Line data Source code
1 : /*
2 : * DO NOT EDIT. THIS FILE IS GENERATED FROM ../../../dist/idl/nsIScriptSecurityManager.idl
3 : */
4 :
5 : #ifndef __gen_nsIScriptSecurityManager_h__
6 : #define __gen_nsIScriptSecurityManager_h__
7 :
8 :
9 : #ifndef __gen_nsISupports_h__
10 : #include "nsISupports.h"
11 : #endif
12 :
13 : #ifndef __gen_nsIPrincipal_h__
14 : #include "nsIPrincipal.h"
15 : #endif
16 :
17 : #include "js/Value.h"
18 :
19 : /* For IDL files that don't want to include root IDL files. */
20 : #ifndef NS_NO_VTABLE
21 : #define NS_NO_VTABLE
22 : #endif
23 : class nsIURI; /* forward declaration */
24 :
25 : class nsIChannel; /* forward declaration */
26 :
27 : class nsIClassInfo; /* forward declaration */
28 :
29 : class nsIDocShell; /* forward declaration */
30 :
31 : class nsIDomainPolicy; /* forward declaration */
32 :
33 : class nsILoadContext; /* forward declaration */
34 :
35 : #include "jspubtd.h"
36 : namespace mozilla {
37 : namespace dom {
38 : class DomainPolicyClone;
39 : }
40 : }
41 :
42 : /* starting interface: nsIScriptSecurityManager */
43 : #define NS_ISCRIPTSECURITYMANAGER_IID_STR "51daad87-3a0c-44cc-b620-7356801c9022"
44 :
45 : #define NS_ISCRIPTSECURITYMANAGER_IID \
46 : {0x51daad87, 0x3a0c, 0x44cc, \
47 : { 0xb6, 0x20, 0x73, 0x56, 0x80, 0x1c, 0x90, 0x22 }}
48 :
49 3 : class nsIScriptSecurityManager : public nsISupports {
50 : public:
51 :
52 : NS_DECLARE_STATIC_IID_ACCESSOR(NS_ISCRIPTSECURITYMANAGER_IID)
53 :
54 : /* [noscript] void canCreateWrapper (in JSContextPtr aJSContext, in nsIIDRef aIID, in nsISupports aObj, in nsIClassInfo aClassInfo); */
55 : NS_IMETHOD CanCreateWrapper(JSContext *aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo) = 0;
56 :
57 : /* [noscript] void canCreateInstance (in JSContextPtr aJSContext, in nsCIDRef aCID); */
58 : NS_IMETHOD CanCreateInstance(JSContext *aJSContext, const nsCID & aCID) = 0;
59 :
60 : /* [noscript] void canGetService (in JSContextPtr aJSContext, in nsCIDRef aCID); */
61 : NS_IMETHOD CanGetService(JSContext *aJSContext, const nsCID & aCID) = 0;
62 :
63 : /* [noscript] void checkLoadURIFromScript (in JSContextPtr cx, in nsIURI uri); */
64 : NS_IMETHOD CheckLoadURIFromScript(JSContext *cx, nsIURI *uri) = 0;
65 :
66 : enum {
67 : STANDARD = 0U,
68 : LOAD_IS_AUTOMATIC_DOCUMENT_REPLACEMENT = 1U,
69 : ALLOW_CHROME = 2U,
70 : DISALLOW_INHERIT_PRINCIPAL = 4U,
71 : DISALLOW_SCRIPT_OR_DATA = 4U,
72 : DISALLOW_SCRIPT = 8U,
73 : DONT_REPORT_ERRORS = 16U
74 : };
75 :
76 : /* void checkLoadURIWithPrincipal (in nsIPrincipal aPrincipal, in nsIURI uri, in unsigned long flags); */
77 : NS_IMETHOD CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags) = 0;
78 :
79 : /* void checkLoadURIStrWithPrincipal (in nsIPrincipal aPrincipal, in AUTF8String uri, in unsigned long flags); */
80 : NS_IMETHOD CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString & uri, uint32_t flags) = 0;
81 :
82 : /* nsIPrincipal getSystemPrincipal (); */
83 : NS_IMETHOD GetSystemPrincipal(nsIPrincipal * *_retval) = 0;
84 :
85 : /* nsIPrincipal getLoadContextCodebasePrincipal (in nsIURI uri, in nsILoadContext loadContext); */
86 : NS_IMETHOD GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal * *_retval) = 0;
87 :
88 : /* nsIPrincipal getDocShellCodebasePrincipal (in nsIURI uri, in nsIDocShell docShell); */
89 : NS_IMETHOD GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal * *_retval) = 0;
90 :
91 : /* [deprecated] nsIPrincipal getCodebasePrincipal (in nsIURI uri); */
92 : NS_IMETHOD GetCodebasePrincipal(nsIURI *uri, nsIPrincipal * *_retval) = 0;
93 :
94 : /* [implicit_jscontext] nsIPrincipal createCodebasePrincipal (in nsIURI uri, in jsval originAttributes); */
95 : NS_IMETHOD CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval) = 0;
96 :
97 : /* nsIPrincipal createCodebasePrincipalFromOrigin (in ACString origin); */
98 : NS_IMETHOD CreateCodebasePrincipalFromOrigin(const nsACString & origin, nsIPrincipal * *_retval) = 0;
99 :
100 : /* [implicit_jscontext] nsIPrincipal createNullPrincipal (in jsval originAttributes); */
