summaryrefslogtreecommitdiffstats
path: root/dom/security/nsMixedContentBlocker.h
diff options
context:
space:
mode:
authorMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
committerMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
commit5f8de423f190bbb79a62f804151bc24824fa32d8 (patch)
tree10027f336435511475e392454359edea8e25895d /dom/security/nsMixedContentBlocker.h
parent49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff)
downloadUXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip
Add m-esr52 at 52.6.0
Diffstat (limited to 'dom/security/nsMixedContentBlocker.h')
-rw-r--r--dom/security/nsMixedContentBlocker.h105
1 files changed, 105 insertions, 0 deletions
diff --git a/dom/security/nsMixedContentBlocker.h b/dom/security/nsMixedContentBlocker.h
new file mode 100644
index 000000000..539c3ebbb
--- /dev/null
+++ b/dom/security/nsMixedContentBlocker.h
@@ -0,0 +1,105 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* vim: set ts=8 sts=2 et sw=2 tw=80: */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#ifndef nsMixedContentBlocker_h___
+#define nsMixedContentBlocker_h___
+
+#define NS_MIXEDCONTENTBLOCKER_CONTRACTID "@mozilla.org/mixedcontentblocker;1"
+/* daf1461b-bf29-4f88-8d0e-4bcdf332c862 */
+#define NS_MIXEDCONTENTBLOCKER_CID \
+{ 0xdaf1461b, 0xbf29, 0x4f88, \
+ { 0x8d, 0x0e, 0x4b, 0xcd, 0xf3, 0x32, 0xc8, 0x62 } }
+
+// This enum defines type of content that is detected when an
+// nsMixedContentEvent fires
+enum MixedContentTypes {
+ // "Active" content, such as fonts, plugin content, JavaScript, stylesheets,
+ // iframes, WebSockets, and XHR
+ eMixedScript,
+ // "Display" content, such as images, audio, video, and <a ping>
+ eMixedDisplay
+};
+
+#include "nsIContentPolicy.h"
+#include "nsIChannel.h"
+#include "nsIChannelEventSink.h"
+#include "imgRequest.h"
+
+class nsILoadInfo; // forward declaration
+
+class nsMixedContentBlocker : public nsIContentPolicy,
+ public nsIChannelEventSink
+{
+private:
+ virtual ~nsMixedContentBlocker();
+
+public:
+ NS_DECL_ISUPPORTS
+ NS_DECL_NSICONTENTPOLICY
+ NS_DECL_NSICHANNELEVENTSINK
+
+ nsMixedContentBlocker();
+
+ /* Static version of ShouldLoad() that contains all the Mixed Content Blocker
+ * logic. Called from non-static ShouldLoad().
+ * Called directly from imageLib when an insecure redirect exists in a cached
+ * image load.
+ * @param aHadInsecureImageRedirect
+ * boolean flag indicating that an insecure redirect through http
+ * occured when this image was initially loaded and cached.
+ * Remaining parameters are from nsIContentPolicy::ShouldLoad().
+ */
+ static nsresult ShouldLoad(bool aHadInsecureImageRedirect,
+ uint32_t aContentType,
+ nsIURI* aContentLocation,
+ nsIURI* aRequestingLocation,
+ nsISupports* aRequestingContext,
+ const nsACString& aMimeGuess,
+ nsISupports* aExtra,
+ nsIPrincipal* aRequestPrincipal,
+ int16_t* aDecision);
+ static void AccumulateMixedContentHSTS(nsIURI* aURI,
+ bool aActive,
+ bool aHasHSTSPriming);
+ /* If the document associated with aRequestingContext requires priming for
+ * aURI, propagate that to the LoadInfo so the HttpChannel will find out about
+ * it.
+ *
+ * @param aURI The URI associated with the load
+ * @param aRequestingContext the requesting context passed to ShouldLoad
+ * @param aLoadInfo the LoadInfo for the load
+ */
+ static nsresult MarkLoadInfoForPriming(nsIURI* aURI,
+ nsISupports* aRequestingContext,
+ nsILoadInfo* aLoadInfo);
+
+ /* Given a context, return whether HSTS was marked on the document associated
+ * with the load for the given URI. This is used by MarkLoadInfoForPriming and
+ * directly by the image loader to determine whether to allow a load to occur
+ * from the cache.
+ *
+ * @param aURI The URI associated with the load
+ * @param aRequestingContext the requesting context passed to ShouldLoad
+ * @param aSendPrimingRequest out true if priming is required on the channel
+ * @param aMixedContentWouldBlock out true if mixed content would block
+ */
+ static nsresult GetHSTSPrimingFromRequestingContext(nsIURI* aURI,
+ nsISupports* aRequestingContext,
+ bool* aSendPrimingRequest,
+ bool* aMixedContentWouldBlock);
+
+
+ static bool sBlockMixedScript;
+ static bool sBlockMixedDisplay;
+ // Do we move HSTS before mixed-content
+ static bool sUseHSTS;
+ // Do we send an HSTS priming request
+ static bool sSendHSTSPriming;
+ // Default HSTS Priming failure timeout in seconds
+ static uint32_t sHSTSPrimingCacheTimeout;
+};
+
+#endif /* nsMixedContentBlocker_h___ */