1 /* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* ***** BEGIN LICENSE BLOCK *****
3 * Version: MPL 1.1/GPL 2.0/LGPL 2.1
5 * The contents of this file are subject to the Mozilla Public License Version
6 * 1.1 (the "License"); you may not use this file except in compliance with
7 * the License. You may obtain a copy of the License at
8 * http://www.mozilla.org/MPL/
10 * Software distributed under the License is distributed on an "AS IS" basis,
11 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
12 * for the specific language governing rights and limitations under the
15 * The Original Code is mozilla.org code.
17 * The Initial Developer of the Original Code is
18 * the Mozilla Corporation.
19 * Portions created by the Initial Developer are Copyright (C) 2006
20 * the Initial Developer. All Rights Reserved.
23 * Boris Zbarsky <bzbarsky@mit.edu> (Original author)
25 * Alternatively, the contents of this file may be used under the terms of
26 * either of the GNU General Public License Version 2 or later (the "GPL"),
27 * or the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
28 * in which case the provisions of the GPL or the LGPL are applicable instead
29 * of those above. If you wish to allow use of your version of this file only
30 * under the terms of either the GPL or the LGPL, and not to allow others to
31 * use your version of this file under the terms of the MPL, indicate your
32 * decision by deleting the provisions above and replace them with the notice
33 * and other provisions required by the GPL or the LGPL. If you do not delete
34 * the provisions above, a recipient may use your version of this file under
35 * the terms of any one of the MPL, the GPL or the LGPL.
37 * ***** END LICENSE BLOCK ***** */
40 * This is the principal that has no rights and can't be accessed by
41 * anything other than itself and chrome; null principals are not
42 * same-origin with anything but themselves.
45 #include "nsNullPrincipal.h"
46 #include "nsNullPrincipalURI.h"
48 #include "nsIUUIDGenerator.h"
50 #include "nsNetUtil.h"
51 #include "nsIClassInfoImpl.h"
53 #include "nsDOMError.h"
54 #include "nsScriptSecurityManager.h"
56 NS_IMPL_QUERY_INTERFACE2_CI(nsNullPrincipal
,
59 NS_IMPL_CI_INTERFACE_GETTER2(nsNullPrincipal
,
63 NS_IMETHODIMP_(nsrefcnt
)
64 nsNullPrincipal::AddRef()
66 NS_PRECONDITION(PRInt32(mJSPrincipals
.refcount
) >= 0, "illegal refcnt");
67 nsrefcnt count
= PR_AtomicIncrement((PRInt32
*)&mJSPrincipals
.refcount
);
68 NS_LOG_ADDREF(this, count
, "nsNullPrincipal", sizeof(*this));
72 NS_IMETHODIMP_(nsrefcnt
)
73 nsNullPrincipal::Release()
75 NS_PRECONDITION(0 != mJSPrincipals
.refcount
, "dup release");
76 nsrefcnt count
= PR_AtomicDecrement((PRInt32
*)&mJSPrincipals
.refcount
);
77 NS_LOG_RELEASE(this, count
, "nsNullPrincipal");
85 nsNullPrincipal::nsNullPrincipal()
89 nsNullPrincipal::~nsNullPrincipal()
93 #define NS_NULLPRINCIPAL_PREFIX NS_NULLPRINCIPAL_SCHEME ":"
96 nsNullPrincipal::Init()
98 // FIXME: bug 327161 -- make sure the uuid generator is reseeding-resistant.
100 nsCOMPtr
<nsIUUIDGenerator
> uuidgen
=
101 do_GetService("@mozilla.org/uuid-generator;1", &rv
);
102 NS_ENSURE_SUCCESS(rv
, rv
);
105 rv
= uuidgen
->GenerateUUIDInPlace(&id
);
106 NS_ENSURE_SUCCESS(rv
, rv
);
108 char chars
[NSID_LENGTH
];
109 id
.ToProvidedString(chars
);
111 PRUint32 suffixLen
= NSID_LENGTH
- 1;
112 PRUint32 prefixLen
= NS_ARRAY_LENGTH(NS_NULLPRINCIPAL_PREFIX
) - 1;
114 // Use an nsCString so we only do the allocation once here and then share
115 // with nsJSPrincipals
117 str
.SetCapacity(prefixLen
+ suffixLen
);
119 str
.Append(NS_NULLPRINCIPAL_PREFIX
);
122 if (str
.Length() != prefixLen
+ suffixLen
) {
123 NS_WARNING("Out of memory allocating null-principal URI");
124 return NS_ERROR_OUT_OF_MEMORY
;
127 mURI
= new nsNullPrincipalURI(str
);
128 NS_ENSURE_TRUE(mURI
, NS_ERROR_OUT_OF_MEMORY
);
130 return mJSPrincipals
.Init(this, str
);
134 * nsIPrincipal implementation
138 nsNullPrincipal::GetPreferences(char** aPrefName
, char** aID
,
140 char** aGrantedList
, char** aDeniedList
,
143 // The null principal should never be written to preferences.