101 : NS_IMETHOD CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval) = 0;
102 :
103 : /* void checkSameOriginURI (in nsIURI aSourceURI, in nsIURI aTargetURI, in boolean reportError); */
104 : NS_IMETHOD CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError) = 0;
105 :
106 : /* nsIPrincipal getChannelResultPrincipal (in nsIChannel aChannel); */
107 : NS_IMETHOD GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval) = 0;
108 :
109 : /* [noscript,nostdcall] nsIPrincipal getChannelResultPrincipalIfNotSandboxed (in nsIChannel aChannel); */
110 : virtual nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal * *_retval) = 0;
111 :
112 : /* nsIPrincipal getChannelURIPrincipal (in nsIChannel aChannel); */
113 : NS_IMETHOD GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval) = 0;
114 :
115 : /* boolean isSystemPrincipal (in nsIPrincipal aPrincipal); */
116 : NS_IMETHOD IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval) = 0;
117 :
118 571 : bool IsSystemPrincipal(nsIPrincipal* aPrincipal) {
119 571 : bool isSystem = false;
120 571 : IsSystemPrincipal(aPrincipal, &isSystem);
121 571 : return isSystem;
122 : }
123 : enum {
124 : NO_APP_ID = 0U,
125 : UNKNOWN_APP_ID = 4294967295U,
126 : DEFAULT_USER_CONTEXT_ID = 0U
127 : };
128 :
129 : /* nsIDomainPolicy activateDomainPolicy (); */
130 : NS_IMETHOD ActivateDomainPolicy(nsIDomainPolicy * *_retval) = 0;
131 :
132 : /* readonly attribute boolean domainPolicyActive; */
133 : NS_IMETHOD GetDomainPolicyActive(bool *aDomainPolicyActive) = 0;
134 :
135 : /* [noscript] nsIDomainPolicy activateDomainPolicyInternal (); */
136 : NS_IMETHOD ActivateDomainPolicyInternal(nsIDomainPolicy * *_retval) = 0;
137 :
138 : /* [noscript,notxpcom] void cloneDomainPolicy (in DomainPolicyClonePtr aClone); */
139 : NS_IMETHOD_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone *aClone) = 0;
140 :
141 : /* bool policyAllowsScript (in nsIURI aDomain); */
142 : NS_IMETHOD PolicyAllowsScript(nsIURI *aDomain, bool *_retval) = 0;
143 :
144 : };
145 :
146 : NS_DEFINE_STATIC_IID_ACCESSOR(nsIScriptSecurityManager, NS_ISCRIPTSECURITYMANAGER_IID)
147 :
148 : /* Use this macro when declaring classes that implement this interface. */
149 : #define NS_DECL_NSISCRIPTSECURITYMANAGER \
150 : NS_IMETHOD CanCreateWrapper(JSContext *aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo) override; \
151 : NS_IMETHOD CanCreateInstance(JSContext *aJSContext, const nsCID & aCID) override; \
152 : NS_IMETHOD CanGetService(JSContext *aJSContext, const nsCID & aCID) override; \
153 : NS_IMETHOD CheckLoadURIFromScript(JSContext *cx, nsIURI *uri) override; \
154 : NS_IMETHOD CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags) override; \
155 : NS_IMETHOD CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString & uri, uint32_t flags) override; \
156 : NS_IMETHOD GetSystemPrincipal(nsIPrincipal * *_retval) override; \
157 : NS_IMETHOD GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal * *_retval) override; \
158 : NS_IMETHOD GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal * *_retval) override; \
159 : NS_IMETHOD GetCodebasePrincipal(nsIURI *uri, nsIPrincipal * *_retval) override; \
160 : NS_IMETHOD CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval) override; \
161 : NS_IMETHOD CreateCodebasePrincipalFromOrigin(const nsACString & origin, nsIPrincipal * *_retval) override; \
162 : NS_IMETHOD CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval) override; \
163 : NS_IMETHOD CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError) override; \
164 : NS_IMETHOD GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval) override; \
165 : virtual nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal * *_retval) override; \
166 : NS_IMETHOD GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval) override; \
167 : NS_IMETHOD IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval) override; \
168 : NS_IMETHOD ActivateDomainPolicy(nsIDomainPolicy * *_retval) override; \
