Bug 1920241 - Update Persisted Search preferences text - r=daleharvey,fluent-reviewer...
[gecko.git] / ipc / glue / BackgroundUtils.cpp
blob213f543e46ea8f87f9def4dff348d9e5901f7cc3
1 /* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* vim: set ts=8 sts=2 et sw=2 tw=80: */
3 /* This Source Code Form is subject to the terms of the Mozilla Public
4 * License, v. 2.0. If a copy of the MPL was not distributed with this file,
5 * You can obtain one at http://mozilla.org/MPL/2.0/. */
7 #include "BackgroundUtils.h"
9 #include "MainThreadUtils.h"
10 #include "mozilla/Assertions.h"
11 #include "mozilla/BasePrincipal.h"
12 #include "mozilla/ContentPrincipal.h"
13 #include "mozilla/NullPrincipal.h"
14 #include "mozilla/SystemPrincipal.h"
15 #include "mozilla/ipc/PBackgroundSharedTypes.h"
16 #include "mozilla/ipc/URIUtils.h"
17 #include "mozilla/net/CookieJarSettings.h"
18 #include "mozilla/net/InterceptionInfo.h"
19 #include "mozilla/net/NeckoChannelParams.h"
20 #include "ExpandedPrincipal.h"
21 #include "nsIScriptSecurityManager.h"
22 #include "nsIURI.h"
23 #include "nsNetUtil.h"
24 #include "mozilla/LoadInfo.h"
25 #include "nsContentUtils.h"
26 #include "nsString.h"
27 #include "nsTArray.h"
28 #include "mozilla/nsRedirectHistoryEntry.h"
29 #include "mozilla/dom/nsCSPUtils.h"
30 #include "mozilla/dom/nsCSPContext.h"
31 #include "mozilla/dom/BrowsingContext.h"
32 #include "mozilla/dom/CanonicalBrowsingContext.h"
33 #include "mozilla/dom/Document.h"
34 #include "mozilla/dom/WindowGlobalParent.h"
35 #include "mozilla/LoadInfo.h"
37 using namespace mozilla::dom;
38 using namespace mozilla::net;
40 namespace mozilla {
42 namespace ipc {
44 Result<nsCOMPtr<nsIPrincipal>, nsresult> PrincipalInfoToPrincipal(
45 const PrincipalInfo& aPrincipalInfo) {
46 MOZ_ASSERT(aPrincipalInfo.type() != PrincipalInfo::T__None);
48 nsCOMPtr<nsIPrincipal> principal;
49 nsresult rv;
51 switch (aPrincipalInfo.type()) {
52 case PrincipalInfo::TSystemPrincipalInfo: {
53 principal = SystemPrincipal::Get();
54 if (NS_WARN_IF(!principal)) {
55 return Err(NS_ERROR_NOT_INITIALIZED);
58 return principal;
61 case PrincipalInfo::TNullPrincipalInfo: {
62 const NullPrincipalInfo& info = aPrincipalInfo.get_NullPrincipalInfo();
64 nsCOMPtr<nsIURI> uri;
65 rv = NS_NewURI(getter_AddRefs(uri), info.spec());
66 if (NS_WARN_IF(NS_FAILED(rv))) {
67 return Err(rv);
70 if (!uri->SchemeIs(NS_NULLPRINCIPAL_SCHEME)) {
71 return Err(NS_ERROR_ILLEGAL_VALUE);
74 principal = NullPrincipal::Create(info.attrs(), uri);
75 return principal;
78 case PrincipalInfo::TContentPrincipalInfo: {
79 const ContentPrincipalInfo& info =
80 aPrincipalInfo.get_ContentPrincipalInfo();
82 nsCOMPtr<nsIURI> uri;
83 rv = NS_NewURI(getter_AddRefs(uri), info.spec());
84 if (NS_WARN_IF(NS_FAILED(rv))) {
85 return Err(rv);
88 nsCOMPtr<nsIURI> domain;
89 if (info.domain()) {
90 rv = NS_NewURI(getter_AddRefs(domain), *info.domain());
91 if (NS_WARN_IF(NS_FAILED(rv))) {
92 return Err(rv);
96 principal =
97 BasePrincipal::CreateContentPrincipal(uri, info.attrs(), domain);
98 if (NS_WARN_IF(!principal)) {
99 return Err(NS_ERROR_NULL_POINTER);
102 // Origin must match what the_new_principal.getOrigin returns.
103 nsAutoCString originNoSuffix;
104 rv = principal->GetOriginNoSuffix(originNoSuffix);
105 if (NS_WARN_IF(NS_FAILED(rv))) {
106 return Err(rv);
109 if (NS_WARN_IF(!info.originNoSuffix().Equals(originNoSuffix))) {
110 return Err(NS_ERROR_FAILURE);
113 if (!info.baseDomain().IsVoid()) {
114 nsAutoCString baseDomain;
115 rv = principal->GetBaseDomain(baseDomain);
116 if (NS_WARN_IF(NS_FAILED(rv))) {
117 return Err(rv);
120 if (NS_WARN_IF(!info.baseDomain().Equals(baseDomain))) {
121 return Err(NS_ERROR_FAILURE);
124 return principal;
127 case PrincipalInfo::TExpandedPrincipalInfo: {
128 const ExpandedPrincipalInfo& info =
129 aPrincipalInfo.get_ExpandedPrincipalInfo();
131 nsTArray<nsCOMPtr<nsIPrincipal>> allowlist;
132 nsCOMPtr<nsIPrincipal> alPrincipal;
134 for (uint32_t i = 0; i < info.allowlist().Length(); i++) {
135 auto principalOrErr = PrincipalInfoToPrincipal(info.allowlist()[i]);
136 if (NS_WARN_IF(principalOrErr.isErr())) {
137 nsresult ret = principalOrErr.unwrapErr();
138 return Err(ret);
140 // append that principal to the allowlist
141 allowlist.AppendElement(principalOrErr.unwrap());
144 RefPtr<ExpandedPrincipal> expandedPrincipal =
145 ExpandedPrincipal::Create(allowlist, info.attrs());
146 if (!expandedPrincipal) {
147 return Err(NS_ERROR_FAILURE);
150 principal = expandedPrincipal;
151 return principal;
154 default:
155 return Err(NS_ERROR_FAILURE);
159 bool StorageKeysEqual(const PrincipalInfo& aLeft, const PrincipalInfo& aRight) {
160 MOZ_RELEASE_ASSERT(aLeft.type() == PrincipalInfo::TContentPrincipalInfo ||
161 aLeft.type() == PrincipalInfo::TSystemPrincipalInfo);
162 MOZ_RELEASE_ASSERT(aRight.type() == PrincipalInfo::TContentPrincipalInfo ||
163 aRight.type() == PrincipalInfo::TSystemPrincipalInfo);
165 if (aLeft.type() != aRight.type()) {
166 return false;
169 if (aLeft.type() == PrincipalInfo::TContentPrincipalInfo) {
170 const ContentPrincipalInfo& leftContent = aLeft.get_ContentPrincipalInfo();
171 const ContentPrincipalInfo& rightContent =
172 aRight.get_ContentPrincipalInfo();
174 return leftContent.attrs() == rightContent.attrs() &&
175 leftContent.originNoSuffix() == rightContent.originNoSuffix();
178 // Storage keys for the System principal always equal.
