PostMessageEvent.cpp (11422B)
1 /* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ 2 /* vim: set ts=8 sts=2 et sw=2 tw=80: */ 3 /* This Source Code Form is subject to the terms of the Mozilla Public 4 * License, v. 2.0. If a copy of the MPL was not distributed with this 5 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ 6 7 #include "PostMessageEvent.h" 8 9 #include "MessageEvent.h" 10 #include "mozilla/BasePrincipal.h" 11 #include "mozilla/EventDispatcher.h" 12 #include "mozilla/StaticPrefs_dom.h" 13 #include "mozilla/dom/BrowsingContext.h" 14 #include "mozilla/dom/BrowsingContextGroup.h" 15 #include "mozilla/dom/DocGroup.h" 16 #include "mozilla/dom/DocumentInlines.h" 17 #include "mozilla/dom/MessageEventBinding.h" 18 #include "mozilla/dom/MessagePort.h" 19 #include "mozilla/dom/RootedDictionary.h" 20 #include "nsDocShell.h" 21 #include "nsGlobalWindowInner.h" 22 #include "nsGlobalWindowOuter.h" 23 #include "nsIConsoleService.h" 24 #include "nsIPrincipal.h" 25 #include "nsIScriptError.h" 26 #include "nsPresContext.h" 27 #include "nsQueryObject.h" 28 #include "nsServiceManagerUtils.h" 29 30 namespace mozilla::dom { 31 32 PostMessageEvent::PostMessageEvent(BrowsingContext* aSource, 33 const nsAString& aCallerOrigin, 34 nsGlobalWindowOuter* aTargetWindow, 35 nsIPrincipal* aProvidedPrincipal, 36 uint64_t aCallerWindowID, nsIURI* aCallerURI, 37 const nsCString& aScriptLocation, 38 bool aIsFromPrivateWindow, 39 const Maybe<nsID>& aCallerAgentClusterId) 40 : Runnable("dom::PostMessageEvent"), 41 mSource(aSource), 42 mCallerOrigin(aCallerOrigin), 43 mTargetWindow(aTargetWindow), 44 mProvidedPrincipal(aProvidedPrincipal), 45 mCallerWindowID(aCallerWindowID), 46 mCallerAgentClusterId(aCallerAgentClusterId), 47 mCallerURI(aCallerURI), 48 mScriptLocation(Some(aScriptLocation)), 49 mIsFromPrivateWindow(aIsFromPrivateWindow) {} 50 51 PostMessageEvent::~PostMessageEvent() = default; 52 53 // TODO: Convert this to MOZ_CAN_RUN_SCRIPT (bug 1415230, bug 1535398) 54 MOZ_CAN_RUN_SCRIPT_BOUNDARY NS_IMETHODIMP PostMessageEvent::Run() { 55 // Note: We don't init this AutoJSAPI with targetWindow, because we do not 56 // want exceptions during message deserialization to trigger error events on 57 // targetWindow. 58 AutoJSAPI jsapi; 59 jsapi.Init(); 60 JSContext* cx = jsapi.cx(); 61 62 // The document URI is just used for the principal mismatch error message 63 // below. Use a stack variable so mCallerURI is not held onto after 64 // this method finishes, regardless of the method outcome. 65 nsCOMPtr<nsIURI> callerURI = std::move(mCallerURI); 66 67 // If we bailed before this point we're going to leak mMessage, but 68 // that's probably better than crashing. 69 70 RefPtr<nsGlobalWindowInner> targetWindow; 71 if (mTargetWindow->IsClosedOrClosing() || 72 !(targetWindow = nsGlobalWindowInner::Cast( 73 mTargetWindow->GetCurrentInnerWindow())) || 74 targetWindow->IsDying()) 75 return NS_OK; 76 77 // If the window's document has suppressed event handling, hand off this event 78 // for running later. We check the top window's document so that when multiple 79 // same-origin windows exist in the same top window, postMessage events will 80 // be delivered in the same order they were posted, regardless of which window 81 // they were posted to. 82 if (nsCOMPtr<nsPIDOMWindowOuter> topWindow = 83 targetWindow->GetOuterWindow()->GetInProcessTop()) { 84 if (nsCOMPtr<nsPIDOMWindowInner> topInner = 85 topWindow->GetCurrentInnerWindow()) { 86 if (topInner->GetExtantDoc() && 87 topInner->GetExtantDoc()->SuspendPostMessageEvent(this)) { 88 return NS_OK; 89 } 90 } 91 } 92 93 JSAutoRealm