169 : NS_IMETHOD GetDomainPolicyActive(bool *aDomainPolicyActive) override; \
170 : NS_IMETHOD ActivateDomainPolicyInternal(nsIDomainPolicy * *_retval) override; \
171 : NS_IMETHOD_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone *aClone) override; \
172 : NS_IMETHOD PolicyAllowsScript(nsIURI *aDomain, bool *_retval) override;
173 :
174 : /* Use this macro when declaring the members of this interface when the
175 : class doesn't implement the interface. This is useful for forwarding. */
176 : #define NS_DECL_NON_VIRTUAL_NSISCRIPTSECURITYMANAGER \
177 : nsresult CanCreateWrapper(JSContext *aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo); \
178 : nsresult CanCreateInstance(JSContext *aJSContext, const nsCID & aCID); \
179 : nsresult CanGetService(JSContext *aJSContext, const nsCID & aCID); \
180 : nsresult CheckLoadURIFromScript(JSContext *cx, nsIURI *uri); \
181 : nsresult CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags); \
182 : nsresult CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString & uri, uint32_t flags); \
183 : nsresult GetSystemPrincipal(nsIPrincipal * *_retval); \
184 : nsresult GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal * *_retval); \
185 : nsresult GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal * *_retval); \
186 : nsresult GetCodebasePrincipal(nsIURI *uri, nsIPrincipal * *_retval); \
187 : nsresult CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval); \
188 : nsresult CreateCodebasePrincipalFromOrigin(const nsACString & origin, nsIPrincipal * *_retval); \
189 : nsresult CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval); \
190 : nsresult CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError); \
191 : nsresult GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval); \
192 : nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal * *_retval); \
193 : nsresult GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval); \
194 : nsresult IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval); \
195 : nsresult ActivateDomainPolicy(nsIDomainPolicy * *_retval); \
196 : nsresult GetDomainPolicyActive(bool *aDomainPolicyActive); \
197 : nsresult ActivateDomainPolicyInternal(nsIDomainPolicy * *_retval); \
198 : nsresult_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone *aClone); \
199 : nsresult PolicyAllowsScript(nsIURI *aDomain, bool *_retval);
200 :
201 : /* Use this macro to declare functions that forward the behavior of this interface to another object. */
202 : #define NS_FORWARD_NSISCRIPTSECURITYMANAGER(_to) \
203 : NS_IMETHOD CanCreateWrapper(JSContext *aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo) override { return _to CanCreateWrapper(aJSContext, aIID, aObj, aClassInfo); } \
204 : NS_IMETHOD CanCreateInstance(JSContext *aJSContext, const nsCID & aCID) override { return _to CanCreateInstance(aJSContext, aCID); } \
205 : NS_IMETHOD CanGetService(JSContext *aJSContext, const nsCID & aCID) override { return _to CanGetService(aJSContext, aCID); } \
206 : NS_IMETHOD CheckLoadURIFromScript(JSContext *cx, nsIURI *uri) override { return _to CheckLoadURIFromScript(cx, uri); } \
207 : NS_IMETHOD CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags) override { return _to CheckLoadURIWithPrincipal(aPrincipal, uri, flags); } \
208 : NS_IMETHOD CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString & uri, uint32_t flags) override { return _to CheckLoadURIStrWithPrincipal(aPrincipal, uri, flags); } \
209 : NS_IMETHOD GetSystemPrincipal(nsIPrincipal * *_retval) override { return _to GetSystemPrincipal(_retval); } \
210 : NS_IMETHOD GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal * *_retval) override { return _to GetLoadContextCodebasePrincipal(uri, loadContext, _retval); } \
211 : NS_IMETHOD GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal * *_retval) override { return _to GetDocShellCodebasePrincipal(uri, docShell, _retval); } \
212 : NS_IMETHOD GetCodebasePrincipal(nsIURI *uri, nsIPrincipal * *_retval) override { return _to GetCodebasePrincipal(uri, _retval); } \