179 return true;
182 already_AddRefed<nsIContentSecurityPolicy> CSPInfoToCSP(
183 const CSPInfo& aCSPInfo, Document* aRequestingDoc,
184 nsresult* aOptionalResult) {
185 MOZ_ASSERT(NS_IsMainThread());
187 nsresult stackResult;
188 nsresult& rv = aOptionalResult ? *aOptionalResult : stackResult;
190 RefPtr<nsCSPContext> csp = new nsCSPContext();
192 if (aRequestingDoc) {
193 rv = csp->SetRequestContextWithDocument(aRequestingDoc);
194 if (NS_WARN_IF(NS_FAILED(rv))) {
195 return nullptr;
197 } else {
198 auto principalOrErr =
199 PrincipalInfoToPrincipal(aCSPInfo.requestPrincipalInfo());
200 if (NS_WARN_IF(principalOrErr.isErr())) {
201 return nullptr;
204 nsCOMPtr<nsIURI> selfURI;
205 if (!aCSPInfo.selfURISpec().IsEmpty()) {
206 rv = NS_NewURI(getter_AddRefs(selfURI), aCSPInfo.selfURISpec());
207 if (NS_WARN_IF(NS_FAILED(rv))) {
208 return nullptr;
212 nsCOMPtr<nsIPrincipal> principal = principalOrErr.unwrap();
214 rv = csp->SetRequestContextWithPrincipal(
215 principal, selfURI, aCSPInfo.referrer(), aCSPInfo.innerWindowID());
216 if (NS_WARN_IF(NS_FAILED(rv))) {
217 return nullptr;
220 csp->SetSkipAllowInlineStyleCheck(aCSPInfo.skipAllowInlineStyleCheck());
222 for (uint32_t i = 0; i < aCSPInfo.policyInfos().Length(); i++) {
223 csp->AddIPCPolicy(aCSPInfo.policyInfos()[i]);
225 return csp.forget();
228 nsresult CSPToCSPInfo(nsIContentSecurityPolicy* aCSP, CSPInfo* aCSPInfo) {
229 MOZ_ASSERT(NS_IsMainThread());
230 MOZ_ASSERT(aCSP);
231 MOZ_ASSERT(aCSPInfo);
233 if (!aCSP || !aCSPInfo) {
234 return NS_ERROR_FAILURE;
237 nsCOMPtr<nsIPrincipal> requestPrincipal = aCSP->GetRequestPrincipal();
239 PrincipalInfo requestingPrincipalInfo;
240 nsresult rv =
241 PrincipalToPrincipalInfo(requestPrincipal, &requestingPrincipalInfo);
242 if (NS_WARN_IF(NS_FAILED(rv))) {
243 return rv;
246 nsCOMPtr<nsIURI> selfURI = aCSP->GetSelfURI();
247 nsAutoCString selfURISpec;
248 if (selfURI) {
249 selfURI->GetSpec(selfURISpec);
252 nsAutoCString referrer;
253 aCSP->GetReferrer(referrer);
255 uint64_t windowID = aCSP->GetInnerWindowID();
256 bool skipAllowInlineStyleCheck = aCSP->GetSkipAllowInlineStyleCheck();
258 nsTArray<ContentSecurityPolicy> policies;
259 static_cast<nsCSPContext*>(aCSP)->SerializePolicies(policies);
261 *aCSPInfo = CSPInfo(std::move(policies), requestingPrincipalInfo, selfURISpec,
262 referrer, windowID, skipAllowInlineStyleCheck);
263 return NS_OK;
266 nsresult PrincipalToPrincipalInfo(nsIPrincipal* aPrincipal,
267 PrincipalInfo* aPrincipalInfo,
268 bool aSkipBaseDomain) {
269 MOZ_ASSERT(aPrincipal);
270 MOZ_ASSERT(aPrincipalInfo);
272 nsresult rv;
273 if (aPrincipal->GetIsNullPrincipal()) {
274 nsAutoCString spec;
275 rv = aPrincipal->GetAsciiSpec(spec);
276 if (NS_WARN_IF(NS_FAILED(rv))) {
277 return rv;
280 *aPrincipalInfo =
281 NullPrincipalInfo(aPrincipal->OriginAttributesRef(), spec);
282 return NS_OK;
285 if (aPrincipal->IsSystemPrincipal()) {
286 *aPrincipalInfo = SystemPrincipalInfo();
287 return NS_OK;
290 // might be an expanded principal
291 auto* basePrin = BasePrincipal::Cast(aPrincipal);
292 if (basePrin->Is<ExpandedPrincipal>()) {
293 auto* expanded = basePrin->As<ExpandedPrincipal>();
295 nsTArray<PrincipalInfo> allowlistInfo;
296 PrincipalInfo info;
298 for (auto& prin : expanded->AllowList()) {
299 rv = PrincipalToPrincipalInfo(prin, &info, aSkipBaseDomain);
300 if (NS_WARN_IF(NS_FAILED(rv))) {
301 return rv;
303 // append that spec to the allowlist
304 allowlistInfo.AppendElement(info);
307 *aPrincipalInfo = ExpandedPrincipalInfo(aPrincipal->OriginAttributesRef(),
308 std::move(allowlistInfo));
309 return NS_OK;
312 nsAutoCString spec;
313 rv = aPrincipal->GetAsciiSpec(spec);
314 if (NS_WARN_IF(NS_FAILED(rv))) {
315 return rv;
318 nsCString originNoSuffix;
319 rv = aPrincipal->GetOriginNoSuffix(originNoSuffix);
320 if (NS_WARN_IF(NS_FAILED(rv))) {
321 return rv;
324 nsCOMPtr<nsIURI> domainUri;
325 rv = aPrincipal->GetDomain(getter_AddRefs(domainUri));
326 if (NS_WARN_IF(NS_FAILED(rv))) {
327 return rv;
330 Maybe<nsCString> domain;
331 if (domainUri) {
332 domain.emplace();
333 rv = domainUri->GetSpec(domain.ref());
334 if (NS_WARN_IF(NS_FAILED(rv))) {
335 return rv;
339 // This attribute is not crucial.
340 nsCString baseDomain;
341 if (aSkipBaseDomain) {
342 baseDomain.SetIsVoid(true);
343 } else {
344 if (NS_FAILED(aPrincipal->GetBaseDomain(baseDomain))) {
345 // No warning here. Some principal URLs do not have a base-domain.
