nsIChannel* aNewChannel, uint32_t aFlags) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
if (!(aFlags & nsIChannelEventSink::REDIRECT_INTERNAL)) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIURI> oldURI, newURI;
|
|
|
|
|
aOldChannel->GetURI(getter_AddRefs(oldURI));
|
|
|
|
|
aNewChannel->GetURI(getter_AddRefs(newURI));
|
|
|
|
|
|
|
|
|
|
if (!oldURI || !newURI) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool res;
|
|
|
|
|
return NS_SUCCEEDED(oldURI->Equals(newURI, &res)) && res;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_IsHSTSUpgradeRedirect(nsIChannel* aOldChannel, nsIChannel* aNewChannel,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
uint32_t aFlags) {
|
|
|
|
|
if (!(aFlags & nsIChannelEventSink::REDIRECT_STS_UPGRADE)) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIURI> oldURI, newURI;
|
|
|
|
|
aOldChannel->GetURI(getter_AddRefs(oldURI));
|
|
|
|
|
aNewChannel->GetURI(getter_AddRefs(newURI));
|
|
|
|
|
|
|
|
|
|
if (!oldURI || !newURI) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool isHttp;
|
|
|
|
|
if (NS_FAILED(oldURI->SchemeIs("http", &isHttp)) || !isHttp) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsIURI> upgradedURI;
|
2016-03-11 02:23:45 +03:00
|
|
|
|
nsresult rv = NS_GetSecureUpgradedURI(oldURI, getter_AddRefs(upgradedURI));
|
2016-02-18 06:03:41 +03:00
|
|
|
|
if (NS_FAILED(rv)) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool res;
|
|
|
|
|
return NS_SUCCEEDED(upgradedURI->Equals(newURI, &res)) && res;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsresult NS_LinkRedirectChannels(uint32_t channelId,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIParentChannel* parentChannel,
|
|
|
|
|
nsIChannel** _result) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsCOMPtr<nsIRedirectChannelRegistrar> registrar =
|
2018-08-22 07:37:28 +03:00
|
|
|
|
RedirectChannelRegistrar::GetOrCreate();
|
|
|
|
|
MOZ_ASSERT(registrar);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
|
|
|
|
|
return registrar->LinkChannels(channelId, parentChannel, _result);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_MaybeOpenChannelUsingOpen(nsIChannel* aChannel,
|
|
|
|
|
nsIInputStream** aStream) {
|
2019-02-20 15:27:25 +03:00
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = aChannel->LoadInfo();
|
2016-06-28 20:03:56 +03:00
|
|
|
|
return aChannel->Open(aStream);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_MaybeOpenChannelUsingAsyncOpen(nsIChannel* aChannel,
|
|
|
|
|
nsIStreamListener* aListener) {
|
2019-02-20 15:27:25 +03:00
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = aChannel->LoadInfo();
|
2019-02-12 19:08:25 +03:00
|
|
|
|
return aChannel->AsyncOpen(aListener);
|
2016-06-28 20:03:56 +03:00
|
|
|
|
}
|
|
|
|
|
|
2015-05-20 05:48:00 +03:00
|
|
|
|
/** Given the first (disposition) token from a Content-Disposition header,
|
|
|
|
|
* tell whether it indicates the content is inline or attachment
|
|
|
|
|
* @param aDispToken the disposition token from the content-disposition header
|
|
|
|
|
*/
|
2019-05-01 11:47:10 +03:00
|
|
|
|
uint32_t NS_GetContentDispositionFromToken(const nsAString& aDispToken) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
// RFC 2183, section 2.8 says that an unknown disposition
|
|
|
|
|
// value should be treated as "attachment"
|
|
|
|
|
// If all of these tests eval to false, then we have a content-disposition of
|
|
|
|
|
// "attachment" or unknown
|
|
|
|
|
if (aDispToken.IsEmpty() || aDispToken.LowerCaseEqualsLiteral("inline") ||
|
|
|
|
|
// Broken sites just send
|
|
|
|
|
// Content-Disposition: filename="file"
|
|
|
|
|
// without a disposition token... screen those out.
