Bug Summary

File:var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp
Warning:line 212, column 12
Value stored to 'rv' during its initialization is never read

Annotated Source Code

Press '?' to see keyboard shortcuts

clang -cc1 -cc1 -triple x86_64-pc-linux-gnu -analyze -disable-free -clear-ast-before-backend -disable-llvm-verifier -discard-value-names -main-file-name Unified_cpp_caps0.cpp -analyzer-checker=core -analyzer-checker=apiModeling -analyzer-checker=unix -analyzer-checker=deadcode -analyzer-checker=cplusplus -analyzer-checker=security.insecureAPI.UncheckedReturn -analyzer-checker=security.insecureAPI.getpw -analyzer-checker=security.insecureAPI.gets -analyzer-checker=security.insecureAPI.mktemp -analyzer-checker=security.insecureAPI.mkstemp -analyzer-checker=security.insecureAPI.vfork -analyzer-checker=nullability.NullPassedToNonnull -analyzer-checker=nullability.NullReturnedFromNonnull -analyzer-output plist -w -setup-static-analyzer -analyzer-config-compatibility-mode=true -mrelocation-model pic -pic-level 2 -fhalf-no-semantic-interposition -mframe-pointer=all -relaxed-aliasing -ffp-contract=off -fno-rounding-math -mconstructor-aliases -funwind-tables=2 -target-cpu x86-64 -tune-cpu generic -debugger-tuning=gdb -fdebug-compilation-dir=/var/lib/jenkins/workspace/firefox-scan-build/obj-x86_64-pc-linux-gnu/caps -fcoverage-compilation-dir=/var/lib/jenkins/workspace/firefox-scan-build/obj-x86_64-pc-linux-gnu/caps -resource-dir /usr/lib/llvm-18/lib/clang/18 -include /var/lib/jenkins/workspace/firefox-scan-build/config/gcc_hidden.h -include /var/lib/jenkins/workspace/firefox-scan-build/obj-x86_64-pc-linux-gnu/mozilla-config.h -I /var/lib/jenkins/workspace/firefox-scan-build/obj-x86_64-pc-linux-gnu/dist/stl_wrappers -I /var/lib/jenkins/workspace/firefox-scan-build/obj-x86_64-pc-linux-gnu/dist/system_wrappers -U _FORTIFY_SOURCE -D _FORTIFY_SOURCE=2 -D DEBUG=1 -D MOZ_HAS_MOZGLUE -D MOZILLA_INTERNAL_API -D IMPL_LIBXUL -D MOZ_SUPPORT_LEAKCHECKING -D STATIC_EXPORTABLE_JS_API -I /var/lib/jenkins/workspace/firefox-scan-build/caps -I /var/lib/jenkins/workspace/firefox-scan-build/obj-x86_64-pc-linux-gnu/caps -I /var/lib/jenkins/workspace/firefox-scan-build/docshell/base -I /var/lib/jenkins/workspace/firefox-scan-build/dom/base -I /var/lib/jenkins/workspace/firefox-scan-build/js/xpconnect/src -I /var/lib/jenkins/workspace/firefox-scan-build/netwerk/base -I /var/lib/jenkins/workspace/firefox-scan-build/netwerk/cookie -I /var/lib/jenkins/workspace/firefox-scan-build/toolkit/components/jsoncpp/include -I /var/lib/jenkins/workspace/firefox-scan-build/obj-x86_64-pc-linux-gnu/ipc/ipdl/_ipdlheaders -I /var/lib/jenkins/workspace/firefox-scan-build/ipc/chromium/src -I /var/lib/jenkins/workspace/firefox-scan-build/obj-x86_64-pc-linux-gnu/dist/include -I /var/lib/jenkins/workspace/firefox-scan-build/obj-x86_64-pc-linux-gnu/dist/include/nspr -I /var/lib/jenkins/workspace/firefox-scan-build/obj-x86_64-pc-linux-gnu/dist/include/nss -D MOZILLA_CLIENT -internal-isystem /usr/lib/gcc/x86_64-linux-gnu/14/../../../../include/c++/14 -internal-isystem /usr/lib/gcc/x86_64-linux-gnu/14/../../../../include/x86_64-linux-gnu/c++/14 -internal-isystem /usr/lib/gcc/x86_64-linux-gnu/14/../../../../include/c++/14/backward -internal-isystem /usr/lib/llvm-18/lib/clang/18/include -internal-isystem /usr/local/include -internal-isystem /usr/lib/gcc/x86_64-linux-gnu/14/../../../../x86_64-linux-gnu/include -internal-externc-isystem /usr/include/x86_64-linux-gnu -internal-externc-isystem /include -internal-externc-isystem /usr/include -O2 -Wno-error=tautological-type-limit-compare -Wno-invalid-offsetof -Wno-range-loop-analysis -Wno-deprecated-anon-enum-enum-conversion -Wno-deprecated-enum-enum-conversion -Wno-deprecated-this-capture -Wno-inline-new-delete -Wno-error=deprecated-declarations -Wno-error=array-bounds -Wno-error=free-nonheap-object -Wno-error=atomic-alignment -Wno-error=deprecated-builtins -Wno-psabi -Wno-error=builtin-macro-redefined -Wno-vla-cxx-extension -Wno-unknown-warning-option -fdeprecated-macro -ferror-limit 19 -stack-protector 2 -fstack-clash-protection -ftrivial-auto-var-init=pattern -fno-rtti -fgnuc-version=4.2.1 -fno-aligned-allocation -vectorize-loops -vectorize-slp -analyzer-checker optin.performance.Padding -analyzer-output=html -analyzer-config stable-report-filename=true -faddrsig -D__GCC_HAVE_DWARF2_CFI_ASM=1 -o /tmp/scan-build-2024-07-27-022226-2793976-1 -x c++ Unified_cpp_caps0.cpp