346 baseDomain.SetIsVoid(true);
350 *aPrincipalInfo =
351 ContentPrincipalInfo(aPrincipal->OriginAttributesRef(), originNoSuffix,
352 spec, domain, baseDomain);
353 return NS_OK;
356 bool IsPrincipalInfoPrivate(const PrincipalInfo& aPrincipalInfo) {
357 if (aPrincipalInfo.type() != ipc::PrincipalInfo::TContentPrincipalInfo) {
358 return false;
361 const ContentPrincipalInfo& info = aPrincipalInfo.get_ContentPrincipalInfo();
362 return info.attrs().IsPrivateBrowsing();
365 already_AddRefed<nsIRedirectHistoryEntry> RHEntryInfoToRHEntry(
366 const RedirectHistoryEntryInfo& aRHEntryInfo) {
367 auto principalOrErr = PrincipalInfoToPrincipal(aRHEntryInfo.principalInfo());
368 if (NS_WARN_IF(principalOrErr.isErr())) {
369 return nullptr;
372 nsCOMPtr<nsIPrincipal> principal = principalOrErr.unwrap();
373 nsCOMPtr<nsIURI> referrerUri = DeserializeURI(aRHEntryInfo.referrerUri());
375 nsCOMPtr<nsIRedirectHistoryEntry> entry = new nsRedirectHistoryEntry(
376 principal, referrerUri, aRHEntryInfo.remoteAddress());
378 return entry.forget();
381 nsresult RHEntryToRHEntryInfo(nsIRedirectHistoryEntry* aRHEntry,
382 RedirectHistoryEntryInfo* aRHEntryInfo) {
383 MOZ_ASSERT(aRHEntry);
384 MOZ_ASSERT(aRHEntryInfo);
386 nsresult rv;
387 aRHEntry->GetRemoteAddress(aRHEntryInfo->remoteAddress());
389 nsCOMPtr<nsIURI> referrerUri;
390 rv = aRHEntry->GetReferrerURI(getter_AddRefs(referrerUri));
391 NS_ENSURE_SUCCESS(rv, rv);
392 SerializeURI(referrerUri, aRHEntryInfo->referrerUri());
394 nsCOMPtr<nsIPrincipal> principal;
395 rv = aRHEntry->GetPrincipal(getter_AddRefs(principal));
396 NS_ENSURE_SUCCESS(rv, rv);
398 return PrincipalToPrincipalInfo(principal, &aRHEntryInfo->principalInfo());
401 nsresult LoadInfoToLoadInfoArgs(nsILoadInfo* aLoadInfo,
402 LoadInfoArgs* outLoadInfoArgs) {
403 nsresult rv = NS_OK;
404 Maybe<PrincipalInfo> loadingPrincipalInfo;
405 if (nsIPrincipal* loadingPrin = aLoadInfo->GetLoadingPrincipal()) {
406 loadingPrincipalInfo.emplace();
407 rv = PrincipalToPrincipalInfo(loadingPrin, loadingPrincipalInfo.ptr());
408 NS_ENSURE_SUCCESS(rv, rv);
411 PrincipalInfo triggeringPrincipalInfo;
412 rv = PrincipalToPrincipalInfo(aLoadInfo->TriggeringPrincipal(),
413 &triggeringPrincipalInfo);
414 NS_ENSURE_SUCCESS(rv, rv);
416 Maybe<PrincipalInfo> principalToInheritInfo;
417 if (nsIPrincipal* principalToInherit = aLoadInfo->PrincipalToInherit()) {
418 principalToInheritInfo.emplace();
419 rv = PrincipalToPrincipalInfo(principalToInherit,
420 principalToInheritInfo.ptr());
421 NS_ENSURE_SUCCESS(rv, rv);
424 Maybe<PrincipalInfo> topLevelPrincipalInfo;
425 if (nsIPrincipal* topLevenPrin = aLoadInfo->GetTopLevelPrincipal()) {
426 topLevelPrincipalInfo.emplace();
427 rv = PrincipalToPrincipalInfo(topLevenPrin, topLevelPrincipalInfo.ptr());
428 NS_ENSURE_SUCCESS(rv, rv);
431 Maybe<URIParams> optionalResultPrincipalURI;
432 nsCOMPtr<nsIURI> resultPrincipalURI;
433 Unused << aLoadInfo->GetResultPrincipalURI(
434 getter_AddRefs(resultPrincipalURI));
435 if (resultPrincipalURI) {
436 SerializeURI(resultPrincipalURI, optionalResultPrincipalURI);
439 nsCString triggeringRemoteType;
440 rv = aLoadInfo->GetTriggeringRemoteType(triggeringRemoteType);
441 NS_ENSURE_SUCCESS(rv, rv);
443 nsTArray<RedirectHistoryEntryInfo> redirectChainIncludingInternalRedirects;
444 for (const nsCOMPtr<nsIRedirectHistoryEntry>& redirectEntry :
445 aLoadInfo->RedirectChainIncludingInternalRedirects()) {
446 RedirectHistoryEntryInfo* entry =
447 redirectChainIncludingInternalRedirects.AppendElement();
448 rv = RHEntryToRHEntryInfo(redirectEntry, entry);
449 NS_ENSURE_SUCCESS(rv, rv);
452 nsTArray<RedirectHistoryEntryInfo> redirectChain;
453 for (const nsCOMPtr<nsIRedirectHistoryEntry>& redirectEntry :
454 aLoadInfo->RedirectChain()) {
455 RedirectHistoryEntryInfo* entry = redirectChain.AppendElement();
456 rv = RHEntryToRHEntryInfo(redirectEntry, entry);
457 NS_ENSURE_SUCCESS(rv, rv);
460 Maybe<IPCClientInfo> ipcClientInfo;
461 const Maybe<ClientInfo>& clientInfo = aLoadInfo->GetClientInfo();
462 if (clientInfo.isSome()) {
463 ipcClientInfo.emplace(clientInfo.ref().ToIPC());
466 Maybe<IPCClientInfo> ipcReservedClientInfo;
467 const Maybe<ClientInfo>& reservedClientInfo =
468 aLoadInfo->GetReservedClientInfo();
469 if (reservedClientInfo.isSome()) {
470 ipcReservedClientInfo.emplace(reservedClientInfo.ref().ToIPC());
473 Maybe<IPCClientInfo> ipcInitialClientInfo;
474 const Maybe<ClientInfo>& initialClientInfo =
475 aLoadInfo->GetInitialClientInfo();
476 if (initialClientInfo.isSome()) {
477 ipcInitialClientInfo.emplace(initialClientInfo.ref().ToIPC());
480 Maybe<IPCServiceWorkerDescriptor> ipcController;
481 const Maybe<ServiceWorkerDescriptor>& controller = aLoadInfo->GetController();
482 if (controller.isSome()) {
483 ipcController.emplace(controller.ref().ToIPC());
486 nsAutoString cspNonce;
487 Unused << NS_WARN_IF(NS_FAILED(aLoadInfo->GetCspNonce(cspNonce)));
489 nsAutoString integrityMetadata;
490 Unused << NS_WARN_IF(
491 NS_FAILED(aLoadInfo->GetIntegrityMetadata(integrityMetadata)));
493 nsCOMPtr<nsICookieJarSettings> cookieJarSettings;
494 rv = aLoadInfo->GetCookieJarSettings(getter_AddRefs(cookieJarSettings));
495 NS_ENSURE_SUCCESS(rv, rv);
497 CookieJarSettingsArgs cookieJarSettingsArgs;
498 static_cast<CookieJarSettings*>(cookieJarSettings.get())
499 ->Serialize(cookieJarSettingsArgs);
501 Maybe<CSPInfo> maybeCspToInheritInfo;
502 nsCOMPtr<nsIContentSecurityPolicy> cspToInherit =
503 aLoadInfo->GetCspToInherit();
504 if (cspToInherit) {
505 CSPInfo cspToInheritInfo;
506 Unused << NS_WARN_IF(