146 *aSubjectName
= nsnull
;
147 *aGrantedList
= nsnull
;
148 *aDeniedList
= nsnull
;
149 *aIsTrusted
= PR_FALSE
;
151 return NS_ERROR_FAILURE
;
155 nsNullPrincipal::Equals(nsIPrincipal
*aOther
, PRBool
*aResult
)
157 // Just equal to ourselves. Note that nsPrincipal::Equals will return false
158 // for us since we have a unique domain/origin/etc.
159 *aResult
= (aOther
== this);
164 nsNullPrincipal::GetHashValue(PRUint32
*aResult
)
166 *aResult
= (NS_PTR_TO_INT32(this) >> 2);
171 nsNullPrincipal::GetJSPrincipals(JSContext
*cx
, JSPrincipals
**aJsprin
)
173 NS_PRECONDITION(mJSPrincipals
.nsIPrincipalPtr
,
174 "mJSPrincipals is uninitalized!");
176 JSPRINCIPALS_HOLD(cx
, &mJSPrincipals
);
177 *aJsprin
= &mJSPrincipals
;
182 nsNullPrincipal::GetSecurityPolicy(void** aSecurityPolicy
)
184 // We don't actually do security policy caching. And it's not like anyone
185 // can set a security policy for us anyway.
186 *aSecurityPolicy
= nsnull
;
191 nsNullPrincipal::SetSecurityPolicy(void* aSecurityPolicy
)
193 // We don't actually do security policy caching. And it's not like anyone
194 // can set a security policy for us anyway.
199 nsNullPrincipal::CanEnableCapability(const char *aCapability
,
202 // Null principal can enable no capabilities.
203 *aResult
= nsIPrincipal::ENABLE_DENIED
;
208 nsNullPrincipal::SetCanEnableCapability(const char *aCapability
,
211 return NS_ERROR_NOT_AVAILABLE
;
216 nsNullPrincipal::IsCapabilityEnabled(const char *aCapability
,
220 // Nope. No capabilities, I say!
226 nsNullPrincipal::EnableCapability(const char *aCapability
, void **aAnnotation
)
228 NS_NOTREACHED("Didn't I say it? NO CAPABILITIES!");
229 *aAnnotation
= nsnull
;
234 nsNullPrincipal::RevertCapability(const char *aCapability
, void **aAnnotation
)
236 *aAnnotation
= nsnull
;
241 nsNullPrincipal::DisableCapability(const char *aCapability
, void **aAnnotation
)
243 // Just a no-op. They're all disabled anyway.
244 *aAnnotation
= nsnull
;
249 nsNullPrincipal::GetURI(nsIURI
** aURI
)
251 return NS_EnsureSafeToReturn(mURI
, aURI
);
255 nsNullPrincipal::GetDomain(nsIURI
** aDomain
)
257 return NS_EnsureSafeToReturn(mURI
, aDomain
);
261 nsNullPrincipal::SetDomain(nsIURI
* aDomain
)
263 // I think the right thing to do here is to just throw... Silently failing
264 // seems counterproductive.
265 return NS_ERROR_NOT_AVAILABLE
;
269 nsNullPrincipal::GetOrigin(char** aOrigin
)
274 nsresult rv
= mURI
->GetSpec(str
);
275 NS_ENSURE_SUCCESS(rv
, rv
);
277 *aOrigin
= ToNewCString(str
);
278 NS_ENSURE_TRUE(*aOrigin
, NS_ERROR_OUT_OF_MEMORY
);
284 nsNullPrincipal::GetHasCertificate(PRBool
* aResult
)
291 nsNullPrincipal::GetFingerprint(nsACString
& aID
)
293 return NS_ERROR_NOT_AVAILABLE
;
297 nsNullPrincipal::GetPrettyName(nsACString
& aName
)
299 return NS_ERROR_NOT_AVAILABLE
;
303 nsNullPrincipal::Subsumes(nsIPrincipal
*aOther
, PRBool
*aResult
)
305 // We don't subsume anything except ourselves. Note that nsPrincipal::Equals
306 // will return false for us, since we're not about:blank and not Equals to
307 // reasonable nsPrincipals.
308 *aResult
= (aOther
== this);
313 nsNullPrincipal::CheckMayLoad(nsIURI
* aURI
, PRBool aReport
)
316 nsScriptSecurityManager::ReportError(
317 nsnull
, NS_LITERAL_STRING("CheckSameOriginError"), mURI
, aURI
);
320 return NS_ERROR_DOM_BAD_URI
;
324 nsNullPrincipal::GetSubjectName(nsACString
& aName
)
326 return NS_ERROR_NOT_AVAILABLE
;
330 nsNullPrincipal::GetCertificate(nsISupports
** aCertificate
)
332 *aCertificate
= nsnull
;
337 * nsISerializable implementation
340 nsNullPrincipal::Read(nsIObjectInputStream
* aStream
)
342 // no-op: CID is sufficient to create a useful nsNullPrincipal, since the URI
343 // is not really relevant.
348 nsNullPrincipal::Write(nsIObjectOutputStream
* aStream
)
350 // no-op: CID is sufficient to create a useful nsNullPrincipal, since the URI
351 // is not really relevant.