|
Packit |
f0b94e |
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
|
|
Packit |
f0b94e |
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
Packit |
f0b94e |
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
Packit |
f0b94e |
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
/* The privileged system principal. */
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
#include "nscore.h"
|
|
Packit |
f0b94e |
#include "SystemPrincipal.h"
|
|
Packit |
f0b94e |
#include "nsIComponentManager.h"
|
|
Packit |
f0b94e |
#include "nsIServiceManager.h"
|
|
Packit |
f0b94e |
#include "nsIURL.h"
|
|
Packit |
f0b94e |
#include "nsCOMPtr.h"
|
|
Packit |
f0b94e |
#include "nsReadableUtils.h"
|
|
Packit |
f0b94e |
#include "nsCRT.h"
|
|
Packit |
f0b94e |
#include "nsString.h"
|
|
Packit |
f0b94e |
#include "nsIClassInfoImpl.h"
|
|
Packit |
f0b94e |
#include "nsIScriptSecurityManager.h"
|
|
Packit |
f0b94e |
#include "pratom.h"
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
NS_IMPL_CLASSINFO(SystemPrincipal, nullptr,
|
|
Packit |
f0b94e |
nsIClassInfo::SINGLETON | nsIClassInfo::MAIN_THREAD_ONLY,
|
|
Packit |
f0b94e |
NS_SYSTEMPRINCIPAL_CID)
|
|
Packit |
f0b94e |
NS_IMPL_QUERY_INTERFACE_CI(SystemPrincipal, nsIPrincipal, nsISerializable)
|
|
Packit |
f0b94e |
NS_IMPL_CI_INTERFACE_GETTER(SystemPrincipal, nsIPrincipal, nsISerializable)
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
#define SYSTEM_PRINCIPAL_SPEC "[System Principal]"
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
already_AddRefed<SystemPrincipal> SystemPrincipal::Create() {
|
|
Packit |
f0b94e |
RefPtr<SystemPrincipal> sp = new SystemPrincipal();
|
|
Packit |
f0b94e |
sp->FinishInit(NS_LITERAL_CSTRING(SYSTEM_PRINCIPAL_SPEC), OriginAttributes());
|
|
Packit |
f0b94e |
return sp.forget();
|
|
Packit |
f0b94e |
}
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
nsresult SystemPrincipal::GetScriptLocation(nsACString& aStr) {
|
|
Packit |
f0b94e |
aStr.AssignLiteral(SYSTEM_PRINCIPAL_SPEC);
|
|
Packit |
f0b94e |
return NS_OK;
|
|
Packit |
f0b94e |
}
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
///////////////////////////////////////
|
|
Packit |
f0b94e |
// Methods implementing nsIPrincipal //
|
|
Packit |
f0b94e |
///////////////////////////////////////
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
NS_IMETHODIMP
|
|
Packit |
f0b94e |
SystemPrincipal::GetHashValue(uint32_t* result) {
|
|
Packit |
f0b94e |
*result = NS_PTR_TO_INT32(this);
|
|
Packit |
f0b94e |
return NS_OK;
|
|
Packit |
f0b94e |
}
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
NS_IMETHODIMP
|
|
Packit |
f0b94e |
SystemPrincipal::GetURI(nsIURI** aURI) {
|
|
Packit |
f0b94e |
*aURI = nullptr;
|
|
Packit |
f0b94e |
return NS_OK;
|
|
Packit |
f0b94e |
}
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
NS_IMETHODIMP
|
|
Packit |
f0b94e |
SystemPrincipal::GetCsp(nsIContentSecurityPolicy** aCsp) {
|
|
Packit |
f0b94e |
*aCsp = nullptr;
|
|
Packit |
f0b94e |
return NS_OK;
|
|
Packit |
f0b94e |
}
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
NS_IMETHODIMP
|
|
Packit |
f0b94e |
SystemPrincipal::SetCsp(nsIContentSecurityPolicy* aCsp) {
|
|
Packit |
f0b94e |
// Never destroy an existing CSP on the principal.
|
|
Packit |
f0b94e |
// This method should only be called in rare cases.
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
return NS_ERROR_FAILURE;
|
|
Packit |
f0b94e |
}
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
NS_IMETHODIMP
|
|
Packit |
f0b94e |
SystemPrincipal::EnsureCSP(nsIDOMDocument* aDocument,
|
|
Packit |
f0b94e |
nsIContentSecurityPolicy** aCSP) {
|
|
Packit |
f0b94e |
// CSP on a system principal makes no sense
|
|
Packit |
f0b94e |
return NS_ERROR_FAILURE;
|
|
Packit |
f0b94e |
}
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
NS_IMETHODIMP
|
|
Packit |
f0b94e |
SystemPrincipal::GetPreloadCsp(nsIContentSecurityPolicy** aPreloadCSP) {
|
|
Packit |
f0b94e |
*aPreloadCSP = nullptr;
|
|
Packit |
f0b94e |
return NS_OK;
|
|
Packit |
f0b94e |
}
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
NS_IMETHODIMP
|
|
Packit |
f0b94e |
SystemPrincipal::EnsurePreloadCSP(nsIDOMDocument* aDocument,
|
|
Packit |
f0b94e |
nsIContentSecurityPolicy** aPreloadCSP) {
|
|
Packit |
f0b94e |
// CSP on a system principal makes no sense
|
|
Packit |
f0b94e |
return NS_OK;
|
|
Packit |
f0b94e |
}
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
NS_IMETHODIMP
|
|
Packit |
f0b94e |
SystemPrincipal::GetDomain(nsIURI** aDomain) {
|
|
Packit |
f0b94e |
*aDomain = nullptr;
|
|
Packit |
f0b94e |
return NS_OK;
|
|
Packit |
f0b94e |
}
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
NS_IMETHODIMP
|
|
Packit |
f0b94e |
SystemPrincipal::SetDomain(nsIURI* aDomain) { return NS_OK; }
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
NS_IMETHODIMP
|
|
Packit |
f0b94e |
SystemPrincipal::GetBaseDomain(nsACString& aBaseDomain) {
|
|
Packit |
f0b94e |
// No base domain for chrome.
|
|
Packit |
f0b94e |
return NS_OK;
|
|
Packit |
f0b94e |
}
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
NS_IMETHODIMP
|
|
Packit |
f0b94e |
SystemPrincipal::GetAddonId(nsAString& aAddonId) {
|
|
Packit |
f0b94e |
aAddonId.Truncate();
|
|
Packit |
f0b94e |
return NS_OK;
|
|
Packit |
f0b94e |
};
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
//////////////////////////////////////////
|
|
Packit |
f0b94e |
// Methods implementing nsISerializable //
|
|
Packit |
f0b94e |
//////////////////////////////////////////
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
NS_IMETHODIMP
|
|
Packit |
f0b94e |
SystemPrincipal::Read(nsIObjectInputStream* aStream) {
|
|
Packit |
f0b94e |
// no-op: CID is sufficient to identify the mSystemPrincipal singleton
|
|
Packit |
f0b94e |
return NS_OK;
|
|
Packit |
f0b94e |
}
|
|
Packit |
f0b94e |
|
|
Packit |
f0b94e |
NS_IMETHODIMP
|
|
Packit |
f0b94e |
SystemPrincipal::Write(nsIObjectOutputStream* aStream) {
|
|
Packit |
f0b94e |
// no-op: CID is sufficient to identify the mSystemPrincipal singleton
|
|
Packit |
f0b94e |
return NS_OK;
|
|
Packit |
f0b94e |
}
|