507 NS_FAILED(CSPToCSPInfo(cspToInherit, &cspToInheritInfo)));
508 maybeCspToInheritInfo.emplace(cspToInheritInfo);
511 nsCOMPtr<nsIURI> unstrippedURI;
512 Unused << aLoadInfo->GetUnstrippedURI(getter_AddRefs(unstrippedURI));
514 Maybe<bool> isThirdPartyContextToTopWindow;
515 if (static_cast<LoadInfo*>(aLoadInfo)
516 ->HasIsThirdPartyContextToTopWindowSet()) {
517 isThirdPartyContextToTopWindow.emplace(
518 aLoadInfo->GetIsThirdPartyContextToTopWindow());
521 Maybe<InterceptionInfoArg> interceptionInfoArg;
522 nsIInterceptionInfo* interceptionInfo = aLoadInfo->InterceptionInfo();
523 if (interceptionInfo) {
524 Maybe<PrincipalInfo> triggeringPrincipalInfo;
525 if (interceptionInfo->TriggeringPrincipal()) {
526 triggeringPrincipalInfo.emplace();
527 rv = PrincipalToPrincipalInfo(interceptionInfo->TriggeringPrincipal(),
528 triggeringPrincipalInfo.ptr());
531 nsTArray<RedirectHistoryEntryInfo> redirectChain;
532 for (const nsCOMPtr<nsIRedirectHistoryEntry>& redirectEntry :
533 interceptionInfo->RedirectChain()) {
534 RedirectHistoryEntryInfo* entry = redirectChain.AppendElement();
535 rv = RHEntryToRHEntryInfo(redirectEntry, entry);
536 NS_ENSURE_SUCCESS(rv, rv);
539 interceptionInfoArg = Some(InterceptionInfoArg(
540 triggeringPrincipalInfo, interceptionInfo->ContentPolicyType(),
541 redirectChain, interceptionInfo->FromThirdParty()));
544 Maybe<uint64_t> overriddenFingerprintingSettingsArg;
545 Maybe<RFPTarget> overriddenFingerprintingSettings =
546 aLoadInfo->GetOverriddenFingerprintingSettings();
548 if (overriddenFingerprintingSettings) {
549 overriddenFingerprintingSettingsArg =
550 Some(uint64_t(overriddenFingerprintingSettings.ref()));
553 *outLoadInfoArgs = LoadInfoArgs(
554 loadingPrincipalInfo, triggeringPrincipalInfo, principalToInheritInfo,
555 topLevelPrincipalInfo, optionalResultPrincipalURI, triggeringRemoteType,
556 aLoadInfo->GetSandboxedNullPrincipalID(), aLoadInfo->GetSecurityFlags(),
557 aLoadInfo->GetSandboxFlags(), aLoadInfo->GetTriggeringSandboxFlags(),
558 aLoadInfo->GetTriggeringWindowId(),
559 aLoadInfo->GetTriggeringStorageAccess(),
560 aLoadInfo->InternalContentPolicyType(),
561 static_cast<uint32_t>(aLoadInfo->GetTainting()),
562 aLoadInfo->GetBlockAllMixedContent(),
563 aLoadInfo->GetUpgradeInsecureRequests(),
564 aLoadInfo->GetBrowserUpgradeInsecureRequests(),
565 aLoadInfo->GetBrowserDidUpgradeInsecureRequests(),
566 aLoadInfo->GetBrowserWouldUpgradeInsecureRequests(),
567 aLoadInfo->GetForceAllowDataURI(),
568 aLoadInfo->GetAllowInsecureRedirectToDataURI(),
569 aLoadInfo->GetSkipContentPolicyCheckForWebRequest(),
570 aLoadInfo->GetOriginalFrameSrcLoad(),
571 aLoadInfo->GetForceInheritPrincipalDropped(),
572 aLoadInfo->GetInnerWindowID(), aLoadInfo->GetBrowsingContextID(),
573 aLoadInfo->GetFrameBrowsingContextID(),
574 aLoadInfo->GetInitialSecurityCheckDone(),
575 aLoadInfo->GetIsInThirdPartyContext(), isThirdPartyContextToTopWindow,
576 aLoadInfo->GetIsFormSubmission(), aLoadInfo->GetSendCSPViolationEvents(),
577 aLoadInfo->GetOriginAttributes(), redirectChainIncludingInternalRedirects,
578 redirectChain, aLoadInfo->GetHasInjectedCookieForCookieBannerHandling(),
579 aLoadInfo->GetWasSchemelessInput(), aLoadInfo->GetHttpsUpgradeTelemetry(),
580 ipcClientInfo, ipcReservedClientInfo, ipcInitialClientInfo, ipcController,
581 aLoadInfo->CorsUnsafeHeaders(), aLoadInfo->GetForcePreflight(),
582 aLoadInfo->GetIsPreflight(), aLoadInfo->GetLoadTriggeredFromExternal(),
583 aLoadInfo->GetServiceWorkerTaintingSynthesized(),
584 aLoadInfo->GetDocumentHasUserInteracted(),
585 aLoadInfo->GetAllowListFutureDocumentsCreatedFromThisRedirectChain(),
586 aLoadInfo->GetNeedForCheckingAntiTrackingHeuristic(), cspNonce,
587 integrityMetadata, aLoadInfo->GetSkipContentSniffing(),
588 aLoadInfo->GetHttpsOnlyStatus(), aLoadInfo->GetHstsStatus(),
589 aLoadInfo->GetHasValidUserGestureActivation(),
590 aLoadInfo->GetTextDirectiveUserActivation(),
591 aLoadInfo->GetAllowDeprecatedSystemRequests(),
592 aLoadInfo->GetIsInDevToolsContext(), aLoadInfo->GetParserCreatedScript(),
593 aLoadInfo->GetIsFromProcessingFrameAttributes(),
594 aLoadInfo->GetIsMediaRequest(), aLoadInfo->GetIsMediaInitialRequest(),
595 aLoadInfo->GetIsFromObjectOrEmbed(), cookieJarSettingsArgs,
596 aLoadInfo->GetRequestBlockingReason(), maybeCspToInheritInfo,
597 aLoadInfo->GetStoragePermission(), overriddenFingerprintingSettingsArg,
598 aLoadInfo->GetIsMetaRefresh(), aLoadInfo->GetLoadingEmbedderPolicy(),
599 aLoadInfo->GetIsOriginTrialCoepCredentiallessEnabledForTopLevel(),
600 unstrippedURI, interceptionInfoArg, aLoadInfo->GetIsNewWindowTarget());
602 return NS_OK;
605 nsresult LoadInfoArgsToLoadInfo(const LoadInfoArgs& aLoadInfoArgs,
606 const nsACString& aOriginRemoteType,
607 nsILoadInfo** outLoadInfo) {
608 return LoadInfoArgsToLoadInfo(aLoadInfoArgs, aOriginRemoteType, nullptr,
609 outLoadInfo);
611 nsresult LoadInfoArgsToLoadInfo(const LoadInfoArgs& aLoadInfoArgs,
612 const nsACString& aOriginRemoteType,
613 nsINode* aCspToInheritLoadingContext,
614 nsILoadInfo** outLoadInfo) {
615 RefPtr<LoadInfo> loadInfo;
616 nsresult rv = LoadInfoArgsToLoadInfo(aLoadInfoArgs, aOriginRemoteType,
617 aCspToInheritLoadingContext,
618 getter_AddRefs(loadInfo));
619 NS_ENSURE_SUCCESS(rv, rv);
621 loadInfo.forget(outLoadInfo);
622 return NS_OK;
625 nsresult LoadInfoArgsToLoadInfo(const LoadInfoArgs& aLoadInfoArgs,
626 const nsACString& aOriginRemoteType,
627 LoadInfo** outLoadInfo) {
628 return LoadInfoArgsToLoadInfo(aLoadInfoArgs, aOriginRemoteType, nullptr,
629 outLoadInfo);
