summaryrefslogtreecommitdiffstats
path: root/dom/credentialmanagement/CredentialsContainer.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'dom/credentialmanagement/CredentialsContainer.cpp')
-rw-r--r--dom/credentialmanagement/CredentialsContainer.cpp160
1 files changed, 160 insertions, 0 deletions
diff --git a/dom/credentialmanagement/CredentialsContainer.cpp b/dom/credentialmanagement/CredentialsContainer.cpp
new file mode 100644
index 0000000000..eeaf1f3565
--- /dev/null
+++ b/dom/credentialmanagement/CredentialsContainer.cpp
@@ -0,0 +1,160 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* vim: set ts=8 sts=2 et sw=2 tw=80: */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "mozilla/dom/CredentialsContainer.h"
+#include "mozilla/dom/Promise.h"
+#include "mozilla/dom/WebAuthnManager.h"
+#include "nsContentUtils.h"
+#include "nsFocusManager.h"
+#include "nsIDocShell.h"
+
+namespace mozilla::dom {
+
+NS_IMPL_CYCLE_COLLECTION_WRAPPERCACHE(CredentialsContainer, mParent, mManager)
+NS_IMPL_CYCLE_COLLECTING_ADDREF(CredentialsContainer)
+NS_IMPL_CYCLE_COLLECTING_RELEASE(CredentialsContainer)
+NS_INTERFACE_MAP_BEGIN_CYCLE_COLLECTION(CredentialsContainer)
+ NS_WRAPPERCACHE_INTERFACE_MAP_ENTRY
+ NS_INTERFACE_MAP_ENTRY(nsISupports)
+NS_INTERFACE_MAP_END
+
+already_AddRefed<Promise> CreateAndReject(nsPIDOMWindowInner* aParent,
+ ErrorResult& aRv) {
+ MOZ_ASSERT(aParent);
+
+ nsCOMPtr<nsIGlobalObject> global = do_QueryInterface(aParent);
+ if (NS_WARN_IF(!global)) {
+ aRv.Throw(NS_ERROR_FAILURE);
+ return nullptr;
+ }
+
+ RefPtr<Promise> promise = Promise::Create(global, aRv);
+ if (NS_WARN_IF(aRv.Failed())) {
+ return nullptr;
+ }
+
+ promise->MaybeReject(NS_ERROR_DOM_NOT_ALLOWED_ERR);
+ return promise.forget();
+}
+
+static bool IsInActiveTab(nsPIDOMWindowInner* aParent) {
+ // Returns whether aParent is an inner window somewhere in the active tab.
+ // The active tab is the selected (i.e. visible) tab in the focused window.
+ MOZ_ASSERT(aParent);
+
+ RefPtr<Document> doc = aParent->GetExtantDoc();
+ if (NS_WARN_IF(!doc)) {
+ return false;
+ }
+
+ return IsInActiveTab(doc);
+}
+
+static bool IsSameOriginWithAncestors(nsPIDOMWindowInner* aParent) {
+ // This method returns true if aParent is either not in a frame / iframe, or
+ // is in a frame or iframe and all ancestors for aParent are the same origin.
+ // This is useful for Credential Management because we need to prohibit
+ // iframes, but not break mochitests (which use iframes to embed the tests).
+ MOZ_ASSERT(aParent);
+
+ if (aParent->IsTopInnerWindow()) {
+ // Not in a frame or iframe
+ return true;
+ }
+
+ // We're in some kind of frame, so let's get the parent and start checking
+ // the same origin policy
+ nsINode* node =
+ nsContentUtils::GetCrossDocParentNode(aParent->GetExtantDoc());
+ if (NS_WARN_IF(!node)) {
+ // This is a sanity check, since there has to be a parent. Fail safe.
+ return false;
+ }
+
+ // Check that all ancestors are the same origin, repeating until we find a
+ // null parent
+ do {
+ nsresult rv =
+ nsContentUtils::CheckSameOrigin(aParent->GetExtantDoc(), node);
+ if (NS_FAILED(rv)) {
+ // same-origin policy is violated
+ return false;
+ }
+
+ node = nsContentUtils::GetCrossDocParentNode(node);
+ } while (node);
+
+ return true;
+}
+
+CredentialsContainer::CredentialsContainer(nsPIDOMWindowInner* aParent)
+ : mParent(aParent) {
+ MOZ_ASSERT(aParent);
+}
+
+CredentialsContainer::~CredentialsContainer() = default;
+
+void CredentialsContainer::EnsureWebAuthnManager() {
+ MOZ_ASSERT(NS_IsMainThread());
+
+ if (!mManager) {
+ mManager = new WebAuthnManager(mParent);
+ }
+}
+
+JSObject* CredentialsContainer::WrapObject(JSContext* aCx,
+ JS::Handle<JSObject*> aGivenProto) {
+ return CredentialsContainer_Binding::Wrap(aCx, this, aGivenProto);
+}
+
+already_AddRefed<Promise> CredentialsContainer::Get(
+ const CredentialRequestOptions& aOptions, ErrorResult& aRv) {
+ if (!IsSameOriginWithAncestors(mParent) || !IsInActiveTab(mParent)) {
+ return CreateAndReject(mParent, aRv);
+ }
+
+ EnsureWebAuthnManager();
+ return mManager->GetAssertion(aOptions.mPublicKey, aOptions.mSignal);
+}
+
+already_AddRefed<Promise> CredentialsContainer::Create(
+ const CredentialCreationOptions& aOptions, ErrorResult& aRv) {
+ if (!IsSameOriginWithAncestors(mParent) || !IsInActiveTab(mParent)) {
+ return CreateAndReject(mParent, aRv);
+ }
+
+ EnsureWebAuthnManager();
+ return mManager->MakeCredential(aOptions.mPublicKey, aOptions.mSignal);
+}
+
+already_AddRefed<Promise> CredentialsContainer::Store(
+ const Credential& aCredential, ErrorResult& aRv) {
+ if (!IsSameOriginWithAncestors(mParent) || !IsInActiveTab(mParent)) {
+ return CreateAndReject(mParent, aRv);
+ }
+
+ EnsureWebAuthnManager();
+ return mManager->Store(aCredential);
+}
+
+already_AddRefed<Promise> CredentialsContainer::PreventSilentAccess(
+ ErrorResult& aRv) {
+ nsCOMPtr<nsIGlobalObject> global = do_QueryInterface(mParent);
+ if (NS_WARN_IF(!global)) {
+ aRv.Throw(NS_ERROR_FAILURE);
+ return nullptr;
+ }
+
+ RefPtr<Promise> promise = Promise::Create(global, aRv);
+ if (NS_WARN_IF(aRv.Failed())) {
+ return nullptr;
+ }
+
+ promise->MaybeResolveWithUndefined();
+ return promise.forget();
+}
+
+} // namespace mozilla::dom