ar(cx, targetWindow->GetWrapper()); 94 95 // Ensure that any origin which might have been provided is the origin of this 96 // window's document. Note that we do this *now* instead of when postMessage 97 // is called because the target window might have been navigated to a 98 // different location between then and now. If this check happened when 99 // postMessage was called, it would be fairly easy for a malicious webpage to 100 // intercept messages intended for another site by carefully timing navigation 101 // of the target window so it changed location after postMessage but before 102 // now. 103 if (mProvidedPrincipal) { 104 // Get the target's origin either from its principal or, in the case the 105 // principal doesn't carry a URI (e.g. the system principal), the target's 106 // document. 107 nsIPrincipal* targetPrin = targetWindow->GetPrincipal(); 108 if (NS_WARN_IF(!targetPrin)) return NS_OK; 109 110 // Note: This is contrary to the spec with respect to file: URLs, which 111 // the spec groups into a single origin, but given we intentionally 112 // don't do that in other places it seems better to hold the line for 113 // now. Long-term, we want HTML5 to address this so that we can 114 // be compliant while being safer. 115 if (!targetPrin->Equals(mProvidedPrincipal)) { 116 OriginAttributes sourceAttrs = mProvidedPrincipal->OriginAttributesRef(); 117 OriginAttributes targetAttrs = targetPrin->OriginAttributesRef(); 118 119 MOZ_DIAGNOSTIC_ASSERT( 120 sourceAttrs.mUserContextId == targetAttrs.mUserContextId, 121 "Target and source should have the same userContextId attribute."); 122 123 nsAutoString providedOrigin, targetOrigin; 124 nsresult rv = nsContentUtils::GetWebExposedOriginSerialization( 125 targetPrin, targetOrigin); 126 NS_ENSURE_SUCCESS(rv, rv); 127 rv = nsContentUtils::GetWebExposedOriginSerialization(mProvidedPrincipal, 128 providedOrigin); 129 NS_ENSURE_SUCCESS(rv, rv); 130 131 nsAutoString errorText; 132 nsContentUtils::FormatLocalizedString( 133 errorText, nsContentUtils::eDOM_PROPERTIES, 134 "TargetPrincipalDoesNotMatch", providedOrigin, targetOrigin); 135 136 nsCOMPtr<nsIScriptError> errorObject = 137 do_CreateInstance(NS_SCRIPTERROR_CONTRACTID, &rv); 138 NS_ENSURE_SUCCESS(rv, rv); 139 140 if (mCallerWindowID == 0) { 141 rv = errorObject->Init(errorText, mScriptLocation.value(), 0, 0, 142 nsIScriptError::errorFlag, "DOM Window"_ns, 143 mIsFromPrivateWindow, 144 mProvidedPrincipal->IsSystemPrincipal()); 145 } else if (callerURI) { 146 rv = errorObject->InitWithSourceURI(errorText, callerURI, 0, 0, 147 nsIScriptError::errorFlag, 148 "DOM Window"_ns, mCallerWindowID); 149 } else { 150 rv = errorObject->InitWithWindowID(errorText, mScriptLocation.value(), 151 0, 0, nsIScriptError::errorFlag, 152 "DOM Window"_ns, mCallerWindowID); 153 } 154 NS_ENSURE_SUCCESS(rv, rv); 155 156 nsCOMPtr<nsIConsoleService> consoleService = 157 do_GetService(NS_CONSOLESERVICE_CONTRACTID, &rv); 158 NS_ENSURE_SUCCESS(rv, rv); 159 160 return consoleService->LogMessage(errorObject); 161 } 162 } 163 164 IgnoredErrorResult rv; 165 JS::Rooted<JS::Value> messageData(cx); 166 nsCOMPtr<mozilla::dom::EventTarget> eventTarget = 167 do_QueryObject(targetWindow); 168 169 JS::CloneDataPolicy cloneDataPolicy; 170 171 MOZ_DIAGNOSTIC_ASSERT(targetWindow); 172 if (mCallerAgentClusterId.isSome() && targetWindow->GetDocGroup() && 173 targetWindow->GetDocGroup()->AgentClusterId().Equals( 174 mCallerAgentClusterId.ref())) { 175 cloneDataPolicy.allowIntraClusterClonableSharedObjects(); 176 } 177 178 if (targetWindow->IsSharedMemoryAllowed()) { 179 cloneDataPolicy.allowSharedMemoryObjects(); 180 } 181 182 if (mHolder.empty()) { 183 DispatchError(cx, targetWindow, eventTarget); 184 return NS_OK; 185 } 186 187 StructuredCloneHolder* holder; 188 if (mHolder.constructed<StructuredCloneHolder>()) { 189 mHolder.ref<StructuredCloneHolder>().Read( 190 targetWindow->AsGlobal(), cx, &messageData, cloneDataPolicy, rv); 191 holder = &mHolder.ref<StructuredCloneHolder>(); 192 } else { 193 MOZ_ASSERT(mHolder.constructed<ipc::StructuredCloneData>()); 194 mHolder.ref<ipc::StructuredCloneData>().Read(cx, &messageData, rv); 195 holder = &mHolder.ref<ipc::StructuredCloneData>(); 196 } 197 if (NS_WARN_IF(rv.Failed())) { 198 JS_ClearPendingException(cx); 199 DispatchError(cx, targetWindow, eventTarget); 200 return NS_OK; 201 } 202 203 // Create the event 204 RefPtr<MessageEvent> event = new MessageEvent(eventTarget, nullptr, nullptr); 205 206 Nullable<WindowProxyOrMessagePortOrServiceWorker> source; 207 if (mSource) { 208 source.SetValue().SetAsWindowProxy() = mSource; 209 } 210 211 Sequence<OwningNonNull<MessagePort>> ports; 212 if (!holder->TakeTransferredPortsAsSequence(ports)) { 213 DispatchError(cx, targetWindow, eventTarget); 214 return NS_OK; 215 } 216 217 event->InitMessageEvent(nullptr, u"message"_ns, CanBubble::eNo, 218 Cancelable::eNo, messageData, mCallerOrigin, u""_ns, 219 source, ports); 220 221 Dispatch(targetWindow, event); 222 return NS_OK; 223 } 224 225 void PostMessageEvent::DispatchError(JSContext* aCx, 226 nsGlobalWindowInner* aTargetWindow, 227 mozilla::dom::EventTarget* aEventTarget) { 228 RootedDictionary<MessageEventInit> init(aCx); 229 init.mBubbles = false; 230 init.mCancelable = false; 231 init.mOrigin = mCallerOrigin; 232 233 if (mSource) { 234 init.mSource.SetValue().SetAsWindowProxy() = mSource; 235 } 236 237 RefPtr<Event> event = 238 MessageEvent::Constructor(aEventTarget, u"messageerror"_ns, init); 239 Dispatch(aTargetWindow, event); 240 } 241 242 void PostMessageEvent::Dispatch(nsGlobalWindowInner* aTargetWindow, 243 Event* aEvent) { 244 // We can't simply call dispatchEvent on the window because doing so ends 245 // up flipping the trusted bit on the event, and we don't want that to 246 // happen because then untrusted content can call postMessage on a chrome 247 // window if it can get a reference to it. 248 249 RefPtr<nsPresContext> presContext = 250 aTargetWindow->GetExtantDoc()->GetPresContext(); 251 252 aEvent->SetTrusted(true); 253 WidgetEvent* internalEvent = aEvent->WidgetEventPtr(); 254 255 nsEventStatus status = nsEventStatus_eIgnore; 256 EventDispatcher::Dispatch(aTargetWindow, presContext, internalEvent, aEvent, 257 &status); 258 } 259 260 static nsresult MaybeThrottle(nsGlobalWindowOuter* aTargetWindow, 261 PostMessageEvent* aEvent) { 262 BrowsingContext* bc = aTargetWindow->GetBrowsingContext(); 263 if (!bc) { 264 return NS_ERROR_FAILURE; 265 } 266 bc = bc->Top(); 267 if (!bc->IsLoading()) { 268 return NS_ERROR_FAILURE; 269 } 270 if (nsContentUtils::IsPDFJS(aTargetWindow->GetPrincipal())) { 271 // pdf.js is known to block the load event on a worker's postMessage event. 272 // Avoid throttling postMessage for pdf.js to avoid pathological wait times, 273 // see bug 1840762. 274 return NS_ERROR_FAILURE; 275 } 276 if (!StaticPrefs::dom_separate_event_queue_for_post_message_enabled()) { 277 return NS_ERROR_FAILURE; 278 } 279 return bc->Group()->QueuePostMessageEvent(aEvent); 280 } 281 282 void PostMessageEvent::DispatchToTargetThread(ErrorResult& aError) { 283 if (NS_SUCCEEDED(MaybeThrottle(mTargetWindow, this))) { 284 return; 285 } 286 aError = mTargetWindow->Dispatch(do_AddRef(this)); 287 } 288 289 } // namespace mozilla::dom