631 nsresult LoadInfoArgsToLoadInfo(const LoadInfoArgs& loadInfoArgs,
632 const nsACString& aOriginRemoteType,
633 nsINode* aCspToInheritLoadingContext,
634 LoadInfo** outLoadInfo) {
635 nsCOMPtr<nsIPrincipal> loadingPrincipal;
636 if (loadInfoArgs.requestingPrincipalInfo().isSome()) {
637 auto loadingPrincipalOrErr =
638 PrincipalInfoToPrincipal(loadInfoArgs.requestingPrincipalInfo().ref());
639 if (NS_WARN_IF(loadingPrincipalOrErr.isErr())) {
640 return loadingPrincipalOrErr.unwrapErr();
642 loadingPrincipal = loadingPrincipalOrErr.unwrap();
645 auto triggeringPrincipalOrErr =
646 PrincipalInfoToPrincipal(loadInfoArgs.triggeringPrincipalInfo());
647 if (NS_WARN_IF(triggeringPrincipalOrErr.isErr())) {
648 return triggeringPrincipalOrErr.unwrapErr();
650 nsCOMPtr<nsIPrincipal> triggeringPrincipal =
651 triggeringPrincipalOrErr.unwrap();
653 nsCOMPtr<nsIPrincipal> principalToInherit;
654 nsCOMPtr<nsIPrincipal> flattenedPrincipalToInherit;
655 if (loadInfoArgs.principalToInheritInfo().isSome()) {
656 auto principalToInheritOrErr =
657 PrincipalInfoToPrincipal(loadInfoArgs.principalToInheritInfo().ref());
658 if (NS_WARN_IF(principalToInheritOrErr.isErr())) {
659 return principalToInheritOrErr.unwrapErr();
661 flattenedPrincipalToInherit = principalToInheritOrErr.unwrap();
664 if (XRE_IsContentProcess()) {
665 auto targetBrowsingContextId = loadInfoArgs.frameBrowsingContextID()
666 ? loadInfoArgs.frameBrowsingContextID()
667 : loadInfoArgs.browsingContextID();
668 if (RefPtr<BrowsingContext> bc =
669 BrowsingContext::Get(targetBrowsingContextId)) {
670 auto [originalTriggeringPrincipal, originalPrincipalToInherit] =
671 bc->GetTriggeringAndInheritPrincipalsForCurrentLoad();
673 if (originalTriggeringPrincipal &&
674 originalTriggeringPrincipal->Equals(triggeringPrincipal)) {
675 triggeringPrincipal = originalTriggeringPrincipal;
677 if (originalPrincipalToInherit &&
678 (loadInfoArgs.securityFlags() &
679 nsILoadInfo::SEC_FORCE_INHERIT_PRINCIPAL) &&
680 originalPrincipalToInherit->Equals(flattenedPrincipalToInherit)) {
681 principalToInherit = originalPrincipalToInherit;
685 if (!principalToInherit && loadInfoArgs.principalToInheritInfo().isSome()) {
686 principalToInherit = flattenedPrincipalToInherit;
689 nsCOMPtr<nsIPrincipal> topLevelPrincipal;
690 if (loadInfoArgs.topLevelPrincipalInfo().isSome()) {
691 auto topLevelPrincipalOrErr =
692 PrincipalInfoToPrincipal(loadInfoArgs.topLevelPrincipalInfo().ref());
693 if (NS_WARN_IF(topLevelPrincipalOrErr.isErr())) {
694 return topLevelPrincipalOrErr.unwrapErr();
696 topLevelPrincipal = topLevelPrincipalOrErr.unwrap();
699 nsCOMPtr<nsIURI> resultPrincipalURI;
700 if (loadInfoArgs.resultPrincipalURI().isSome()) {
701 resultPrincipalURI = DeserializeURI(loadInfoArgs.resultPrincipalURI());
702 NS_ENSURE_TRUE(resultPrincipalURI, NS_ERROR_UNEXPECTED);
705 // If we received this message from a content process, reset
706 // triggeringRemoteType to the process which sent us the message. If the
707 // parent sent us the message, we trust it to provide the correct triggering
708 // remote type.
710 // This means that the triggering remote type will be reset if a LoadInfo is
711 // bounced through a content process, as the LoadInfo can no longer be
712 // validated to be coming from the originally specified remote type.
713 nsCString triggeringRemoteType = loadInfoArgs.triggeringRemoteType();
714 if (aOriginRemoteType != NOT_REMOTE_TYPE &&
715 aOriginRemoteType != triggeringRemoteType) {
716 triggeringRemoteType = aOriginRemoteType;
719 RedirectHistoryArray redirectChainIncludingInternalRedirects;
720 for (const RedirectHistoryEntryInfo& entryInfo :
721 loadInfoArgs.redirectChainIncludingInternalRedirects()) {
722 nsCOMPtr<nsIRedirectHistoryEntry> redirectHistoryEntry =
723 RHEntryInfoToRHEntry(entryInfo);
724 NS_ENSURE_TRUE(redirectHistoryEntry, NS_ERROR_UNEXPECTED);
725 redirectChainIncludingInternalRedirects.AppendElement(
726 redirectHistoryEntry.forget());
729 RedirectHistoryArray redirectChain;
730 for (const RedirectHistoryEntryInfo& entryInfo :
731 loadInfoArgs.redirectChain()) {
732 nsCOMPtr<nsIRedirectHistoryEntry> redirectHistoryEntry =
733 RHEntryInfoToRHEntry(entryInfo);
734 NS_ENSURE_TRUE(redirectHistoryEntry, NS_ERROR_UNEXPECTED);
735 redirectChain.AppendElement(redirectHistoryEntry.forget());
737 nsTArray<nsCOMPtr<nsIPrincipal>> ancestorPrincipals;
738 nsTArray<uint64_t> ancestorBrowsingContextIDs;
739 if (XRE_IsParentProcess() &&
740 (nsContentUtils::InternalContentPolicyTypeToExternal(
741 loadInfoArgs.contentPolicyType()) !=
742 ExtContentPolicy::TYPE_DOCUMENT)) {
743 // Only fill out ancestor principals and browsing context IDs when we
744 // are deserializing LoadInfoArgs to be LoadInfo for a subresource
745 RefPtr<BrowsingContext> parentBC =
746 BrowsingContext::Get(loadInfoArgs.browsingContextID());
747 if (parentBC) {
748 LoadInfo::ComputeAncestors(parentBC->Canonical(), ancestorPrincipals,
749 ancestorBrowsingContextIDs);
753 Maybe<ClientInfo> clientInfo;
754 if (loadInfoArgs.clientInfo().isSome()) {
755 clientInfo.emplace(ClientInfo(loadInfoArgs.clientInfo().ref()));
758 Maybe<ClientInfo> reservedClientInfo;
759 if (loadInfoArgs.reservedClientInfo().isSome()) {
760 reservedClientInfo.emplace(
761 ClientInfo(loadInfoArgs.reservedClientInfo().ref()));
764 Maybe<ClientInfo> initialClientInfo;
765 if (loadInfoArgs.initialClientInfo().isSome()) {
766 initialClientInfo.emplace(
767 ClientInfo(loadInfoArgs.initialClientInfo().ref()));
770 // We can have an initial client info or a reserved client info, but not both.
