[tbb-commits] [tor-browser/tor-browser-60.1.0esr-8.0-1] fixup! Bug 21569: Add first-party domain to Permissions key
gk at torproject.org
gk at torproject.org
Sun Aug 26 15:01:27 UTC 2018
commit d55b7bb578cf644e780d27efa2355c2046bcf689
Author: Kathy Brade <brade at pearlcrescent.com>
Date: Thu Aug 23 09:32:36 2018 -0400
fixup! Bug 21569: Add first-party domain to Permissions key
---
browser/components/uitour/content-UITour.js | 3 ++-
extensions/cookie/nsPermissionManager.cpp | 28 ++++++++++++++++++----------
2 files changed, 20 insertions(+), 11 deletions(-)
diff --git a/browser/components/uitour/content-UITour.js b/browser/components/uitour/content-UITour.js
index be51b8383d6b..88d300c91419 100644
--- a/browser/components/uitour/content-UITour.js
+++ b/browser/components/uitour/content-UITour.js
@@ -48,7 +48,8 @@ var UITourListener = {
if (!this.isSafeScheme(uri))
return false;
- let permission = Services.perms.testPermission(uri, UITOUR_PERMISSION);
+ let permission = Services.perms.testPermissionFromPrincipal(
+ content.document.nodePrincipal, UITOUR_PERMISSION);
if (permission == Services.perms.ALLOW_ACTION)
return true;
diff --git a/extensions/cookie/nsPermissionManager.cpp b/extensions/cookie/nsPermissionManager.cpp
index 29958695f851..62c7277c7d84 100644
--- a/extensions/cookie/nsPermissionManager.cpp
+++ b/extensions/cookie/nsPermissionManager.cpp
@@ -207,7 +207,8 @@ GetOriginFromPrincipal(nsIPrincipal* aPrincipal, nsACString& aOrigin)
}
nsresult
-GetPrincipalFromOrigin(const nsACString& aOrigin, nsIPrincipal** aPrincipal)
+GetPrincipalFromOrigin(const nsACString& aOrigin, bool aAddFirstParty,
+ nsIPrincipal** aPrincipal)
{
nsAutoCString originNoSuffix;
mozilla::OriginAttributes attrs;
@@ -223,6 +224,13 @@ GetPrincipalFromOrigin(const nsACString& aOrigin, nsIPrincipal** aPrincipal)
nsresult rv = NS_NewURI(getter_AddRefs(uri), originNoSuffix);
NS_ENSURE_SUCCESS(rv, rv);
+ // aAddFirstParty is true when adding the default permissions from
+ // browser/app/permissions because those permissions refer to the
+ // first party domain.
+ if (aAddFirstParty) {
+ attrs.SetFirstPartyDomain(true, uri);
+ }
+
nsCOMPtr<nsIPrincipal> principal = mozilla::BasePrincipal::CreateCodebasePrincipal(uri, attrs);
principal.forget(aPrincipal);
return NS_OK;
@@ -419,7 +427,7 @@ public:
int64_t aModificationTime) final
{
nsCOMPtr<nsIPrincipal> principal;
- nsresult rv = GetPrincipalFromOrigin(aOrigin, getter_AddRefs(principal));
+ nsresult rv = GetPrincipalFromOrigin(aOrigin, false, getter_AddRefs(principal));
NS_ENSURE_SUCCESS(rv, rv);
return mPm->AddInternal(principal, aType, aPermission, mID,
@@ -2250,7 +2258,7 @@ nsPermissionManager::GetPermissionObject(nsIPrincipal* aPrincipal,
}
nsCOMPtr<nsIPrincipal> principal;
- nsresult rv = GetPrincipalFromOrigin(entry->GetKey()->mOrigin, getter_AddRefs(principal));
+ nsresult rv = GetPrincipalFromOrigin(entry->GetKey()->mOrigin, false, getter_AddRefs(principal));