|
|
|
|
|
StringHead(aDispToken, 8).LowerCaseEqualsLiteral("filename"))
|
|
|
|
|
return nsIChannel::DISPOSITION_INLINE;
|
|
|
|
|
|
|
|
|
|
return nsIChannel::DISPOSITION_ATTACHMENT;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
uint32_t NS_GetContentDispositionFromHeader(const nsACString& aHeader,
|
|
|
|
|
nsIChannel* aChan /* = nullptr */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIMIMEHeaderParam> mimehdrpar =
|
|
|
|
|
do_GetService(NS_MIMEHEADERPARAM_CONTRACTID, &rv);
|
|
|
|
|
if (NS_FAILED(rv)) return nsIChannel::DISPOSITION_ATTACHMENT;
|
|
|
|
|
|
|
|
|
|
nsAutoString dispToken;
|
2017-08-02 14:43:30 +03:00
|
|
|
|
rv = mimehdrpar->GetParameterHTTP(aHeader, "", EmptyCString(), true, nullptr,
|
2015-05-20 05:48:00 +03:00
|
|
|
|
dispToken);
|
|
|
|
|
|
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
|
// special case (see bug 272541): empty disposition type handled as "inline"
|
|
|
|
|
if (rv == NS_ERROR_FIRST_HEADER_FIELD_COMPONENT_EMPTY)
|
|
|
|
|
return nsIChannel::DISPOSITION_INLINE;
|
|
|
|
|
return nsIChannel::DISPOSITION_ATTACHMENT;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NS_GetContentDispositionFromToken(dispToken);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_GetFilenameFromDisposition(nsAString& aFilename,
|
|
|
|
|
const nsACString& aDisposition,
|
|
|
|
|
nsIURI* aURI /* = nullptr */) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
aFilename.Truncate();
|
|
|
|
|
|
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsIMIMEHeaderParam> mimehdrpar =
|
|
|
|
|
do_GetService(NS_MIMEHEADERPARAM_CONTRACTID, &rv);
|
|
|
|
|
if (NS_FAILED(rv)) return rv;
|
|
|
|
|
|
|
|
|
|
// Get the value of 'filename' parameter
|
|
|
|
|
rv = mimehdrpar->GetParameterHTTP(aDisposition, "filename", EmptyCString(),
|
2017-08-02 14:43:30 +03:00
|
|
|
|
true, nullptr, aFilename);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
|
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
|
aFilename.Truncate();
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (aFilename.IsEmpty()) return NS_ERROR_NOT_AVAILABLE;
|
|
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void net_EnsurePSMInit() {
|
2016-10-25 17:43:00 +03:00
|
|
|
|
nsresult rv;
|
|
|
|
|
nsCOMPtr<nsISupports> psm = do_GetService(PSM_COMPONENT_CONTRACTID, &rv);
|
2016-11-08 02:13:00 +03:00
|
|
|
|
MOZ_ASSERT(NS_SUCCEEDED(rv));
|
2017-12-20 05:08:15 +03:00
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsISupports> sss = do_GetService(NS_SSSERVICE_CONTRACTID);
|
2019-05-03 02:02:13 +03:00
|
|
|
|
#ifdef MOZ_NEW_CERT_STORAGE
|
2019-03-20 20:00:47 +03:00
|
|
|
|
nsCOMPtr<nsISupports> cbl = do_GetService(NS_CERTSTORAGE_CONTRACTID);
|
2019-05-03 02:02:13 +03:00
|
|
|
|
#else
|
|
|
|
|
nsCOMPtr<nsISupports> cbl = do_GetService(NS_CERTBLOCKLIST_CONTRACTID);
|
|
|
|
|
#endif
|
2017-12-20 05:08:15 +03:00
|
|
|
|
nsCOMPtr<nsISupports> cos = do_GetService(NS_CERTOVERRIDE_CONTRACTID);
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_IsAboutBlank(nsIURI* uri) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
// GetSpec can be expensive for some URIs, so check the scheme first.
|
|
|
|
|
bool isAbout = false;
|
|
|
|
|
if (NS_FAILED(uri->SchemeIs("about", &isAbout)) || !isAbout) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2016-08-26 09:02:32 +03:00
|
|
|
|
return uri->GetSpecOrDefault().EqualsLiteral("about:blank");
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_GenerateHostPort(const nsCString& host, int32_t port,
|
|
|
|
|
nsACString& hostLine) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
if (strchr(host.get(), ':')) {
|
|
|
|
|
// host is an IPv6 address literal and must be encapsulated in []'s
|
|
|
|
|
hostLine.Assign('[');
|
|
|
|
|
// scope id is not needed for Host header.
|
|
|
|
|
int scopeIdPos = host.FindChar('%');
|
|
|
|
|
if (scopeIdPos == -1)
|
|
|
|
|
hostLine.Append(host);
|
|
|
|
|
else if (scopeIdPos > 0)
|
|
|
|
|
hostLine.Append(Substring(host, 0, scopeIdPos));