771 MOZ_DIAGNOSTIC_ASSERT(reservedClientInfo.isNothing() ||
772 initialClientInfo.isNothing());
773 NS_ENSURE_TRUE(
774 reservedClientInfo.isNothing() || initialClientInfo.isNothing(),
775 NS_ERROR_UNEXPECTED);
777 Maybe<ServiceWorkerDescriptor> controller;
778 if (loadInfoArgs.controller().isSome()) {
779 controller.emplace(
780 ServiceWorkerDescriptor(loadInfoArgs.controller().ref()));
783 nsCOMPtr<nsICookieJarSettings> cookieJarSettings;
784 CookieJarSettings::Deserialize(loadInfoArgs.cookieJarSettings(),
785 getter_AddRefs(cookieJarSettings));
787 Maybe<RFPTarget> overriddenFingerprintingSettings;
788 if (loadInfoArgs.overriddenFingerprintingSettings().isSome()) {
789 overriddenFingerprintingSettings.emplace(
790 RFPTarget(loadInfoArgs.overriddenFingerprintingSettings().ref()));
793 nsCOMPtr<nsIContentSecurityPolicy> cspToInherit;
794 Maybe<mozilla::ipc::CSPInfo> cspToInheritInfo =
795 loadInfoArgs.cspToInheritInfo();
796 if (cspToInheritInfo.isSome()) {
797 nsCOMPtr<Document> doc = do_QueryInterface(aCspToInheritLoadingContext);
798 cspToInherit = CSPInfoToCSP(cspToInheritInfo.ref(), doc);
801 // Restore the loadingContext for frames using the BrowsingContext's
802 // embedder element. Note that this only works if the embedder is
803 // same-process, so won't be fission compatible.
804 nsCOMPtr<nsINode> loadingContext;
805 RefPtr<BrowsingContext> frameBrowsingContext =
806 BrowsingContext::Get(loadInfoArgs.frameBrowsingContextID());
807 if (frameBrowsingContext) {
808 loadingContext = frameBrowsingContext->GetEmbedderElement();
811 Maybe<bool> isThirdPartyContextToTopWindow;
812 if (loadInfoArgs.isThirdPartyContextToTopWindow().isSome()) {
813 isThirdPartyContextToTopWindow.emplace(
814 loadInfoArgs.isThirdPartyContextToTopWindow().ref());
817 nsCOMPtr<nsIInterceptionInfo> interceptionInfo;
818 if (loadInfoArgs.interceptionInfo().isSome()) {
819 const InterceptionInfoArg& interceptionInfoArg =
820 loadInfoArgs.interceptionInfo().ref();
821 nsCOMPtr<nsIPrincipal> triggeringPrincipal;
822 if (interceptionInfoArg.triggeringPrincipalInfo().isSome()) {
823 auto triggeringPrincipalOrErr = PrincipalInfoToPrincipal(
824 interceptionInfoArg.triggeringPrincipalInfo().ref());
825 if (NS_WARN_IF(triggeringPrincipalOrErr.isErr())) {
826 return triggeringPrincipalOrErr.unwrapErr();
828 triggeringPrincipal = triggeringPrincipalOrErr.unwrap();
831 RedirectHistoryArray redirectChain;
832 for (const RedirectHistoryEntryInfo& entryInfo :
833 interceptionInfoArg.redirectChain()) {
834 nsCOMPtr<nsIRedirectHistoryEntry> redirectHistoryEntry =
835 RHEntryInfoToRHEntry(entryInfo);
836 NS_ENSURE_TRUE(redirectHistoryEntry, NS_ERROR_UNEXPECTED);
837 redirectChain.AppendElement(redirectHistoryEntry.forget());
840 interceptionInfo = new InterceptionInfo(
841 triggeringPrincipal, interceptionInfoArg.contentPolicyType(),
842 redirectChain, interceptionInfoArg.fromThirdParty());
845 RefPtr<mozilla::net::LoadInfo> loadInfo = new mozilla::net::LoadInfo(
846 loadingPrincipal, triggeringPrincipal, principalToInherit,
847 topLevelPrincipal, resultPrincipalURI, cookieJarSettings, cspToInherit,
848 triggeringRemoteType, loadInfoArgs.sandboxedNullPrincipalID(), clientInfo,
849 reservedClientInfo, initialClientInfo, controller,
850 loadInfoArgs.securityFlags(), loadInfoArgs.sandboxFlags(),
851 loadInfoArgs.triggeringSandboxFlags(), loadInfoArgs.triggeringWindowId(),
852 loadInfoArgs.triggeringStorageAccess(), loadInfoArgs.contentPolicyType(),
853 static_cast<LoadTainting>(loadInfoArgs.tainting()),
854 loadInfoArgs.blockAllMixedContent(),
855 loadInfoArgs.upgradeInsecureRequests(),
856 loadInfoArgs.browserUpgradeInsecureRequests(),
857 loadInfoArgs.browserDidUpgradeInsecureRequests(),
858 loadInfoArgs.browserWouldUpgradeInsecureRequests(),
859 loadInfoArgs.forceAllowDataURI(),
860 loadInfoArgs.allowInsecureRedirectToDataURI(),
861 loadInfoArgs.skipContentPolicyCheckForWebRequest(),
862 loadInfoArgs.originalFrameSrcLoad(),
863 loadInfoArgs.forceInheritPrincipalDropped(), loadInfoArgs.innerWindowID(),
864 loadInfoArgs.browsingContextID(), loadInfoArgs.frameBrowsingContextID(),
865 loadInfoArgs.initialSecurityCheckDone(),
866 loadInfoArgs.isInThirdPartyContext(), isThirdPartyContextToTopWindow,
867 loadInfoArgs.isFormSubmission(), loadInfoArgs.sendCSPViolationEvents(),
868 loadInfoArgs.originAttributes(),
869 std::move(redirectChainIncludingInternalRedirects),
870 std::move(redirectChain), std::move(ancestorPrincipals),
871 ancestorBrowsingContextIDs, loadInfoArgs.corsUnsafeHeaders(),
872 loadInfoArgs.forcePreflight(), loadInfoArgs.isPreflight(),
873 loadInfoArgs.loadTriggeredFromExternal(),
874 loadInfoArgs.serviceWorkerTaintingSynthesized(),
875 loadInfoArgs.documentHasUserInteracted(),
876 loadInfoArgs.allowListFutureDocumentsCreatedFromThisRedirectChain(),
877 loadInfoArgs.needForCheckingAntiTrackingHeuristic(),
878 loadInfoArgs.cspNonce(), loadInfoArgs.integrityMetadata(),
879 loadInfoArgs.skipContentSniffing(), loadInfoArgs.httpsOnlyStatus(),
880 loadInfoArgs.hstsStatus(), loadInfoArgs.hasValidUserGestureActivation(),
881 loadInfoArgs.textDirectiveUserActivation(),
882 // This function is only called for moving LoadInfo across processes.
883 // Same-document navigation won't cross process boundaries.