213 : NS_IMETHOD CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval) override { return _to CreateCodebasePrincipal(uri, originAttributes, cx, _retval); } \
214 : NS_IMETHOD CreateCodebasePrincipalFromOrigin(const nsACString & origin, nsIPrincipal * *_retval) override { return _to CreateCodebasePrincipalFromOrigin(origin, _retval); } \
215 : NS_IMETHOD CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval) override { return _to CreateNullPrincipal(originAttributes, cx, _retval); } \
216 : NS_IMETHOD CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError) override { return _to CheckSameOriginURI(aSourceURI, aTargetURI, reportError); } \
217 : NS_IMETHOD GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval) override { return _to GetChannelResultPrincipal(aChannel, _retval); } \
218 : virtual nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal * *_retval) override { return _to GetChannelResultPrincipalIfNotSandboxed(aChannel, _retval); } \
219 : NS_IMETHOD GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval) override { return _to GetChannelURIPrincipal(aChannel, _retval); } \
220 : NS_IMETHOD IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval) override { return _to IsSystemPrincipal(aPrincipal, _retval); } \
221 : NS_IMETHOD ActivateDomainPolicy(nsIDomainPolicy * *_retval) override { return _to ActivateDomainPolicy(_retval); } \
222 : NS_IMETHOD GetDomainPolicyActive(bool *aDomainPolicyActive) override { return _to GetDomainPolicyActive(aDomainPolicyActive); } \
223 : NS_IMETHOD ActivateDomainPolicyInternal(nsIDomainPolicy * *_retval) override { return _to ActivateDomainPolicyInternal(_retval); } \
224 : NS_IMETHOD_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone *aClone) override { return _to CloneDomainPolicy(aClone); } \
225 : NS_IMETHOD PolicyAllowsScript(nsIURI *aDomain, bool *_retval) override { return _to PolicyAllowsScript(aDomain, _retval); }
226 :
227 : /* Use this macro to declare functions that forward the behavior of this interface to another object in a safe way. */
228 : #define NS_FORWARD_SAFE_NSISCRIPTSECURITYMANAGER(_to) \
229 : NS_IMETHOD CanCreateWrapper(JSContext *aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CanCreateWrapper(aJSContext, aIID, aObj, aClassInfo); } \
230 : NS_IMETHOD CanCreateInstance(JSContext *aJSContext, const nsCID & aCID) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CanCreateInstance(aJSContext, aCID); } \
231 : NS_IMETHOD CanGetService(JSContext *aJSContext, const nsCID & aCID) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CanGetService(aJSContext, aCID); } \
232 : NS_IMETHOD CheckLoadURIFromScript(JSContext *cx, nsIURI *uri) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CheckLoadURIFromScript(cx, uri); } \
233 : NS_IMETHOD CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CheckLoadURIWithPrincipal(aPrincipal, uri, flags); } \
234 : NS_IMETHOD CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString & uri, uint32_t flags) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CheckLoadURIStrWithPrincipal(aPrincipal, uri, flags); } \
235 : NS_IMETHOD GetSystemPrincipal(nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetSystemPrincipal(_retval); } \
236 : NS_IMETHOD GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetLoadContextCodebasePrincipal(uri, loadContext, _retval); } \
237 : NS_IMETHOD GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetDocShellCodebasePrincipal(uri, docShell, _retval); } \
238 : NS_IMETHOD GetCodebasePrincipal(nsIURI *uri, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetCodebasePrincipal(uri, _retval); } \
239 : NS_IMETHOD CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CreateCodebasePrincipal(uri, originAttributes, cx, _retval); } \
240 : NS_IMETHOD CreateCodebasePrincipalFromOrigin(const nsACString & origin, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CreateCodebasePrincipalFromOrigin(origin, _retval); } \