1/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2/* vim: set ts=2 sw=2 et tw=80: */
3/* This Source Code Form is subject to the terms of the Mozilla Public
4 * License, v. 2.0. If a copy of the MPL was not distributed with this
5 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
6
7#include "ExpandedPrincipal.h"
8#include "nsIClassInfoImpl.h"
9#include "nsIObjectInputStream.h"
10#include "nsReadableUtils.h"
11#include "mozilla/Base64.h"
12#include "mozilla/extensions/WebExtensionPolicy.h"
13#include "mozilla/JSONWriter.h"
14
15#include "js/JSON.h"
16#include "ExpandedPrincipalJSONHandler.h"
17#include "SubsumedPrincipalJSONHandler.h"
18
19using namespace mozilla;
20
21NS_IMPL_CLASSINFO(ExpandedPrincipal, nullptr, 0, NS_EXPANDEDPRINCIPAL_CID)extern nsresult ExpandedPrincipal_GetInterfacesHelper(nsTArray
<nsIID> & array); static const GenericClassInfo::ClassInfoData
kExpandedPrincipalClassInfoData = { ExpandedPrincipal_GetInterfacesHelper
, nullptr, 0 | nsIClassInfo::SINGLETON_CLASSINFO, { 0xe8ee88b0
, 0x5571, 0x4086, { 0xa4, 0x5b, 0x39, 0xa7, 0x16, 0x90, 0x6b,
0xdb } }, }; mozilla::AlignedStorage2<GenericClassInfo>
kExpandedPrincipalClassInfoDataPlace; nsIClassInfo* gExpandedPrincipal_classInfoGlobal
= nullptr;
22NS_IMPL_QUERY_INTERFACE_CI(ExpandedPrincipal, nsIPrincipal,static_assert(2 > 0, "Need more arguments to NS_IMPL_QUERY_INTERFACE_CI"
); nsresult ExpandedPrincipal::QueryInterface(const nsIID&
aIID, void** aInstancePtr) { do { if (!(aInstancePtr)) { NS_DebugBreak
(NS_DEBUG_ASSERTION, "QueryInterface requires a non-NULL destination!"
, "aInstancePtr", "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 23); MOZ_PretendNoReturn(); } } while (0); nsISupports* foundInterface
; if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t
<decltype(*this)>, nsIPrincipal>)) foundInterface = static_cast
<nsIPrincipal*>(this); else if (aIID.Equals(mozilla::detail
::kImplementedIID<std::remove_reference_t<decltype(*this
)>, nsIExpandedPrincipal>)) foundInterface = static_cast
<nsIExpandedPrincipal*>(this); else if (aIID.Equals(mozilla
::detail::kImplementedIID<std::remove_reference_t<decltype
(*this)>, nsISupports>)) foundInterface = static_cast<
nsISupports*>(static_cast<nsIPrincipal*>(this)); else
if (aIID.Equals((nsIClassInfo::COMTypeInfo<nsIClassInfo, void
>::kIID))) { if (!gExpandedPrincipal_classInfoGlobal) gExpandedPrincipal_classInfoGlobal
= new (kExpandedPrincipalClassInfoDataPlace.addr()) GenericClassInfo
(&kExpandedPrincipalClassInfoData); foundInterface = gExpandedPrincipal_classInfoGlobal
; } else foundInterface = 0; nsresult status; if (!foundInterface
) { do { static_assert( mozilla::detail::AssertionConditionType
<decltype(!aIID.Equals((nsISupports::COMTypeInfo<nsISupports
, void>::kIID)))>::isValid, "invalid assertion condition"
); if ((__builtin_expect(!!(!(!!(!aIID.Equals((nsISupports::COMTypeInfo
<nsISupports, void>::kIID))))), 0))) { do { } while (false
); MOZ_ReportAssertionFailure("!aIID.Equals((nsISupports::COMTypeInfo<nsISupports, void>::kIID))"
, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 23); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!aIID.Equals((nsISupports::COMTypeInfo<nsISupports, void>::kIID))"
")"); do { *((volatile int*)__null) = 23; __attribute__((nomerge
)) ::abort(); } while (false); } } while (false); status = NS_NOINTERFACE
; } else { (foundInterface)->AddRef(); status = NS_OK; } *
aInstancePtr = foundInterface; return status; }
23 nsIExpandedPrincipal)static_assert(2 > 0, "Need more arguments to NS_IMPL_QUERY_INTERFACE_CI"
); nsresult ExpandedPrincipal::QueryInterface(const nsIID&
aIID, void** aInstancePtr) { do { if (!(aInstancePtr)) { NS_DebugBreak
(NS_DEBUG_ASSERTION, "QueryInterface requires a non-NULL destination!"