|
|
|
|
|
else
|
|
|
|
|
return NS_ERROR_MALFORMED_URI;
|
|
|
|
|
hostLine.Append(']');
|
2018-11-30 13:46:48 +03:00
|
|
|
|
} else
|
2015-05-20 05:48:00 +03:00
|
|
|
|
hostLine.Assign(host);
|
|
|
|
|
if (port != -1) {
|
|
|
|
|
hostLine.Append(':');
|
|
|
|
|
hostLine.AppendInt(port);
|
|
|
|
|
}
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
void NS_SniffContent(const char* aSnifferType, nsIRequest* aRequest,
|
|
|
|
|
const uint8_t* aData, uint32_t aLength,
|
|
|
|
|
nsACString& aSniffedType) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
typedef nsCategoryCache<nsIContentSniffer> ContentSnifferCache;
|
2019-05-01 11:47:10 +03:00
|
|
|
|
extern ContentSnifferCache* gNetSniffers;
|
|
|
|
|
extern ContentSnifferCache* gDataSniffers;
|
|
|
|
|
ContentSnifferCache* cache = nullptr;
|
2015-05-20 05:48:00 +03:00
|
|
|
|
if (!strcmp(aSnifferType, NS_CONTENT_SNIFFER_CATEGORY)) {
|
|
|
|
|
if (!gNetSniffers) {
|
|
|
|
|
gNetSniffers = new ContentSnifferCache(NS_CONTENT_SNIFFER_CATEGORY);
|
|
|
|
|
}
|
|
|
|
|
cache = gNetSniffers;
|
|
|
|
|
} else if (!strcmp(aSnifferType, NS_DATA_SNIFFER_CATEGORY)) {
|
|
|
|
|
if (!gDataSniffers) {
|
|
|
|
|
gDataSniffers = new ContentSnifferCache(NS_DATA_SNIFFER_CATEGORY);
|
|
|
|
|
}
|
|
|
|
|
cache = gDataSniffers;
|
|
|
|
|
} else {
|
|
|
|
|
// Invalid content sniffer type was requested
|
|
|
|
|
MOZ_ASSERT(false);
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsCOMArray<nsIContentSniffer> sniffers;
|
|
|
|
|
cache->GetEntries(sniffers);
|
|
|
|
|
for (int32_t i = 0; i < sniffers.Count(); ++i) {
|
|
|
|
|
nsresult rv = sniffers[i]->GetMIMETypeFromContent(aRequest, aData, aLength,
|
|
|
|
|
aSniffedType);
|
|
|
|
|
if (NS_SUCCEEDED(rv) && !aSniffedType.IsEmpty()) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
aSniffedType.Truncate();
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_IsSrcdocChannel(nsIChannel* aChannel) {
|
2015-05-20 05:48:00 +03:00
|
|
|
|
bool isSrcdoc;
|
|
|
|
|
nsCOMPtr<nsIInputStreamChannel> isr = do_QueryInterface(aChannel);
|
|
|
|
|
if (isr) {
|
|
|
|
|
isr->GetIsSrcdocChannel(&isSrcdoc);
|
|
|
|
|
return isSrcdoc;
|
|
|
|
|
}
|
|
|
|
|
nsCOMPtr<nsIViewSourceChannel> vsc = do_QueryInterface(aChannel);
|
|
|
|
|
if (vsc) {
|
2016-11-23 12:21:17 +03:00
|
|
|
|
nsresult rv = vsc->GetIsSrcdocChannel(&isSrcdoc);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
|
|
|
return isSrcdoc;
|
|
|
|
|
}
|
2015-05-20 05:48:00 +03:00
|
|
|
|
}
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2019-03-18 18:48:21 +03:00
|
|
|
|
nsresult NS_ShouldSecureUpgrade(
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIURI* aURI, nsILoadInfo* aLoadInfo, nsIPrincipal* aChannelResultPrincipal,
|
2019-03-18 18:48:21 +03:00
|
|
|
|
bool aPrivateBrowsing, bool aAllowSTS,
|
2019-05-01 11:47:10 +03:00
|
|
|
|
const OriginAttributes& aOriginAttributes, bool& aShouldUpgrade,
|
|
|
|
|
std::function<void(bool, nsresult)>&& aResultCallback,
|
|
|
|
|
bool& aWillCallback) {
|
2019-03-18 18:48:21 +03:00
|
|
|
|
aWillCallback = false;
|
|
|
|
|
|
2015-11-02 19:27:00 +03:00
|
|
|
|
// Even if we're in private browsing mode, we still enforce existing STS
|
|
|
|
|
// data (it is read-only).
|
|
|
|
|
// if the connection is not using SSL and either the exact host matches or
|
|
|
|
|
// a superdomain wants to force HTTPS, do it.
|
|
|
|
|
bool isHttps = false;
|
|
|
|
|
nsresult rv = aURI->SchemeIs("https", &isHttps);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
2018-10-31 19:04:58 +03:00
|
|
|
|
if (!isHttps &&
|
|
|
|
|
!nsMixedContentBlocker::IsPotentiallyTrustworthyLoopbackURL(aURI)) {
|
2015-11-02 19:27:00 +03:00
|
|
|
|
if (aLoadInfo) {
|
2017-08-21 09:57:14 +03:00
|
|
|
|
// If any of the documents up the chain to the root document makes use of
|
|
|
|
|
// the CSP directive 'upgrade-insecure-requests', then it's time to
|
|
|
|
|
// fulfill the promise to CSP and mixed content blocking to upgrade the
|
|
|
|
|
// channel from http to https.