884 /* aIsSameDocumentNavigation */ false,
885 loadInfoArgs.allowDeprecatedSystemRequests(),
886 loadInfoArgs.isInDevToolsContext(), loadInfoArgs.parserCreatedScript(),
887 loadInfoArgs.storagePermission(), overriddenFingerprintingSettings,
888 loadInfoArgs.isMetaRefresh(), loadInfoArgs.requestBlockingReason(),
889 loadingContext, loadInfoArgs.loadingEmbedderPolicy(),
890 loadInfoArgs.originTrialCoepCredentiallessEnabledForTopLevel(),
891 loadInfoArgs.unstrippedURI(), interceptionInfo,
892 loadInfoArgs.hasInjectedCookieForCookieBannerHandling(),
893 loadInfoArgs.wasSchemelessInput(), loadInfoArgs.httpsUpgradeTelemetry(),
894 loadInfoArgs.isNewWindowTarget());
896 if (loadInfoArgs.isFromProcessingFrameAttributes()) {
897 loadInfo->SetIsFromProcessingFrameAttributes();
900 if (loadInfoArgs.isMediaRequest()) {
901 loadInfo->SetIsMediaRequest(true);
903 if (loadInfoArgs.isMediaInitialRequest()) {
904 loadInfo->SetIsMediaInitialRequest(true);
908 if (loadInfoArgs.isFromObjectOrEmbed()) {
909 loadInfo->SetIsFromObjectOrEmbed(true);
912 loadInfo.forget(outLoadInfo);
913 return NS_OK;
916 void LoadInfoToParentLoadInfoForwarder(
917 nsILoadInfo* aLoadInfo, ParentLoadInfoForwarderArgs* aForwarderArgsOut) {
918 Maybe<IPCServiceWorkerDescriptor> ipcController;
919 Maybe<ServiceWorkerDescriptor> controller(aLoadInfo->GetController());
920 if (controller.isSome()) {
921 ipcController.emplace(controller.ref().ToIPC());
924 uint32_t tainting = nsILoadInfo::TAINTING_BASIC;
925 Unused << aLoadInfo->GetTainting(&tainting);
927 Maybe<CookieJarSettingsArgs> cookieJarSettingsArgs;
929 nsCOMPtr<nsICookieJarSettings> cookieJarSettings;
930 nsresult rv =
931 aLoadInfo->GetCookieJarSettings(getter_AddRefs(cookieJarSettings));
932 CookieJarSettings* cs =
933 static_cast<CookieJarSettings*>(cookieJarSettings.get());
934 if (NS_SUCCEEDED(rv) && cookieJarSettings && cs->HasBeenChanged()) {
935 CookieJarSettingsArgs args;
936 cs->Serialize(args);
937 cookieJarSettingsArgs = Some(args);
940 nsCOMPtr<nsIURI> unstrippedURI;
941 Unused << aLoadInfo->GetUnstrippedURI(getter_AddRefs(unstrippedURI));
943 Maybe<bool> isThirdPartyContextToTopWindow;
944 if (static_cast<LoadInfo*>(aLoadInfo)
945 ->HasIsThirdPartyContextToTopWindowSet()) {
946 isThirdPartyContextToTopWindow.emplace(
947 aLoadInfo->GetIsThirdPartyContextToTopWindow());
950 Maybe<uint64_t> overriddenFingerprintingSettingsArg;
951 Maybe<RFPTarget> overriddenFingerprintingSettings =
952 aLoadInfo->GetOverriddenFingerprintingSettings();
954 if (overriddenFingerprintingSettings) {
955 overriddenFingerprintingSettingsArg =
956 Some(uint64_t(overriddenFingerprintingSettings.ref()));
959 *aForwarderArgsOut = ParentLoadInfoForwarderArgs(
960 aLoadInfo->GetAllowInsecureRedirectToDataURI(), ipcController, tainting,
961 aLoadInfo->GetSkipContentSniffing(), aLoadInfo->GetHttpsOnlyStatus(),
962 aLoadInfo->GetWasSchemelessInput(), aLoadInfo->GetHttpsUpgradeTelemetry(),
963 aLoadInfo->GetHstsStatus(), aLoadInfo->GetHasValidUserGestureActivation(),
964 aLoadInfo->GetTextDirectiveUserActivation(),
965 aLoadInfo->GetAllowDeprecatedSystemRequests(),
966 aLoadInfo->GetIsInDevToolsContext(), aLoadInfo->GetParserCreatedScript(),
967 aLoadInfo->GetTriggeringSandboxFlags(),
968 aLoadInfo->GetTriggeringWindowId(),
969 aLoadInfo->GetTriggeringStorageAccess(),
970 aLoadInfo->GetServiceWorkerTaintingSynthesized(),
971 aLoadInfo->GetDocumentHasUserInteracted(),
972 aLoadInfo->GetAllowListFutureDocumentsCreatedFromThisRedirectChain(),
973 cookieJarSettingsArgs, aLoadInfo->GetContainerFeaturePolicyInfo(),
974 aLoadInfo->GetRequestBlockingReason(), aLoadInfo->GetStoragePermission(),
975 overriddenFingerprintingSettingsArg, aLoadInfo->GetIsMetaRefresh(),
976 isThirdPartyContextToTopWindow, aLoadInfo->GetIsInThirdPartyContext(),
977 unstrippedURI);
980 nsresult MergeParentLoadInfoForwarder(
981 ParentLoadInfoForwarderArgs const& aForwarderArgs, nsILoadInfo* aLoadInfo) {
982 nsresult rv;
984 rv = aLoadInfo->SetAllowInsecureRedirectToDataURI(
985 aForwarderArgs.allowInsecureRedirectToDataURI());
986 NS_ENSURE_SUCCESS(rv, rv);
988 aLoadInfo->ClearController();
989 auto& controller = aForwarderArgs.controller();
990 if (controller.isSome()) {
991 aLoadInfo->SetController(ServiceWorkerDescriptor(controller.ref()));
994 if (aForwarderArgs.serviceWorkerTaintingSynthesized()) {
995 aLoadInfo->SynthesizeServiceWorkerTainting(
996 static_cast<LoadTainting>(aForwarderArgs.tainting()));
997 } else {
998 aLoadInfo->MaybeIncreaseTainting(aForwarderArgs.tainting());
1000 rv = aLoadInfo->SetTextDirectiveUserActivation(
1001 aForwarderArgs.textDirectiveUserActivation());
1002 NS_ENSURE_SUCCESS(rv, rv);
1004 rv = aLoadInfo->SetSkipContentSniffing(aForwarderArgs.skipContentSniffing());
1005 NS_ENSURE_SUCCESS(rv, rv);
1007 rv = aLoadInfo->SetHttpsOnlyStatus(aForwarderArgs.httpsOnlyStatus());
1008 NS_ENSURE_SUCCESS(rv, rv);
1010 rv = aLoadInfo->SetWasSchemelessInput(aForwarderArgs.wasSchemelessInput());
1011 NS_ENSURE_SUCCESS(rv, rv);
1013 rv = aLoadInfo->SetHttpsUpgradeTelemetry(
1014 aForwarderArgs.httpsUpgradeTelemetry());
1015 NS_ENSURE_SUCCESS(rv, rv);
1017 rv = aLoadInfo->SetHstsStatus(aForwarderArgs.hstsStatus());
1018 NS_ENSURE_SUCCESS(rv, rv);
1020 rv = aLoadInfo->SetTriggeringSandboxFlags(
1021 aForwarderArgs.triggeringSandboxFlags());
1022 NS_ENSURE_SUCCESS(rv, rv);
1024 rv = aLoadInfo->SetTriggeringWindowId(aForwarderArgs.triggeringWindowId());
1025 NS_ENSURE_SUCCESS(rv, rv);
1027 rv = aLoadInfo->SetTriggeringStorageAccess(
1028 aForwarderArgs.triggeringStorageAccess());
1029 NS_ENSURE_SUCCESS(rv, rv);
