diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /netwerk/protocol/wyciwyg/nsWyciwygProtocolHandler.cpp | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'netwerk/protocol/wyciwyg/nsWyciwygProtocolHandler.cpp')
-rw-r--r-- | netwerk/protocol/wyciwyg/nsWyciwygProtocolHandler.cpp | 158 |
1 files changed, 158 insertions, 0 deletions
diff --git a/netwerk/protocol/wyciwyg/nsWyciwygProtocolHandler.cpp b/netwerk/protocol/wyciwyg/nsWyciwygProtocolHandler.cpp new file mode 100644 index 000000000..4e1f7c22e --- /dev/null +++ b/netwerk/protocol/wyciwyg/nsWyciwygProtocolHandler.cpp @@ -0,0 +1,158 @@ +/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- + * + * This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "nsWyciwyg.h" +#include "nsWyciwygChannel.h" +#include "nsWyciwygProtocolHandler.h" +#include "nsNetCID.h" +#include "nsServiceManagerUtils.h" +#include "plstr.h" +#include "nsIObserverService.h" +#include "mozIApplicationClearPrivateDataParams.h" +#include "nsIURI.h" + +#include "mozilla/net/NeckoChild.h" + +using namespace mozilla::net; +#include "mozilla/net/WyciwygChannelChild.h" + +//////////////////////////////////////////////////////////////////////////////// + +nsWyciwygProtocolHandler::nsWyciwygProtocolHandler() +{ + LOG(("Creating nsWyciwygProtocolHandler [this=%p].\n", this)); +} + +nsWyciwygProtocolHandler::~nsWyciwygProtocolHandler() +{ + LOG(("Deleting nsWyciwygProtocolHandler [this=%p]\n", this)); +} + +NS_IMPL_ISUPPORTS(nsWyciwygProtocolHandler, + nsIProtocolHandler) + +//////////////////////////////////////////////////////////////////////////////// +// nsIProtocolHandler methods: +//////////////////////////////////////////////////////////////////////////////// + +NS_IMETHODIMP +nsWyciwygProtocolHandler::GetScheme(nsACString &result) +{ + result = "wyciwyg"; + return NS_OK; +} + +NS_IMETHODIMP +nsWyciwygProtocolHandler::GetDefaultPort(int32_t *result) +{ + return NS_ERROR_NOT_AVAILABLE; +} + +NS_IMETHODIMP +nsWyciwygProtocolHandler::AllowPort(int32_t port, const char *scheme, bool *_retval) +{ + // don't override anything. + *_retval = false; + return NS_OK; +} + +NS_IMETHODIMP +nsWyciwygProtocolHandler::NewURI(const nsACString &aSpec, + const char *aCharset, // ignored + nsIURI *aBaseURI, + nsIURI **result) +{ + nsresult rv; + + nsCOMPtr<nsIURI> url = do_CreateInstance(NS_SIMPLEURI_CONTRACTID, &rv); + NS_ENSURE_SUCCESS(rv, rv); + + rv = url->SetSpec(aSpec); + NS_ENSURE_SUCCESS(rv, rv); + + url.forget(result); + + return rv; +} + +NS_IMETHODIMP +nsWyciwygProtocolHandler::NewChannel2(nsIURI* url, + nsILoadInfo* aLoadInfo, + nsIChannel** result) +{ + if (mozilla::net::IsNeckoChild()) + mozilla::net::NeckoChild::InitNeckoChild(); + + NS_ENSURE_ARG_POINTER(url); + nsresult rv; + + nsCOMPtr<nsIWyciwygChannel> channel; + if (IsNeckoChild()) { + NS_ENSURE_TRUE(gNeckoChild != nullptr, NS_ERROR_FAILURE); + + WyciwygChannelChild *wcc = static_cast<WyciwygChannelChild *>( + gNeckoChild->SendPWyciwygChannelConstructor()); + if (!wcc) + return NS_ERROR_OUT_OF_MEMORY; + + channel = wcc; + rv = wcc->Init(url); + if (NS_FAILED(rv)) + PWyciwygChannelChild::Send__delete__(wcc); + } else + { + // If original channel used https, make sure PSM is initialized + // (this may be first channel to load during a session restore) + nsAutoCString path; + rv = url->GetPath(path); + NS_ENSURE_SUCCESS(rv, rv); + int32_t slashIndex = path.FindChar('/', 2); + if (slashIndex == kNotFound) + return NS_ERROR_FAILURE; + if (path.Length() < (uint32_t)slashIndex + 1 + 5) + return NS_ERROR_FAILURE; + if (!PL_strncasecmp(path.get() + slashIndex + 1, "https", 5)) + net_EnsurePSMInit(); + + nsWyciwygChannel *wc = new nsWyciwygChannel(); + channel = wc; + rv = wc->Init(url); + } + + if (NS_FAILED(rv)) + return rv; + + // set the loadInfo on the new channel + rv = channel->SetLoadInfo(aLoadInfo); + if (NS_FAILED(rv)) { + return rv; + } + + channel.forget(result); + return NS_OK; +} + +NS_IMETHODIMP +nsWyciwygProtocolHandler::NewChannel(nsIURI* url, nsIChannel* *result) +{ + return NewChannel2(url, nullptr, result); +} + +NS_IMETHODIMP +nsWyciwygProtocolHandler::GetProtocolFlags(uint32_t *result) +{ + // Should this be an an nsINestedURI? We don't really want random webpages + // loading these URIs... + + // Note that using URI_INHERITS_SECURITY_CONTEXT here is OK -- untrusted code + // is not allowed to link to wyciwyg URIs and users shouldn't be able to get + // at them, and nsDocShell::InternalLoad forbids non-history loads of these + // URIs. And when loading from history we end up using the principal from + // the history entry, which we put there ourselves, so all is ok. + *result = URI_NORELATIVE | URI_NOAUTH | URI_DANGEROUS_TO_LOAD | + URI_INHERITS_SECURITY_CONTEXT; + return NS_OK; +} |