summaryrefslogtreecommitdiffstats
path: root/embedding/browser/nsWebBrowserContentPolicy.cpp
diff options
context:
space:
mode:
authorMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
committerMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
commit5f8de423f190bbb79a62f804151bc24824fa32d8 (patch)
tree10027f336435511475e392454359edea8e25895d /embedding/browser/nsWebBrowserContentPolicy.cpp
parent49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff)
downloadUXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip
Add m-esr52 at 52.6.0
Diffstat (limited to 'embedding/browser/nsWebBrowserContentPolicy.cpp')
-rw-r--r--embedding/browser/nsWebBrowserContentPolicy.cpp108
1 files changed, 108 insertions, 0 deletions
diff --git a/embedding/browser/nsWebBrowserContentPolicy.cpp b/embedding/browser/nsWebBrowserContentPolicy.cpp
new file mode 100644
index 000000000..f6b17a197
--- /dev/null
+++ b/embedding/browser/nsWebBrowserContentPolicy.cpp
@@ -0,0 +1,108 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* vim: set ts=8 sts=2 et sw=2 tw=80: */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "nsWebBrowserContentPolicy.h"
+#include "nsIDocShell.h"
+#include "nsCOMPtr.h"
+#include "nsContentPolicyUtils.h"
+#include "nsIContentViewer.h"
+
+nsWebBrowserContentPolicy::nsWebBrowserContentPolicy()
+{
+ MOZ_COUNT_CTOR(nsWebBrowserContentPolicy);
+}
+
+nsWebBrowserContentPolicy::~nsWebBrowserContentPolicy()
+{
+ MOZ_COUNT_DTOR(nsWebBrowserContentPolicy);
+}
+
+NS_IMPL_ISUPPORTS(nsWebBrowserContentPolicy, nsIContentPolicy)
+
+NS_IMETHODIMP
+nsWebBrowserContentPolicy::ShouldLoad(uint32_t aContentType,
+ nsIURI* aContentLocation,
+ nsIURI* aRequestingLocation,
+ nsISupports* aRequestingContext,
+ const nsACString& aMimeGuess,
+ nsISupports* aExtra,
+ nsIPrincipal* aRequestPrincipal,
+ int16_t* aShouldLoad)
+{
+ NS_PRECONDITION(aShouldLoad, "Null out param");
+
+ MOZ_ASSERT(aContentType == nsContentUtils::InternalContentPolicyTypeToExternal(aContentType),
+ "We should only see external content policy types here.");
+
+ *aShouldLoad = nsIContentPolicy::ACCEPT;
+
+ nsIDocShell* shell = NS_CP_GetDocShellFromContext(aRequestingContext);
+ /* We're going to dereference shell, so make sure it isn't null */
+ if (!shell) {
+ return NS_OK;
+ }
+
+ nsresult rv;
+ bool allowed = true;
+
+ switch (aContentType) {
+ case nsIContentPolicy::TYPE_SCRIPT:
+ rv = shell->GetAllowJavascript(&allowed);
+ break;
+ case nsIContentPolicy::TYPE_SUBDOCUMENT:
+ rv = shell->GetAllowSubframes(&allowed);
+ break;
+#if 0
+ /* XXXtw: commented out in old code; add during conpol phase 2 */
+ case nsIContentPolicy::TYPE_REFRESH:
+ rv = shell->GetAllowMetaRedirects(&allowed); /* meta _refresh_ */
+ break;
+#endif
+ case nsIContentPolicy::TYPE_IMAGE:
+ case nsIContentPolicy::TYPE_IMAGESET:
+ rv = shell->GetAllowImages(&allowed);
+ break;
+ default:
+ return NS_OK;
+ }
+
+ if (NS_SUCCEEDED(rv) && !allowed) {
+ *aShouldLoad = nsIContentPolicy::REJECT_TYPE;
+ }
+ return rv;
+}
+
+NS_IMETHODIMP
+nsWebBrowserContentPolicy::ShouldProcess(uint32_t aContentType,
+ nsIURI* aContentLocation,
+ nsIURI* aRequestingLocation,
+ nsISupports* aRequestingContext,
+ const nsACString& aMimeGuess,
+ nsISupports* aExtra,
+ nsIPrincipal* aRequestPrincipal,
+ int16_t* aShouldProcess)
+{
+ NS_PRECONDITION(aShouldProcess, "Null out param");
+
+ MOZ_ASSERT(aContentType == nsContentUtils::InternalContentPolicyTypeToExternal(aContentType),
+ "We should only see external content policy types here.");
+
+ *aShouldProcess = nsIContentPolicy::ACCEPT;
+
+ // Object tags will always open channels with TYPE_OBJECT, but may end up
+ // loading with TYPE_IMAGE or TYPE_DOCUMENT as their final type, so we block
+ // actual-plugins at the process stage
+ if (aContentType != nsIContentPolicy::TYPE_OBJECT) {
+ return NS_OK;
+ }
+
+ nsIDocShell* shell = NS_CP_GetDocShellFromContext(aRequestingContext);
+ if (shell && (!shell->PluginsAllowedInCurrentDoc())) {
+ *aShouldProcess = nsIContentPolicy::REJECT_TYPE;
+ }
+
+ return NS_OK;
+}