, "aInstancePtr", "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 23); MOZ_PretendNoReturn(); } } while (0); nsISupports* foundInterface
; if (aIID.Equals(mozilla::detail::kImplementedIID<std::remove_reference_t
<decltype(*this)>, nsIPrincipal>)) foundInterface = static_cast
<nsIPrincipal*>(this); else if (aIID.Equals(mozilla::detail
::kImplementedIID<std::remove_reference_t<decltype(*this
)>, nsIExpandedPrincipal>)) foundInterface = static_cast
<nsIExpandedPrincipal*>(this); else if (aIID.Equals(mozilla
::detail::kImplementedIID<std::remove_reference_t<decltype
(*this)>, nsISupports>)) foundInterface = static_cast<
nsISupports*>(static_cast<nsIPrincipal*>(this)); else
if (aIID.Equals((nsIClassInfo::COMTypeInfo<nsIClassInfo, void
>::kIID))) { if (!gExpandedPrincipal_classInfoGlobal) gExpandedPrincipal_classInfoGlobal
= new (kExpandedPrincipalClassInfoDataPlace.addr()) GenericClassInfo
(&kExpandedPrincipalClassInfoData); foundInterface = gExpandedPrincipal_classInfoGlobal
; } else foundInterface = 0; nsresult status; if (!foundInterface
) { do { static_assert( mozilla::detail::AssertionConditionType
<decltype(!aIID.Equals((nsISupports::COMTypeInfo<nsISupports
, void>::kIID)))>::isValid, "invalid assertion condition"
); if ((__builtin_expect(!!(!(!!(!aIID.Equals((nsISupports::COMTypeInfo
<nsISupports, void>::kIID))))), 0))) { do { } while (false
); MOZ_ReportAssertionFailure("!aIID.Equals((nsISupports::COMTypeInfo<nsISupports, void>::kIID))"
, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 23); AnnotateMozCrashReason("MOZ_ASSERT" "(" "!aIID.Equals((nsISupports::COMTypeInfo<nsISupports, void>::kIID))"
")"); do { *((volatile int*)__null) = 23; __attribute__((nomerge
)) ::abort(); } while (false); } } while (false); status = NS_NOINTERFACE
; } else { (foundInterface)->AddRef(); status = NS_OK; } *
aInstancePtr = foundInterface; return status; }
24NS_IMPL_CI_INTERFACE_GETTER(ExpandedPrincipal, nsIPrincipal,static_assert(2 > 0, "Need more arguments to NS_IMPL_CI_INTERFACE_GETTER"
); nsresult ExpandedPrincipal_GetInterfacesHelper(nsTArray<
nsIID> & array) { array.Clear(); array.SetCapacity(2);
array.AppendElement((nsIPrincipal::COMTypeInfo<nsIPrincipal
, void>::kIID)); array.AppendElement((nsIExpandedPrincipal
::COMTypeInfo<nsIExpandedPrincipal, void>::kIID)); return
NS_OK; }
25 nsIExpandedPrincipal)static_assert(2 > 0, "Need more arguments to NS_IMPL_CI_INTERFACE_GETTER"
); nsresult ExpandedPrincipal_GetInterfacesHelper(nsTArray<
nsIID> & array) { array.Clear(); array.SetCapacity(2);
array.AppendElement((nsIPrincipal::COMTypeInfo<nsIPrincipal
, void>::kIID)); array.AppendElement((nsIExpandedPrincipal
::COMTypeInfo<nsIExpandedPrincipal, void>::kIID)); return
NS_OK; }
26
27ExpandedPrincipal::ExpandedPrincipal(
