diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /dom/security/nsMixedContentBlocker.h | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'dom/security/nsMixedContentBlocker.h')
-rw-r--r-- | dom/security/nsMixedContentBlocker.h | 105 |
1 files changed, 105 insertions, 0 deletions
diff --git a/dom/security/nsMixedContentBlocker.h b/dom/security/nsMixedContentBlocker.h new file mode 100644 index 000000000..539c3ebbb --- /dev/null +++ b/dom/security/nsMixedContentBlocker.h @@ -0,0 +1,105 @@ +/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ +/* vim: set ts=8 sts=2 et sw=2 tw=80: */ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#ifndef nsMixedContentBlocker_h___ +#define nsMixedContentBlocker_h___ + +#define NS_MIXEDCONTENTBLOCKER_CONTRACTID "@mozilla.org/mixedcontentblocker;1" +/* daf1461b-bf29-4f88-8d0e-4bcdf332c862 */ +#define NS_MIXEDCONTENTBLOCKER_CID \ +{ 0xdaf1461b, 0xbf29, 0x4f88, \ + { 0x8d, 0x0e, 0x4b, 0xcd, 0xf3, 0x32, 0xc8, 0x62 } } + +// This enum defines type of content that is detected when an +// nsMixedContentEvent fires +enum MixedContentTypes { + // "Active" content, such as fonts, plugin content, JavaScript, stylesheets, + // iframes, WebSockets, and XHR + eMixedScript, + // "Display" content, such as images, audio, video, and <a ping> + eMixedDisplay +}; + +#include "nsIContentPolicy.h" +#include "nsIChannel.h" +#include "nsIChannelEventSink.h" +#include "imgRequest.h" + +class nsILoadInfo; // forward declaration + +class nsMixedContentBlocker : public nsIContentPolicy, + public nsIChannelEventSink +{ +private: + virtual ~nsMixedContentBlocker(); + +public: + NS_DECL_ISUPPORTS + NS_DECL_NSICONTENTPOLICY + NS_DECL_NSICHANNELEVENTSINK + + nsMixedContentBlocker(); + + /* Static version of ShouldLoad() that contains all the Mixed Content Blocker + * logic. Called from non-static ShouldLoad(). + * Called directly from imageLib when an insecure redirect exists in a cached + * image load. + * @param aHadInsecureImageRedirect + * boolean flag indicating that an insecure redirect through http + * occured when this image was initially loaded and cached. + * Remaining parameters are from nsIContentPolicy::ShouldLoad(). + */ + static nsresult ShouldLoad(bool aHadInsecureImageRedirect, + uint32_t aContentType, + nsIURI* aContentLocation, + nsIURI* aRequestingLocation, + nsISupports* aRequestingContext, + const nsACString& aMimeGuess, + nsISupports* aExtra, + nsIPrincipal* aRequestPrincipal, + int16_t* aDecision); + static void AccumulateMixedContentHSTS(nsIURI* aURI, + bool aActive, + bool aHasHSTSPriming); + /* If the document associated with aRequestingContext requires priming for + * aURI, propagate that to the LoadInfo so the HttpChannel will find out about + * it. + * + * @param aURI The URI associated with the load + * @param aRequestingContext the requesting context passed to ShouldLoad + * @param aLoadInfo the LoadInfo for the load + */ + static nsresult MarkLoadInfoForPriming(nsIURI* aURI, + nsISupports* aRequestingContext, + nsILoadInfo* aLoadInfo); + + /* Given a context, return whether HSTS was marked on the document associated + * with the load for the given URI. This is used by MarkLoadInfoForPriming and + * directly by the image loader to determine whether to allow a load to occur + * from the cache. + * + * @param aURI The URI associated with the load + * @param aRequestingContext the requesting context passed to ShouldLoad + * @param aSendPrimingRequest out true if priming is required on the channel + * @param aMixedContentWouldBlock out true if mixed content would block + */ + static nsresult GetHSTSPrimingFromRequestingContext(nsIURI* aURI, + nsISupports* aRequestingContext, + bool* aSendPrimingRequest, + bool* aMixedContentWouldBlock); + + + static bool sBlockMixedScript; + static bool sBlockMixedDisplay; + // Do we move HSTS before mixed-content + static bool sUseHSTS; + // Do we send an HSTS priming request + static bool sSendHSTSPriming; + // Default HSTS Priming failure timeout in seconds + static uint32_t sHSTSPrimingCacheTimeout; +}; + +#endif /* nsMixedContentBlocker_h___ */ |