|
2018-02-05 18:37:27 +03:00
|
|
|
|
if (aLoadInfo->GetUpgradeInsecureRequests() ||
|
|
|
|
|
aLoadInfo->GetBrowserUpgradeInsecureRequests()) {
|
2015-11-02 19:27:00 +03:00
|
|
|
|
// let's log a message to the console that we are upgrading a request
|
2016-08-26 09:02:31 +03:00
|
|
|
|
nsAutoCString scheme;
|
2015-11-02 19:27:00 +03:00
|
|
|
|
aURI->GetScheme(scheme);
|
|
|
|
|
// append the additional 's' for security to the scheme :-)
|
2018-09-08 01:12:04 +03:00
|
|
|
|
scheme.AppendLiteral("s");
|
2016-08-26 09:02:31 +03:00
|
|
|
|
NS_ConvertUTF8toUTF16 reportSpec(aURI->GetSpecOrDefault());
|
2015-11-02 19:27:00 +03:00
|
|
|
|
NS_ConvertUTF8toUTF16 reportScheme(scheme);
|
|
|
|
|
|
2018-02-05 18:37:27 +03:00
|
|
|
|
if (aLoadInfo->GetUpgradeInsecureRequests()) {
|
2019-06-11 18:51:51 +03:00
|
|
|
|
AutoTArray<nsString, 2> params = {reportSpec, reportScheme};
|
2018-02-05 18:37:27 +03:00
|
|
|
|
uint32_t innerWindowId = aLoadInfo->GetInnerWindowID();
|
|
|
|
|
CSP_LogLocalizedStr(
|
2019-06-11 18:51:51 +03:00
|
|
|
|
"upgradeInsecureRequest", params,
|
2018-02-05 18:37:27 +03:00
|
|
|
|
EmptyString(), // aSourceFile
|
|
|
|
|
EmptyString(), // aScriptSample
|
|
|
|
|
0, // aLineNumber
|
|
|
|
|
0, // aColumnNumber
|
2018-07-20 20:57:21 +03:00
|
|
|
|
nsIScriptError::warningFlag,
|
|
|
|
|
NS_LITERAL_CSTRING("upgradeInsecureRequest"), innerWindowId,
|
2018-03-13 08:40:38 +03:00
|
|
|
|
!!aLoadInfo->GetOriginAttributes().mPrivateBrowsingId);
|
2018-02-05 18:37:27 +03:00
|
|
|
|
Telemetry::AccumulateCategorical(
|
|
|
|
|
Telemetry::LABELS_HTTP_SCHEME_UPGRADE_TYPE::CSP);
|
|
|
|
|
} else {
|
2019-01-02 16:05:23 +03:00
|
|
|
|
RefPtr<dom::Document> doc;
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsINode* node = aLoadInfo->LoadingNode();
|
2018-02-05 18:37:27 +03:00
|
|
|
|
if (node) {
|
|
|
|
|
doc = node->OwnerDoc();
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsAutoString brandName;
|
|
|
|
|
nsresult rv = nsContentUtils::GetLocalizedString(
|
|
|
|
|
nsContentUtils::eBRAND_PROPERTIES, "brandShortName", brandName);
|
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
2019-06-09 00:26:12 +03:00
|
|
|
|
AutoTArray<nsString, 3> params = {brandName, reportSpec,
|
|
|
|
|
reportScheme};
|
2018-02-05 18:37:27 +03:00
|
|
|
|
nsContentUtils::ReportToConsole(
|
|
|
|
|
nsIScriptError::warningFlag,
|
|
|
|
|
NS_LITERAL_CSTRING("DATA_URI_BLOCKED"), doc,
|
|
|
|
|
nsContentUtils::eSECURITY_PROPERTIES,
|
2019-06-09 00:26:12 +03:00
|
|
|
|
"BrowserUpgradeInsecureDisplayRequest", params);
|
2018-02-05 18:37:27 +03:00
|
|
|
|
}
|
|
|
|
|
Telemetry::AccumulateCategorical(
|
|
|
|
|
Telemetry::LABELS_HTTP_SCHEME_UPGRADE_TYPE::BrowserDisplay);
|
|
|
|
|
}
|
|
|
|
|
|
2015-11-02 19:27:00 +03:00
|
|
|
|
aShouldUpgrade = true;
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// enforce Strict-Transport-Security
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsISiteSecurityService* sss = gHttpHandler->GetSSService();
|
2015-11-02 19:27:00 +03:00
|
|
|
|
NS_ENSURE_TRUE(sss, NS_ERROR_OUT_OF_MEMORY);
|
|
|
|
|
|
|
|
|
|
bool isStsHost = false;
|
2017-05-24 01:31:37 +03:00
|
|
|
|
uint32_t hstsSource = 0;
|
2015-11-02 19:27:00 +03:00
|
|
|
|
uint32_t flags =
|
|
|
|
|
aPrivateBrowsing ? nsISocketProvider::NO_PERMANENT_STORAGE : 0;
|
2019-03-18 18:48:21 +03:00
|
|
|
|
|
|
|
|
|
auto handleResultFunc = [aAllowSTS](bool aIsStsHost, uint32_t aHstsSource) {
|
|
|
|
|
if (aIsStsHost) {
|
|
|
|
|
LOG(("nsHttpChannel::Connect() STS permissions found\n"));
|
|
|
|
|
if (aAllowSTS) {
|
|
|
|
|
Telemetry::AccumulateCategorical(
|
|
|
|
|
Telemetry::LABELS_HTTP_SCHEME_UPGRADE_TYPE::STS);
|
|
|
|
|
switch (aHstsSource) {
|
|
|
|
|
case nsISiteSecurityService::SOURCE_PRELOAD_LIST:
|
|
|
|
|
Telemetry::Accumulate(Telemetry::HSTS_UPGRADE_SOURCE, 0);
|
|
|
|
|
break;
|
|
|
|
|
case nsISiteSecurityService::SOURCE_ORGANIC_REQUEST:
|
|
|
|
|
Telemetry::Accumulate(Telemetry::HSTS_UPGRADE_SOURCE, 1);
|
|
|
|
|
break;
|
|
|
|
|
case nsISiteSecurityService::SOURCE_UNKNOWN:
|
|
|
|
|
default:
|
|
|
|
|
// record this as an organic request
|
|
|
|
|
Telemetry::Accumulate(Telemetry::HSTS_UPGRADE_SOURCE, 1);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
Telemetry::AccumulateCategorical(
|
|
|
|
|
Telemetry::LABELS_HTTP_SCHEME_UPGRADE_TYPE::PrefBlockedSTS);
|
|
|
|
|
} else {
|
|
|
|
|
Telemetry::AccumulateCategorical(
|
|
|
|
|
Telemetry::LABELS_HTTP_SCHEME_UPGRADE_TYPE::NoReasonToUpgrade);
|
|
|
|
|
}
|
|
|
|
|
return false;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
// Calling |IsSecureURI| before the storage is ready to read will
|
|
|
|
|
// block the main thread. Once the storage is ready, we can call it
|
|
|
|
|
// from main thread.