28 nsTArray<nsCOMPtr<nsIPrincipal>>&& aPrincipals,
29 const nsACString& aOriginNoSuffix, const OriginAttributes& aAttrs)
30 : BasePrincipal(eExpandedPrincipal, aOriginNoSuffix, aAttrs),
31 mPrincipals(std::move(aPrincipals)) {}
32
33ExpandedPrincipal::~ExpandedPrincipal() = default;
34
35already_AddRefed<ExpandedPrincipal> ExpandedPrincipal::Create(
36 const nsTArray<nsCOMPtr<nsIPrincipal>>& aAllowList,
37 const OriginAttributes& aAttrs) {
38 nsTArray<nsCOMPtr<nsIPrincipal>> principals;
39 for (size_t i = 0; i < aAllowList.Length(); ++i) {
40 principals.AppendElement(aAllowList[i]);
41 }
42
43 nsAutoCString origin;
44 origin.AssignLiteral("[Expanded Principal [");
45 StringJoinAppend(
46 origin, ", "_ns, principals,
47 [](nsACString& dest, const nsCOMPtr<nsIPrincipal>& principal) {
48 nsAutoCString subOrigin;
49 DebugOnly<nsresult> rv = principal->GetOrigin(subOrigin);
50 MOZ_ASSERT(NS_SUCCEEDED(rv))do { static_assert( mozilla::detail::AssertionConditionType<
decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)
)))>::isValid, "invalid assertion condition"); if ((__builtin_expect
(!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)
))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure
("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))", "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 50); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))"
")"); do { *((volatile int*)__null) = 50; __attribute__((nomerge
)) ::abort(); } while (false); } } while (false)
;
51 dest.Append(subOrigin);
52 });
53 origin.AppendLiteral("]]");
54
55 RefPtr<ExpandedPrincipal> ep =
56 new ExpandedPrincipal(std::move(principals), origin, aAttrs);
57 return ep.forget();
58}
59
60NS_IMETHODIMPnsresult
61ExpandedPrincipal::GetDomain(nsIURI** aDomain) {
62 *aDomain = nullptr;
63 return NS_OK;
64}
65
66NS_IMETHODIMPnsresult
67ExpandedPrincipal::SetDomain(nsIURI* aDomain) { return NS_OK; }
68
69bool ExpandedPrincipal::SubsumesInternal(
70 nsIPrincipal* aOther,
71 BasePrincipal::DocumentDomainConsideration aConsideration) {
72 // If aOther is an ExpandedPrincipal too, we break it down into its component
73 // nsIPrincipals, and check subsumes on each one.
74 if (Cast(aOther)->Is<ExpandedPrincipal>()) {
75 auto* expanded = Cast(aOther)->As<ExpandedPrincipal>();
76
77 for (auto& other : expanded->AllowList()) {
78 // Use SubsumesInternal rather than Subsumes here, since OriginAttribute
79 // checks are only done between non-expanded sub-principals, and we don't
80 // need to incur the extra virtual call overhead.
81 if (!SubsumesInternal(other, aConsideration)) {
82 return false;
83 }
84 }
85 return true;
86 }
87
88 // We're dealing with a regular principal. One of our principals must subsume
89 // it.