NS_ENSURE_SUCCESS(rv, rv);
PermissionEntry& perm = entry->GetPermissions()[idx];
@@ -2498,7 +2506,7 @@ NS_IMETHODIMP nsPermissionManager::GetEnumerator(nsISimpleEnumerator **aEnum)
}
nsCOMPtr<nsIPrincipal> principal;
- nsresult rv = GetPrincipalFromOrigin(entry->GetKey()->mOrigin,
+ nsresult rv = GetPrincipalFromOrigin(entry->GetKey()->mOrigin, false,
getter_AddRefs(principal));
if (NS_FAILED(rv)) {
continue;
@@ -2593,7 +2601,7 @@ nsPermissionManager::RemoveAllModifiedSince(int64_t aModificationTime)
}
nsCOMPtr<nsIPrincipal> principal;
- nsresult rv = GetPrincipalFromOrigin(entry->GetKey()->mOrigin,
+ nsresult rv = GetPrincipalFromOrigin(entry->GetKey()->mOrigin, false,
getter_AddRefs(principal));
if (NS_FAILED(rv)) {
continue;
@@ -2664,7 +2672,7 @@ nsPermissionManager::RemovePermissionsWithAttributes(mozilla::OriginAttributesPa
PermissionHashKey* entry = iter.Get();
nsCOMPtr<nsIPrincipal> principal;
- nsresult rv = GetPrincipalFromOrigin(entry->GetKey()->mOrigin,
+ nsresult rv = GetPrincipalFromOrigin(entry->GetKey()->mOrigin, false,
getter_AddRefs(principal));
if (NS_FAILED(rv)) {
continue;
@@ -2851,7 +2859,7 @@ nsPermissionManager::Read()
modificationTime = stmt->AsInt64(6);
nsCOMPtr<nsIPrincipal> principal;
- nsresult rv = GetPrincipalFromOrigin(origin, getter_AddRefs(principal));
+ nsresult rv = GetPrincipalFromOrigin(origin, false, getter_AddRefs(principal));
if (NS_FAILED(rv)) {
readError = true;
continue;
@@ -3010,7 +3018,7 @@ nsPermissionManager::_DoImport(nsIInputStream *inputStream, mozIStorageConnectio
continue;
nsCOMPtr<nsIPrincipal> principal;
- error = GetPrincipalFromOrigin(lineArray[3], getter_AddRefs(principal));
+ error = GetPrincipalFromOrigin(lineArray[3], true, getter_AddRefs(principal));
if (NS_FAILED(error)) {
NS_WARNING("Couldn't import an origin permission - malformed origin");
continue;
@@ -3240,7 +3248,7 @@ nsPermissionManager::SetPermissionsWithKey(const nsACString& aPermissionKey,
// Add the permissions locally to our process
for (IPC::Permission& perm : aPerms) {
nsCOMPtr<nsIPrincipal> principal;
- nsresult rv = GetPrincipalFromOrigin(perm.origin, getter_AddRefs(principal));
+ nsresult rv = GetPrincipalFromOrigin(perm.origin, false, getter_AddRefs(principal));
if (NS_WARN_IF(NS_FAILED(rv))) {
continue;
}
@@ -3296,7 +3304,7 @@ nsPermissionManager::GetKeyForOrigin(const nsACString& aOrigin, nsACString& aKey
// Parse the origin string into a principal, and extract some useful
// information from it for assertions.
nsCOMPtr<nsIPrincipal> dbgPrincipal;
- MOZ_ALWAYS_SUCCEEDS(GetPrincipalFromOrigin(aOrigin, getter_AddRefs(dbgPrincipal)));
+ MOZ_ALWAYS_SUCCEEDS(GetPrincipalFromOrigin(aOrigin, false, getter_AddRefs(dbgPrincipal)));
nsCOMPtr<nsIURI> dbgUri;
MOZ_ALWAYS_SUCCEEDS(dbgPrincipal->GetURI(getter_AddRefs(dbgUri)));
nsAutoCString dbgScheme;
More information about the tbb-commits
mailing list