|
|
|
|
|
static Atomic<bool, Relaxed> storageReady(false);
|
|
|
|
|
if (!storageReady && gSocketTransportService && aResultCallback) {
|
|
|
|
|
nsCOMPtr<nsIURI> uri = aURI;
|
|
|
|
|
nsCOMPtr<nsISiteSecurityService> service = sss;
|
|
|
|
|
rv = gSocketTransportService->Dispatch(
|
|
|
|
|
NS_NewRunnableFunction(
|
|
|
|
|
"net::NS_ShouldSecureUpgrade",
|
|
|
|
|
[service{std::move(service)}, uri{std::move(uri)}, flags(flags),
|
|
|
|
|
originAttributes(aOriginAttributes),
|
|
|
|
|
handleResultFunc{std::move(handleResultFunc)},
|
2019-03-28 18:03:46 +03:00
|
|
|
|
resultCallback{std::move(aResultCallback)}]() mutable {
|
2019-03-18 18:48:21 +03:00
|
|
|
|
uint32_t hstsSource = 0;
|
|
|
|
|
bool isStsHost = false;
|
|
|
|
|
nsresult rv = service->IsSecureURI(
|
|
|
|
|
nsISiteSecurityService::HEADER_HSTS, uri, flags,
|
|
|
|
|
originAttributes, nullptr, &hstsSource, &isStsHost);
|
|
|
|
|
|
|
|
|
|
// Successfully get the result from |IsSecureURI| implies that
|
|
|
|
|
// the storage is ready to read.
|
|
|
|
|
storageReady = NS_SUCCEEDED(rv);
|
|
|
|
|
bool shouldUpgrade = handleResultFunc(isStsHost, hstsSource);
|
|
|
|
|
|
|
|
|
|
NS_DispatchToMainThread(NS_NewRunnableFunction(
|
|
|
|
|
"net::NS_ShouldSecureUpgrade::ResultCallback",
|
|
|
|
|
[rv, shouldUpgrade,
|
|
|
|
|
resultCallback{std::move(resultCallback)}]() {
|
|
|
|
|
resultCallback(shouldUpgrade, rv);
|
|
|
|
|
}));
|
|
|
|
|
}),
|
|
|
|
|
NS_DISPATCH_NORMAL);
|
|
|
|
|
aWillCallback = NS_SUCCEEDED(rv);
|
|
|
|
|
return rv;
|
|
|
|
|
}
|
|
|
|
|
|
2015-11-02 19:27:00 +03:00
|
|
|
|
rv = sss->IsSecureURI(nsISiteSecurityService::HEADER_HSTS, aURI, flags,
|
2017-05-24 01:31:37 +03:00
|
|
|
|
aOriginAttributes, nullptr, &hstsSource, &isStsHost);
|
2015-11-02 19:27:00 +03:00
|
|
|
|
|
|
|
|
|
// if the SSS check fails, it's likely because this load is on a
|
|
|
|
|
// malformed URI or something else in the setup is wrong, so any error
|
|
|
|
|
// should be reported.
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
|
|
2019-03-18 18:48:21 +03:00
|
|
|
|
aShouldUpgrade = handleResultFunc(isStsHost, hstsSource);
|
|
|
|
|
return NS_OK;
|
2015-11-02 19:27:00 +03:00
|
|
|
|
}
|
2019-03-18 18:48:21 +03:00
|
|
|
|
|
|
|
|
|
Telemetry::AccumulateCategorical(
|
|
|
|
|
Telemetry::LABELS_HTTP_SCHEME_UPGRADE_TYPE::AlreadyHTTPS);
|
2015-11-02 19:27:00 +03:00
|
|
|
|
aShouldUpgrade = false;
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_GetSecureUpgradedURI(nsIURI* aURI, nsIURI** aUpgradedURI) {
|
2018-01-24 22:33:02 +03:00
|
|
|
|
NS_MutateURI mutator(aURI);
|
|
|
|
|
mutator.SetScheme(
|
|
|
|
|
NS_LITERAL_CSTRING("https")); // Change the scheme to HTTPS:
|
2016-03-11 02:23:45 +03:00
|
|
|
|
|
|
|
|
|
// Change the default port to 443:
|
2018-01-24 22:33:02 +03:00
|
|
|
|
nsCOMPtr<nsIStandardURL> stdURL = do_QueryInterface(aURI);
|
|
|
|
|
if (stdURL) {
|
2018-02-21 03:00:54 +03:00
|
|
|
|
mutator.Apply(
|
|
|
|
|
NS_MutatorMethod(&nsIStandardURLMutator::SetDefaultPort, 443, nullptr));
|
2016-03-11 02:23:45 +03:00
|
|
|
|
} else {
|
|
|
|
|
// If we don't have a nsStandardURL, fall back to using GetPort/SetPort.
|
|
|
|
|
// XXXdholbert Is this function even called with a non-nsStandardURL arg,
|
|
|
|
|
// in practice?
|
2018-01-24 22:33:02 +03:00
|
|
|
|
NS_WARNING("Calling NS_GetSecureUpgradedURI for non nsStandardURL");
|
2016-03-11 02:23:45 +03:00
|
|
|
|
int32_t oldPort = -1;
|
2018-01-24 22:33:02 +03:00
|
|
|
|
nsresult rv = aURI->GetPort(&oldPort);
|
2016-03-11 02:23:45 +03:00
|
|
|
|
if (NS_FAILED(rv)) return rv;
|
|
|
|
|
|
|
|
|
|
// Keep any nonstandard ports so only the scheme is changed.