90 for (uint32_t i = 0; i < mPrincipals.Length(); ++i) {
91 if (Cast(mPrincipals[i])->Subsumes(aOther, aConsideration)) {
92 return true;
93 }
94 }
95
96 return false;
97}
98
99bool ExpandedPrincipal::MayLoadInternal(nsIURI* uri) {
100 for (uint32_t i = 0; i < mPrincipals.Length(); ++i) {
101 if (BasePrincipal::Cast(mPrincipals[i])->MayLoadInternal(uri)) {
102 return true;
103 }
104 }
105
106 return false;
107}
108
109uint32_t ExpandedPrincipal::GetHashValue() {
110 MOZ_CRASH("extended principal should never be used as key in a hash map")do { do { } while (false); MOZ_ReportCrash("" "extended principal should never be used as key in a hash map"
, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 110); AnnotateMozCrashReason("MOZ_CRASH(" "extended principal should never be used as key in a hash map"
")"); do { *((volatile int*)__null) = 110; __attribute__((nomerge
)) ::abort(); } while (false); } while (false)
;
111}
112
113NS_IMETHODIMPnsresult
114ExpandedPrincipal::GetURI(nsIURI** aURI) {
115 *aURI = nullptr;
116 return NS_OK;
117}
118
119const nsTArray<nsCOMPtr<nsIPrincipal>>& ExpandedPrincipal::AllowList() {
120 return mPrincipals;
121}
122
123NS_IMETHODIMPnsresult
124ExpandedPrincipal::GetBaseDomain(nsACString& aBaseDomain) {
125 return NS_ERROR_NOT_AVAILABLE;
126}
127
128NS_IMETHODIMPnsresult
129ExpandedPrincipal::GetAddonId(nsAString& aAddonId) {
130 aAddonId.Truncate();
131 return NS_OK;
132};
133
134bool ExpandedPrincipal::AddonHasPermission(const nsAtom* aPerm) {
135 for (size_t i = 0; i < mPrincipals.Length(); ++i) {
136 if (BasePrincipal::Cast(mPrincipals[i])->AddonHasPermission(aPerm)) {
137 return true;
138 }
139 }
140 return false;
141}
142
143bool ExpandedPrincipal::AddonAllowsLoad(nsIURI* aURI,
144 bool aExplicit /* = false */) {
145 for (const auto& principal : mPrincipals) {
146 if (Cast(principal)->AddonAllowsLoad(aURI, aExplicit)) {
147 return true;
148 }
149 }
150 return false;
151}
152
153void ExpandedPrincipal::SetCsp(nsIContentSecurityPolicy* aCSP) {
154 AssertIsOnMainThread();
155 mCSP = new nsMainThreadPtrHolder<nsIContentSecurityPolicy>(
156 "ExpandedPrincipal::mCSP", aCSP);
157}
158
159NS_IMETHODIMPnsresult
160ExpandedPrincipal::GetCsp(nsIContentSecurityPolicy** aCsp) {
161 AssertIsOnMainThread();
162 NS_IF_ADDREF(*aCsp = mCSP)ns_if_addref(*aCsp = mCSP);
163 return NS_OK;
164}
165
166nsIPrincipal* ExpandedPrincipal::PrincipalToInherit(nsIURI* aRequestedURI) {
167 if (aRequestedURI) {
168 // If a given sub-principal subsumes the given URI, use that principal for
169 // inheritance. In general, this only happens with certain CORS modes, loads
170 // with forced principal inheritance, and creation of XML documents from
171 // XMLHttpRequests or fetch requests. For URIs that normally inherit a
172 // principal (such as data: URIs), we fall back to the last principal in the
173 // allowlist.
174 for (const auto& principal : mPrincipals) {
175 if (Cast(principal)->MayLoadInternal(aRequestedURI)) {
176 return principal;
177 }
178 }
179 }
180 return mPrincipals.LastElement();
181}
182
183nsresult ExpandedPrincipal::GetScriptLocation(nsACString& aStr) {
184 aStr.AssignLiteral("[Expanded Principal [");
185 for (size_t i = 0; i < mPrincipals.Length(); ++i) {
186 if (i != 0) {
187 aStr.AppendLiteral(", ");
188 }
189
190 nsAutoCString spec;
191 nsresult rv =
192 nsJSPrincipals::get(mPrincipals.ElementAt(i))->GetScriptLocation(spec);
193 NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl
(__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName
(__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with "
"result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t
>(__rv), name ? " (" : "", name ? name : "", name ? ")" : ""
); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 193); return rv; } } while (false)
;
194
195 aStr.Append(spec);
196 }
197 aStr.AppendLiteral("]]");
198 return NS_OK;
199}
200
201//////////////////////////////////////////
202// Methods implementing nsISerializable //
203//////////////////////////////////////////
204
205// We've had way too many issues with unversioned serializations, so
206// explicitly version this one.
