dom/security/fuzztest/csp_fuzzer.cpp
author Masayuki Nakano <masayuki@d-toybox.com>
Sun, 16 Jan 2022 06:21:17 +0000
changeset 604634 9ef0614a59629916c1e182eb8eda055b0b0e8b32
parent 558319 93fabad45659d172b723c9606215d3acaab54df1
permissions -rw-r--r--
Bug 1749299 - Make `HTMLEditor::HandleInsertLinefeed()` stop handling it if insertion point cannot have text nodes r=m_kato Ideally, it should not be called when the editor cannot insert new text node. However, the callers are complicated. Therefore, let's check in it for avoiding making the callers more complicated. Fortunately, this is not realistic path for normal web apps. Therefore, the compatibility of the behavior is not matter. That's the reason why this patch does not have a test comparing the result. Differential Revision: https://phabricator.services.mozilla.com/D135826

/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at https://mozilla.org/MPL/2.0/. */

#include "FuzzingInterface.h"
#include "mozilla/BasePrincipal.h"
#include "nsComponentManagerUtils.h"
#include "nsCSPContext.h"
#include "nsNetUtil.h"
#include "nsStringFwd.h"

static int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size) {
  nsresult ret;
  nsCOMPtr<nsIURI> selfURI;
  ret = NS_NewURI(getter_AddRefs(selfURI), "http://selfuri.com");
  if (ret != NS_OK) return 0;

  mozilla::OriginAttributes attrs;
  nsCOMPtr<nsIPrincipal> selfURIPrincipal =
      mozilla::BasePrincipal::CreateContentPrincipal(selfURI, attrs);
  if (!selfURIPrincipal) return 0;

  nsCOMPtr<nsIContentSecurityPolicy> csp =
      do_CreateInstance(NS_CSPCONTEXT_CONTRACTID, &ret);
  if (ret != NS_OK) return 0;

  ret =
      csp->SetRequestContextWithPrincipal(selfURIPrincipal, selfURI, u""_ns, 0);
  if (ret != NS_OK) return 0;

  NS_ConvertASCIItoUTF16 policy(reinterpret_cast<const char*>(data), size);
  if (!policy.get()) return 0;
  csp->AppendPolicy(policy, false, false);

  return 0;
}

MOZ_FUZZING_INTERFACE_RAW(nullptr, LLVMFuzzerTestOneInput,
                          ContentSecurityPolicyParser);