|
|
|
|
|
// For example:
|
|
|
|
|
// http://foo.com:80 -> https://foo.com:443
|
|
|
|
|
// http://foo.com:81 -> https://foo.com:81
|
|
|
|
|
|
|
|
|
|
if (oldPort == 80 || oldPort == -1) {
|
2018-01-24 22:33:02 +03:00
|
|
|
|
mutator.SetPort(-1);
|
2016-03-11 02:23:45 +03:00
|
|
|
|
} else {
|
2018-01-24 22:33:02 +03:00
|
|
|
|
mutator.SetPort(oldPort);
|
2016-03-11 02:23:45 +03:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2018-01-24 22:33:02 +03:00
|
|
|
|
return mutator.Finalize(aUpgradedURI);
|
2016-03-11 02:23:45 +03:00
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult NS_CompareLoadInfoAndLoadContext(nsIChannel* aChannel) {
|
2019-02-20 15:27:25 +03:00
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = aChannel->LoadInfo();
|
2016-04-13 11:23:26 +03:00
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsILoadContext> loadContext;
|
|
|
|
|
NS_QueryNotificationCallbacks(aChannel, loadContext);
|
2019-02-20 15:27:25 +03:00
|
|
|
|
if (!loadContext) {
|
2016-07-28 09:44:22 +03:00
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
2016-04-13 11:23:26 +03:00
|
|
|
|
|
2017-05-17 18:39:22 +03:00
|
|
|
|
// We try to skip about:newtab.
|
2016-07-28 09:44:22 +03:00
|
|
|
|
// about:newtab will use SystemPrincipal to download thumbnails through
|
|
|
|
|
// https:// and blob URLs.
|
|
|
|
|
bool isAboutPage = false;
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsINode* node = loadInfo->LoadingNode();
|
2016-07-28 09:44:22 +03:00
|
|
|
|
if (node) {
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsIURI* uri = node->OwnerDoc()->GetDocumentURI();
|
2019-01-02 16:05:23 +03:00
|
|
|
|
nsresult rv = uri->SchemeIs("about", &isAboutPage);
|
|
|
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
2016-07-28 09:44:22 +03:00
|
|
|
|
}
|
2016-04-13 11:23:26 +03:00
|
|
|
|
|
2016-07-28 09:44:22 +03:00
|
|
|
|
if (isAboutPage) {
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
2016-04-13 11:23:26 +03:00
|
|
|
|
|
2016-10-13 10:43:59 +03:00
|
|
|
|
// We skip the favicon loading here. The favicon loading might be
|
|
|
|
|
// triggered by the XUL image. For that case, the loadContext will have
|
|
|
|
|
// default originAttributes since the XUL image uses SystemPrincipal, but
|
|
|
|
|
// the loadInfo will use originAttributes from the content. Thus, the
|
|
|
|
|
// originAttributes between loadInfo and loadContext will be different.
|
|
|
|
|
// That's why we have to skip the comparison for the favicon loading.
|
|
|
|
|
if (nsContentUtils::IsSystemPrincipal(loadInfo->LoadingPrincipal()) &&
|
|
|
|
|
loadInfo->InternalContentPolicyType() ==
|
|
|
|
|
nsIContentPolicy::TYPE_INTERNAL_IMAGE_FAVICON) {
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
|
2016-07-28 09:44:22 +03:00
|
|
|
|
bool loadContextIsInBE = false;
|
2016-10-15 04:46:26 +03:00
|
|
|
|
nsresult rv =
|
|
|
|
|
loadContext->GetIsInIsolatedMozBrowserElement(&loadContextIsInBE);
|
2016-07-28 09:44:22 +03:00
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
|
return NS_ERROR_UNEXPECTED;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OriginAttributes originAttrsLoadInfo = loadInfo->GetOriginAttributes();
|
2017-01-12 19:38:48 +03:00
|
|
|
|
OriginAttributes originAttrsLoadContext;
|
2016-07-28 09:44:22 +03:00
|
|
|
|
loadContext->GetOriginAttributes(originAttrsLoadContext);
|
|
|
|
|
|
2016-11-20 00:53:32 +03:00
|
|
|
|
LOG(
|
|
|
|
|
("NS_CompareLoadInfoAndLoadContext - loadInfo: %d, %d, %d; "
|
2016-10-15 04:46:26 +03:00
|
|
|
|
"loadContext: %d %d, %d. [channel=%p]",
|
2016-11-20 00:53:32 +03:00
|
|
|
|
originAttrsLoadInfo.mInIsolatedMozBrowser,
|
|
|
|
|
originAttrsLoadInfo.mUserContextId,
|
|
|
|
|
originAttrsLoadInfo.mPrivateBrowsingId, loadContextIsInBE,
|
2016-08-04 09:05:38 +03:00
|
|
|
|
originAttrsLoadContext.mUserContextId,
|
|
|
|
|
originAttrsLoadContext.mPrivateBrowsingId, aChannel));
|
2016-07-28 09:44:22 +03:00
|
|
|
|
|
|
|
|
|
MOZ_ASSERT(originAttrsLoadInfo.mInIsolatedMozBrowser == loadContextIsInBE,
|
|
|
|
|
"The value of InIsolatedMozBrowser in the loadContext and in "
|
|
|
|
|
"the loadInfo are not the same!");