207static const uint32_t kSerializationVersion = 1;
208
209NS_IMETHODIMPnsresult
210ExpandedPrincipal::Deserializer::Read(nsIObjectInputStream* aStream) {
211 uint32_t version;
212 nsresult rv = aStream->Read32(&version);
Value stored to 'rv' during its initialization is never read
213 if (version != kSerializationVersion) {
214 MOZ_ASSERT(false,do { static_assert( mozilla::detail::AssertionConditionType<
decltype(false)>::isValid, "invalid assertion condition");
if ((__builtin_expect(!!(!(!!(false))), 0))) { do { } while (
false); MOZ_ReportAssertionFailure("false" " (" "We really need to add handling of the old(?) version here"
")", "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 215); AnnotateMozCrashReason("MOZ_ASSERT" "(" "false" ") ("
"We really need to add handling of the old(?) version here" ")"
); do { *((volatile int*)__null) = 215; __attribute__((nomerge
)) ::abort(); } while (false); } } while (false)
215 "We really need to add handling of the old(?) version here")do { static_assert( mozilla::detail::AssertionConditionType<
decltype(false)>::isValid, "invalid assertion condition");
if ((__builtin_expect(!!(!(!!(false))), 0))) { do { } while (
false); MOZ_ReportAssertionFailure("false" " (" "We really need to add handling of the old(?) version here"
")", "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 215); AnnotateMozCrashReason("MOZ_ASSERT" "(" "false" ") ("
"We really need to add handling of the old(?) version here" ")"
); do { *((volatile int*)__null) = 215; __attribute__((nomerge
)) ::abort(); } while (false); } } while (false)
;
216 return NS_ERROR_UNEXPECTED;
217 }
218
219 uint32_t count;
220 rv = aStream->Read32(&count);
221 if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) {
222 return rv;
223 }
224
225 nsTArray<nsCOMPtr<nsIPrincipal>> principals;
226 if (!principals.SetCapacity(count, fallible)) {
227 return NS_ERROR_OUT_OF_MEMORY;
228 }
229
230 for (uint32_t i = 0; i < count; ++i) {
231 nsCOMPtr<nsISupports> read;
232 rv = aStream->ReadObject(true, getter_AddRefs(read));
233 if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) {
234 return rv;
235 }
236
237 nsCOMPtr<nsIPrincipal> principal = do_QueryInterface(read);
238 if (!principal) {
239 return NS_ERROR_UNEXPECTED;
240 }
241
242 principals.AppendElement(std::move(principal));
243 }
244
245 mPrincipal = ExpandedPrincipal::Create(principals, OriginAttributes());
246 return NS_OK;
247}
248
249nsresult ExpandedPrincipal::GetSiteIdentifier(SiteIdentifier& aSite) {
250 // Call GetSiteIdentifier on each of our principals and return a new
251 // ExpandedPrincipal.
252
253 nsTArray<nsCOMPtr<nsIPrincipal>> allowlist;
254 for (const auto& principal : mPrincipals) {
255 SiteIdentifier site;
256 nsresult rv = Cast(principal)->GetSiteIdentifier(site);
257 NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl
(__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName
(__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with "
"result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t
>(__rv), name ? " (" : "", name ? name : "", name ? ")" : ""
); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 257); return rv; } } while (false)
;
258 allowlist.AppendElement(site.GetPrincipal());
259 }
260
261 RefPtr<ExpandedPrincipal> expandedPrincipal =
262 ExpandedPrincipal::Create(allowlist, OriginAttributesRef());
263 MOZ_ASSERT(expandedPrincipal, "ExpandedPrincipal::Create returned nullptr?")do { static_assert( mozilla::detail::AssertionConditionType<
decltype(expandedPrincipal)>::isValid, "invalid assertion condition"
); if ((__builtin_expect(!!(!(!!(expandedPrincipal))), 0))) {
do { } while (false); MOZ_ReportAssertionFailure("expandedPrincipal"
" (" "ExpandedPrincipal::Create returned nullptr?" ")", "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 263); AnnotateMozCrashReason("MOZ_ASSERT" "(" "expandedPrincipal"
") (" "ExpandedPrincipal::Create returned nullptr?" ")"); do
{ *((volatile int*)__null) = 263; __attribute__((nomerge)) ::
abort(); } while (false); } } while (false)
;
264
265 aSite.Init(expandedPrincipal);
266 return NS_OK;
267}
268
269nsresult ExpandedPrincipal::WriteJSONInnerProperties(JSONWriter& aWriter) {
270 aWriter.StartArrayProperty(JSONEnumKeyString<eSpecs>(),
271 JSONWriter::CollectionStyle::SingleLineStyle);
272
273 for (const auto& principal : mPrincipals) {
274 aWriter.StartObjectElement(JSONWriter::CollectionStyle::SingleLineStyle);
275