1031 rv = aLoadInfo->SetHasValidUserGestureActivation(
1032 aForwarderArgs.hasValidUserGestureActivation());
1033 NS_ENSURE_SUCCESS(rv, rv);
1035 rv = aLoadInfo->SetAllowDeprecatedSystemRequests(
1036 aForwarderArgs.allowDeprecatedSystemRequests());
1037 NS_ENSURE_SUCCESS(rv, rv);
1039 rv = aLoadInfo->SetIsInDevToolsContext(aForwarderArgs.isInDevToolsContext());
1040 NS_ENSURE_SUCCESS(rv, rv);
1042 rv = aLoadInfo->SetParserCreatedScript(aForwarderArgs.parserCreatedScript());
1043 NS_ENSURE_SUCCESS(rv, rv);
1045 MOZ_ALWAYS_SUCCEEDS(aLoadInfo->SetDocumentHasUserInteracted(
1046 aForwarderArgs.documentHasUserInteracted()));
1047 MOZ_ALWAYS_SUCCEEDS(
1048 aLoadInfo->SetAllowListFutureDocumentsCreatedFromThisRedirectChain(
1049 aForwarderArgs
1050 .allowListFutureDocumentsCreatedFromThisRedirectChain()));
1051 MOZ_ALWAYS_SUCCEEDS(aLoadInfo->SetRequestBlockingReason(
1052 aForwarderArgs.requestBlockingReason()));
1054 const Maybe<CookieJarSettingsArgs>& cookieJarSettingsArgs =
1055 aForwarderArgs.cookieJarSettings();
1056 if (cookieJarSettingsArgs.isSome()) {
1057 nsCOMPtr<nsICookieJarSettings> cookieJarSettings;
1058 nsresult rv =
1059 aLoadInfo->GetCookieJarSettings(getter_AddRefs(cookieJarSettings));
1060 if (NS_SUCCEEDED(rv) && cookieJarSettings) {
1061 static_cast<CookieJarSettings*>(cookieJarSettings.get())
1062 ->Merge(cookieJarSettingsArgs.ref());
1066 rv = aLoadInfo->SetStoragePermission(aForwarderArgs.storagePermission());
1067 NS_ENSURE_SUCCESS(rv, rv);
1069 rv = aLoadInfo->SetIsMetaRefresh(aForwarderArgs.isMetaRefresh());
1070 NS_ENSURE_SUCCESS(rv, rv);
1072 const Maybe<uint64_t> overriddenFingerprintingSettings =
1073 aForwarderArgs.overriddenFingerprintingSettings();
1074 if (overriddenFingerprintingSettings.isSome()) {
1075 aLoadInfo->SetOverriddenFingerprintingSettings(
1076 RFPTarget(overriddenFingerprintingSettings.ref()));
1079 static_cast<LoadInfo*>(aLoadInfo)->ClearIsThirdPartyContextToTopWindow();
1080 if (aForwarderArgs.isThirdPartyContextToTopWindow().isSome()) {
1081 rv = aLoadInfo->SetIsThirdPartyContextToTopWindow(
1082 aForwarderArgs.isThirdPartyContextToTopWindow().ref());
1084 NS_ENSURE_SUCCESS(rv, rv);
1086 rv = aLoadInfo->SetIsInThirdPartyContext(
1087 aForwarderArgs.isInThirdPartyContext());
1088 NS_ENSURE_SUCCESS(rv, rv);
1090 rv = aLoadInfo->SetUnstrippedURI(aForwarderArgs.unstrippedURI());
1091 NS_ENSURE_SUCCESS(rv, rv);
1093 if (aForwarderArgs.containerFeaturePolicyInfo()) {
1094 aLoadInfo->SetContainerFeaturePolicyInfo(
1095 *aForwarderArgs.containerFeaturePolicyInfo());
1098 return NS_OK;
1101 void LoadInfoToChildLoadInfoForwarder(
1102 nsILoadInfo* aLoadInfo, ChildLoadInfoForwarderArgs* aForwarderArgsOut) {
1103 Maybe<IPCClientInfo> ipcReserved;
1104 Maybe<ClientInfo> reserved(aLoadInfo->GetReservedClientInfo());
1105 if (reserved.isSome()) {
1106 ipcReserved.emplace(reserved.ref().ToIPC());
1109 Maybe<IPCClientInfo> ipcInitial;
1110 Maybe<ClientInfo> initial(aLoadInfo->GetInitialClientInfo());
1111 if (initial.isSome()) {
1112 ipcInitial.emplace(initial.ref().ToIPC());
1115 Maybe<IPCServiceWorkerDescriptor> ipcController;
1116 Maybe<ServiceWorkerDescriptor> controller(aLoadInfo->GetController());
1117 if (controller.isSome()) {
1118 ipcController.emplace(controller.ref().ToIPC());
1121 *aForwarderArgsOut =
1122 ChildLoadInfoForwarderArgs(ipcReserved, ipcInitial, ipcController,
1123 aLoadInfo->GetRequestBlockingReason());
1126 nsresult MergeChildLoadInfoForwarder(
1127 const ChildLoadInfoForwarderArgs& aForwarderArgs, nsILoadInfo* aLoadInfo) {
1128 Maybe<ClientInfo> reservedClientInfo;
1129 auto& ipcReserved = aForwarderArgs.reservedClientInfo();
1130 if (ipcReserved.isSome()) {
1131 reservedClientInfo.emplace(ClientInfo(ipcReserved.ref()));
1134 Maybe<ClientInfo> initialClientInfo;
1135 auto& ipcInitial = aForwarderArgs.initialClientInfo();
1136 if (ipcInitial.isSome()) {
1137 initialClientInfo.emplace(ClientInfo(ipcInitial.ref()));
1140 // There should only be at most one reserved or initial ClientInfo.
1141 if (NS_WARN_IF(reservedClientInfo.isSome() && initialClientInfo.isSome())) {
1142 return NS_ERROR_FAILURE;
1145 // If we received no reserved or initial ClientInfo, then we must not
1146 // already have one set. There are no use cases where this should
1147 // happen and we don't have a way to clear the current value.
1148 if (NS_WARN_IF(reservedClientInfo.isNothing() &&
1149 initialClientInfo.isNothing() &&
1150 (aLoadInfo->GetReservedClientInfo().isSome() ||
1151 aLoadInfo->GetInitialClientInfo().isSome()))) {
1152 return NS_ERROR_FAILURE;
1155 if (reservedClientInfo.isSome()) {
1156 // We need to override here instead of simply set the value. This
1157 // allows us to change the reserved client. This is necessary when
1158 // the ClientChannelHelper created a new reserved client in the
1159 // child-side of the redirect.
1160 aLoadInfo->OverrideReservedClientInfoInParent(reservedClientInfo.ref());
1161 } else if (initialClientInfo.isSome()) {
1162 aLoadInfo->SetInitialClientInfo(initialClientInfo.ref());
1165 aLoadInfo->ClearController();
1166 auto& controller = aForwarderArgs.controller();
1167 if (controller.isSome()) {
1168 aLoadInfo->SetController(ServiceWorkerDescriptor(controller.ref()));
1171 uint32_t blockingReason = aForwarderArgs.requestBlockingReason();
1172 if (blockingReason) {
1173 // We only want to override when non-null, so that any earlier set non-null
1174 // value is not reverted to 0.
1175 aLoadInfo->SetRequestBlockingReason(blockingReason);
1178 return NS_OK;
1181 } // namespace ipc
1182 } // namespace mozilla