|
|
|
|
|
|
|
|
|
|
MOZ_ASSERT(originAttrsLoadInfo.mUserContextId ==
|
|
|
|
|
originAttrsLoadContext.mUserContextId,
|
|
|
|
|
"The value of mUserContextId in the loadContext and in the "
|
|
|
|
|
"loadInfo are not the same!");
|
|
|
|
|
|
2016-08-04 09:05:38 +03:00
|
|
|
|
MOZ_ASSERT(originAttrsLoadInfo.mPrivateBrowsingId ==
|
|
|
|
|
originAttrsLoadContext.mPrivateBrowsingId,
|
|
|
|
|
"The value of mPrivateBrowsingId in the loadContext and in the "
|
|
|
|
|
"loadInfo are not the same!");
|
|
|
|
|
|
2016-04-13 11:23:26 +03:00
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-06 10:22:18 +03:00
|
|
|
|
nsresult NS_SetRequestBlockingReason(nsIChannel* channel, uint32_t reason) {
|
2019-04-26 13:59:41 +03:00
|
|
|
|
NS_ENSURE_ARG(channel);
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = channel->LoadInfo();
|
|
|
|
|
return NS_SetRequestBlockingReason(loadInfo, reason);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-06 10:22:18 +03:00
|
|
|
|
nsresult NS_SetRequestBlockingReason(nsILoadInfo* loadInfo, uint32_t reason) {
|
2019-04-26 13:59:41 +03:00
|
|
|
|
NS_ENSURE_ARG(loadInfo);
|
|
|
|
|
|
|
|
|
|
return loadInfo->SetRequestBlockingReason(reason);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-06 10:22:18 +03:00
|
|
|
|
nsresult NS_SetRequestBlockingReasonIfNull(nsILoadInfo* loadInfo,
|
2019-04-26 13:59:41 +03:00
|
|
|
|
uint32_t reason) {
|
|
|
|
|
NS_ENSURE_ARG(loadInfo);
|
|
|
|
|
|
|
|
|
|
uint32_t existingReason;
|
|
|
|
|
if (NS_SUCCEEDED(loadInfo->GetRequestBlockingReason(&existingReason)) &&
|
|
|
|
|
existingReason != nsILoadInfo::BLOCKING_REASON_NONE) {
|
|
|
|
|
return NS_OK;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return loadInfo->SetRequestBlockingReason(reason);
|
|
|
|
|
}
|
|
|
|
|
|
2017-03-02 17:32:37 +03:00
|
|
|
|
bool NS_IsOffline() {
|
|
|
|
|
bool offline = true;
|
|
|
|
|
bool connectivity = true;
|
|
|
|
|
nsCOMPtr<nsIIOService> ios = do_GetIOService();
|
|
|
|
|
if (ios) {
|
|
|
|
|
ios->GetOffline(&offline);
|
|
|
|
|
ios->GetConnectivity(&connectivity);
|
|
|
|
|
}
|
|
|
|
|
return offline || !connectivity;
|
|
|
|
|
}
|
|
|
|
|
|
2019-03-25 15:47:29 +03:00
|
|
|
|
/**
|
|
|
|
|
* This function returns true if this channel should be classified by
|
|
|
|
|
* the URL Classifier, false otherwise.
|
|
|
|
|
*
|
|
|
|
|
* The idea of the algorithm to determine if a channel should be
|
|
|
|
|
* classified is based on:
|
|
|
|
|
* 1. Channels created by non-privileged code should be classified.
|
|
|
|
|
* 2. Top-level document’s channels, if loaded by privileged code
|
|
|
|
|
* (system principal), should be classified.
|
|
|
|
|
* 3. Any other channel, created by privileged code, is considered safe.
|
|
|
|
|
*
|
|
|
|
|
* A bad/hacked/corrupted safebrowsing database, plus a mistakenly
|
|
|
|
|
* classified critical channel (this may result from a bug in the exemption
|
|
|
|
|
* rules or incorrect information being passed into) can cause serious
|
|
|
|
|
* problems. For example, if the updater channel is classified and blocked
|
|
|
|
|
* by the Safe Browsing, Firefox can't update itself, and there is no way to
|
|
|
|
|
* recover from that.
|
|
|
|
|
*
|
|
|
|
|
* So two safeguards are added to ensure critical channels are never
|
|
|
|
|
* automatically classified either because there is a bug in the algorithm
|
|
|
|
|
* or the data in loadinfo is wrong.
|
|
|
|
|
* 1. beConservative, this is set by ServiceRequest and we treat
|
|
|
|
|
* channel created for ServiceRequest as critical channels.
|
|
|
|
|
* 2. nsIChannel::LOAD_BYPASS_URL_CLASSIFIER, channel's opener can use this
|
|
|
|
|
* flag to enforce bypassing the URL classifier check.
|
|
|
|
|
*/
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool NS_ShouldClassifyChannel(nsIChannel* aChannel) {
|
2019-03-25 15:48:25 +03:00
|
|
|
|
nsLoadFlags loadFlags;
|
|
|
|
|
Unused << aChannel->GetLoadFlags(&loadFlags);
|
|
|
|
|
// If our load flags dictate that we must let this channel through without
|
|
|
|
|
// URL classification, obey that here without performing more checks.