276 nsresult rv = BasePrincipal::Cast(principal)->WriteJSONProperties(aWriter);
277 NS_ENSURE_SUCCESS(rv, rv)do { nsresult __rv = rv; if (((bool)(__builtin_expect(!!(NS_FAILED_impl
(__rv)), 0)))) { const char* name = mozilla::GetStaticErrorName
(__rv); mozilla::SmprintfPointer msg = mozilla::Smprintf( "NS_ENSURE_SUCCESS(%s, %s) failed with "
"result 0x%" "X" "%s%s%s", "rv", "rv", static_cast<uint32_t
>(__rv), name ? " (" : "", name ? name : "", name ? ")" : ""
); NS_DebugBreak(NS_DEBUG_WARNING, msg.get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 277); return rv; } } while (false)
;
278
279 aWriter.EndObject();
280 }
281
282 aWriter.EndArray();
283
284 nsAutoCString suffix;
285 OriginAttributesRef().CreateSuffix(suffix);
286 if (suffix.Length() > 0) {
287 WriteJSONProperty<eSuffix>(aWriter, suffix);
288 }
289
290 return NS_OK;
291}
292
293bool ExpandedPrincipalJSONHandler::ProcessSubsumedResult(bool aResult) {
294 if (!aResult) {
295 NS_WARNING("Failed to parse subsumed principal")NS_DebugBreak(NS_DEBUG_WARNING, "Failed to parse subsumed principal"
, nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 295)
;
296 mState = State::Error;
297 return false;
298 }
299 return true;
300}
301
302bool ExpandedPrincipalJSONHandler::startObject() {
303 if (mSubsumedHandler.isSome()) {
304 return ProcessSubsumedResult(mSubsumedHandler->startObject());
305 }
306
307 switch (mState) {
308 case State::Init:
309 mState = State::StartObject;
310 break;
311 case State::StartArray:
312 mState = State::SubsumedPrincipal;
313 [[fallthrough]];
314 case State::SubsumedPrincipal:
315 mSubsumedHandler.emplace();
316
317 return ProcessSubsumedResult(mSubsumedHandler->startObject());
318 default:
319 NS_WARNING("Unexpected object value")NS_DebugBreak(NS_DEBUG_WARNING, "Unexpected object value", nullptr
, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 319)
;
320 mState = State::Error;
321 return false;
322 }
323
324 return true;
325}
326
327bool ExpandedPrincipalJSONHandler::propertyName(const JS::Latin1Char* name,
328 size_t length) {
329 if (mSubsumedHandler.isSome()) {
330 return ProcessSubsumedResult(mSubsumedHandler->propertyName(name, length));
331 }
332
333 switch (mState) {
334 case State::StartObject:
335 case State::AfterPropertyValue: {
336 if (length != 1) {
337 NS_WARNING(NS_DebugBreak(NS_DEBUG_WARNING, nsPrintfCString("Unexpected property name length: %zu"
, length) .get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 339)
338 nsPrintfCString("Unexpected property name length: %zu", length)NS_DebugBreak(NS_DEBUG_WARNING, nsPrintfCString("Unexpected property name length: %zu"
, length) .get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 339)
339 .get())NS_DebugBreak(NS_DEBUG_WARNING, nsPrintfCString("Unexpected property name length: %zu"
, length) .get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 339)
;
340 mState = State::Error;
341 return false;
342 }
343
344 char key = char(name[0]);
345 switch (key) {
346 case ExpandedPrincipal::SpecsKey:
347 mState = State::SpecsKey;
348 break;
349 case ExpandedPrincipal::SuffixKey:
350 mState = State::SuffixKey;
351 break;
352 default:
353 NS_WARNING(NS_DebugBreak(NS_DEBUG_WARNING, nsPrintfCString("Unexpected property name: '%c'"
, key).get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 354)
354 nsPrintfCString("Unexpected property name: '%c'", key).get())NS_DebugBreak(NS_DEBUG_WARNING, nsPrintfCString("Unexpected property name: '%c'"
, key).get(), nullptr, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 354)
;
355 mState = State::Error;
356 return false;
357 }
358 break;
359 }
360 default:
361 NS_WARNING("Unexpected property name")NS_DebugBreak(NS_DEBUG_WARNING, "Unexpected property name", nullptr
, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 361)
;
362 mState = State::Error;
363 return false;
364 }
365
366 return true;
367}
368
369bool ExpandedPrincipalJSONHandler::endObject() {
370 if (mSubsumedHandler.isSome()) {
371 if (!ProcessSubsumedResult(mSubsumedHandler->endObject())) {
372 return false;
373 }
374 if (mSubsumedHandler->HasAccepted()) {
375 nsCOMPtr<nsIPrincipal> principal = mSubsumedHandler->mPrincipal.forget();
376 mSubsumedHandler.reset();
377 mAllowList.AppendElement(principal);
378 }
379 return true;
380 }
381
382 switch (mState) {
383 case State::AfterPropertyValue:
384 mPrincipal = ExpandedPrincipal::Create(mAllowList, mAttrs);
385 MOZ_ASSERT(mPrincipal)do { static_assert( mozilla::detail::AssertionConditionType<