|
|
|
|
|
if (loadFlags & nsIChannel::LOAD_BYPASS_URL_CLASSIFIER) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
|
2019-03-25 15:47:29 +03:00
|
|
|
|
nsCOMPtr<nsIHttpChannelInternal> httpChannel(do_QueryInterface(aChannel));
|
|
|
|
|
if (httpChannel) {
|
|
|
|
|
bool beConservative;
|
|
|
|
|
nsresult rv = httpChannel->GetBeConservative(&beConservative);
|
|
|
|
|
|
2019-03-25 15:48:25 +03:00
|
|
|
|
// beConservative flag, set by ServiceRequest to ensure channels that
|
|
|
|
|
// fetch update use conservative TLS setting, are used here to identify
|
|
|
|
|
// channels are critical to bypass classification. for channels don't
|
|
|
|
|
// support beConservative, continue to apply the exemption rules.
|
2019-03-25 15:47:29 +03:00
|
|
|
|
if (NS_SUCCEEDED(rv) && beConservative) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo = aChannel->LoadInfo();
|
|
|
|
|
if (loadInfo) {
|
|
|
|
|
nsContentPolicyType type = loadInfo->GetExternalContentPolicyType();
|
|
|
|
|
|
|
|
|
|
// Skip classifying channel triggered by system unless it is a top-level
|
|
|
|
|
// load.
|
|
|
|
|
if (nsContentUtils::IsSystemPrincipal(loadInfo->TriggeringPrincipal()) &&
|
|
|
|
|
nsIContentPolicy::TYPE_DOCUMENT != type) {
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
2015-05-20 05:48:00 +03:00
|
|
|
|
namespace mozilla {
|
|
|
|
|
namespace net {
|
|
|
|
|
|
|
|
|
|
bool InScriptableRange(int64_t val) {
|
|
|
|
|
return (val <= kJS_MAX_SAFE_INTEGER) && (val >= kJS_MIN_SAFE_INTEGER);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool InScriptableRange(uint64_t val) { return val <= kJS_MAX_SAFE_UINTEGER; }
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
nsresult GetParameterHTTP(const nsACString& aHeaderVal, const char* aParamName,
|
|
|
|
|
nsAString& aResult) {
|
2018-08-06 22:31:22 +03:00
|
|
|
|
return nsMIMEHeaderParamImpl::GetParameterHTTP(aHeaderVal, aParamName,
|
|
|
|
|
aResult);
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool SchemeIsHTTP(nsIURI* aURI) {
|
2019-01-11 11:08:19 +03:00
|
|
|
|
MOZ_ASSERT(aURI);
|
|
|
|
|
return aURI->SchemeIs("http");
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool SchemeIsHTTPS(nsIURI* aURI) {
|
2019-01-11 11:08:19 +03:00
|
|
|
|
MOZ_ASSERT(aURI);
|
|
|
|
|
return aURI->SchemeIs("https");
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool SchemeIsJavascript(nsIURI* aURI) {
|
2019-01-11 11:08:19 +03:00
|
|
|
|
MOZ_ASSERT(aURI);
|
|
|
|
|
return aURI->SchemeIs("javascript");
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool SchemeIsChrome(nsIURI* aURI) {
|
2019-01-11 11:08:19 +03:00
|
|
|
|
MOZ_ASSERT(aURI);
|
|
|
|
|
return aURI->SchemeIs("chrome");
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool SchemeIsAbout(nsIURI* aURI) {
|
2019-01-11 11:08:19 +03:00
|
|
|
|
MOZ_ASSERT(aURI);
|
|
|
|
|
return aURI->SchemeIs("about");
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool SchemeIsBlob(nsIURI* aURI) {
|
2019-01-11 11:08:19 +03:00
|
|
|
|
MOZ_ASSERT(aURI);
|
|
|
|
|
return aURI->SchemeIs("blob");
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool SchemeIsFile(nsIURI* aURI) {
|
2019-01-11 11:08:19 +03:00
|
|
|
|
MOZ_ASSERT(aURI);
|
|
|
|
|
return aURI->SchemeIs("file");
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool SchemeIsData(nsIURI* aURI) {
|
2019-01-11 11:08:19 +03:00
|
|
|
|
MOZ_ASSERT(aURI);
|
|
|
|
|
return aURI->SchemeIs("data");
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool SchemeIsViewSource(nsIURI* aURI) {
|
2019-01-11 11:08:19 +03:00
|
|
|
|
MOZ_ASSERT(aURI);
|
|
|
|
|
return aURI->SchemeIs("view-source");
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool SchemeIsResource(nsIURI* aURI) {
|
2019-01-11 11:08:19 +03:00
|
|
|
|
MOZ_ASSERT(aURI);
|
|
|
|
|
return aURI->SchemeIs("resource");
|
|
|
|
|
}
|
|
|
|
|
|
2019-05-01 11:47:10 +03:00
|
|
|
|
bool SchemeIsFTP(nsIURI* aURI) {
|
2019-01-11 11:08:19 +03:00
|
|
|
|
MOZ_ASSERT(aURI);
|
|
|
|
|
return aURI->SchemeIs("ftp");
|
|
|
|
|
}
|
|
|
|
|
|
2015-07-13 18:25:42 +03:00
|
|
|
|
} // namespace net
|
2015-05-20 05:48:00 +03:00
|
|
|
|
} // namespace mozilla
|