decltype(mPrincipal)>::isValid, "invalid assertion condition"
); if ((__builtin_expect(!!(!(!!(mPrincipal))), 0))) { do { }
while (false); MOZ_ReportAssertionFailure("mPrincipal", "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 385); AnnotateMozCrashReason("MOZ_ASSERT" "(" "mPrincipal" ")"
); do { *((volatile int*)__null) = 385; __attribute__((nomerge
)) ::abort(); } while (false); } } while (false)
;
386
387 mState = State::EndObject;
388 break;
389 default:
390 NS_WARNING("Unexpected end of object")NS_DebugBreak(NS_DEBUG_WARNING, "Unexpected end of object", nullptr
, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 390)
;
391 mState = State::Error;
392 return false;
393 }
394
395 return true;
396}
397
398bool ExpandedPrincipalJSONHandler::startArray() {
399 switch (mState) {
400 case State::SpecsKey:
401 mState = State::StartArray;
402 break;
403 default:
404 NS_WARNING("Unexpected array value")NS_DebugBreak(NS_DEBUG_WARNING, "Unexpected array value", nullptr
, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 404)
;
405 mState = State::Error;
406 return false;
407 }
408
409 return true;
410}
411
412bool ExpandedPrincipalJSONHandler::endArray() {
413 switch (mState) {
414 case State::SubsumedPrincipal: {
415 mState = State::AfterPropertyValue;
416 break;
417 }
418 default:
419 NS_WARNING("Unexpected end of array")NS_DebugBreak(NS_DEBUG_WARNING, "Unexpected end of array", nullptr
, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 419)
;
420 mState = State::Error;
421 return false;
422 }
423
424 return true;
425}
426
427bool ExpandedPrincipalJSONHandler::stringValue(const JS::Latin1Char* str,
428 size_t length) {
429 if (mSubsumedHandler.isSome()) {
430 return ProcessSubsumedResult(mSubsumedHandler->stringValue(str, length));
431 }
432
433 switch (mState) {
434 case State::SpecsKey: {
435 nsDependentCSubstring specs(reinterpret_cast<const char*>(str), length);
436
437 for (const nsACString& each : specs.Split(',')) {
438 nsAutoCString result;
439 nsresult rv = Base64Decode(each, result);
440 MOZ_ASSERT(NS_SUCCEEDED(rv), "failed to decode")do { static_assert( mozilla::detail::AssertionConditionType<
decltype(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)
)))>::isValid, "invalid assertion condition"); if ((__builtin_expect
(!!(!(!!(((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)
))))), 0))) { do { } while (false); MOZ_ReportAssertionFailure
("((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))" " ("
"failed to decode" ")", "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 440); AnnotateMozCrashReason("MOZ_ASSERT" "(" "((bool)(__builtin_expect(!!(!NS_FAILED_impl(rv)), 1)))"
") (" "failed to decode" ")"); do { *((volatile int*)__null)
= 440; __attribute__((nomerge)) ::abort(); } while (false); }
} while (false)
;
441 if (NS_FAILED(rv)((bool)(__builtin_expect(!!(NS_FAILED_impl(rv)), 0)))) {
442 mState = State::Error;
443 return false;
444 }
445
446 nsCOMPtr<nsIPrincipal> principal = BasePrincipal::FromJSON(result);
447 if (!principal) {
448 mState = State::Error;
449 return false;
450 }
451 mAllowList.AppendElement(principal);
452 }
453
454 mState = State::AfterPropertyValue;
455 break;
456 }
457 case State::SuffixKey: {
458 nsDependentCSubstring attrs(reinterpret_cast<const char*>(str), length);
459 if (!mAttrs.PopulateFromSuffix(attrs)) {
460 mState = State::Error;
461 return false;
462 }
463
464 mState = State::AfterPropertyValue;
465 break;
466 }
467 default:
468 NS_WARNING("Unexpected string value")NS_DebugBreak(NS_DEBUG_WARNING, "Unexpected string value", nullptr
, "/var/lib/jenkins/workspace/firefox-scan-build/caps/ExpandedPrincipal.cpp"
, 468)
;
469 mState = State::Error;
470 return false;
471 }
472
473 return true;
474}
475
476NS_IMETHODIMPnsresult
477ExpandedPrincipal::IsThirdPartyURI(nsIURI* aURI, bool* aRes) {
478 // ExpandedPrincipal for extension content scripts consist of two principals,
479 // the document's principal and the extension's principal.
480 // To make sure that the third-party check behaves like the web page on which
481 // the content script is running, ignore the extension's principal.
482
483 for (const auto& principal : mPrincipals) {
484 if (!Cast(principal)->AddonPolicyCore()) {
485 return Cast(principal)->IsThirdPartyURI(aURI, aRes);
486 }
487 }
488
489 if (mPrincipals.IsEmpty()) {
490 *aRes = true;
491 return NS_OK;
492 }
493
494 return Cast(mPrincipals[0])->IsThirdPartyURI(aURI, aRes);
495}