241 : NS_IMETHOD CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CreateNullPrincipal(originAttributes, cx, _retval); } \
242 : NS_IMETHOD CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CheckSameOriginURI(aSourceURI, aTargetURI, reportError); } \
243 : NS_IMETHOD GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetChannelResultPrincipal(aChannel, _retval); } \
244 : virtual nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetChannelResultPrincipalIfNotSandboxed(aChannel, _retval); } \
245 : NS_IMETHOD GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetChannelURIPrincipal(aChannel, _retval); } \
246 : NS_IMETHOD IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->IsSystemPrincipal(aPrincipal, _retval); } \
247 : NS_IMETHOD ActivateDomainPolicy(nsIDomainPolicy * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->ActivateDomainPolicy(_retval); } \
248 : NS_IMETHOD GetDomainPolicyActive(bool *aDomainPolicyActive) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetDomainPolicyActive(aDomainPolicyActive); } \
249 : NS_IMETHOD ActivateDomainPolicyInternal(nsIDomainPolicy * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->ActivateDomainPolicyInternal(_retval); } \
250 : NS_IMETHOD_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone *aClone) override; \
251 : NS_IMETHOD PolicyAllowsScript(nsIURI *aDomain, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->PolicyAllowsScript(aDomain, _retval); }
252 :
253 : #if 0
254 : /* Use the code below as a template for the implementation class for this interface. */
255 :
256 : /* Header file */
257 : class nsScriptSecurityManager : public nsIScriptSecurityManager
258 : {
259 : public:
260 : NS_DECL_ISUPPORTS
261 : NS_DECL_NSISCRIPTSECURITYMANAGER
262 :
263 : nsScriptSecurityManager();
264 :
265 : private:
266 : ~nsScriptSecurityManager();
267 :
268 : protected:
269 : /* additional members */
270 : };
271 :
272 : /* Implementation file */
273 : NS_IMPL_ISUPPORTS(nsScriptSecurityManager, nsIScriptSecurityManager)
274 :
275 : nsScriptSecurityManager::nsScriptSecurityManager()
276 : {
277 : /* member initializers and constructor code */
278 : }
279 :
280 : nsScriptSecurityManager::~nsScriptSecurityManager()
281 : {
282 : /* destructor code */
283 : }
284 :
285 : /* [noscript] void canCreateWrapper (in JSContextPtr aJSContext, in nsIIDRef aIID, in nsISupports aObj, in nsIClassInfo aClassInfo); */
286 : NS_IMETHODIMP nsScriptSecurityManager::CanCreateWrapper(JSContext *aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo)
287 : {
288 : return NS_ERROR_NOT_IMPLEMENTED;
289 : }
290 :
291 : /* [noscript] void canCreateInstance (in JSContextPtr aJSContext, in nsCIDRef aCID); */
292 : NS_IMETHODIMP nsScriptSecurityManager::CanCreateInstance(JSContext *aJSContext, const nsCID & aCID)
293 : {
294 : return NS_ERROR_NOT_IMPLEMENTED;
295 : }
296 :
297 : /* [noscript] void canGetService (in JSContextPtr aJSContext, in nsCIDRef aCID); */
298 : NS_IMETHODIMP nsScriptSecurityManager::CanGetService(JSContext *aJSContext, const nsCID & aCID)
299 : {
300 : return NS_ERROR_NOT_IMPLEMENTED;
301 : }
302 :
303 : /* [noscript] void checkLoadURIFromScript (in JSContextPtr cx, in nsIURI uri); */
304 : NS_IMETHODIMP nsScriptSecurityManager::CheckLoadURIFromScript(JSContext *cx, nsIURI *uri)
305 : {
306 : return NS_ERROR_NOT_IMPLEMENTED;
307 : }
308 :
309 : /* void checkLoadURIWithPrincipal (in nsIPrincipal aPrincipal, in nsIURI uri, in unsigned long flags); */
310 : NS_IMETHODIMP nsScriptSecurityManager::CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags)
311 : {
312 : return NS_ERROR_NOT_IMPLEMENTED;
313 : }
314 :
315 : /* void checkLoadURIStrWithPrincipal (in nsIPrincipal aPrincipal, in AUTF8String uri, in unsigned long flags); */
316 : NS_IMETHODIMP nsScriptSecurityManager::CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString & uri, uint32_t flags)
317 : {
318 : return NS_ERROR_NOT_IMPLEMENTED;
319 : }
320 :
321 : /* nsIPrincipal getSystemPrincipal (); */
322 : NS_IMETHODIMP nsScriptSecurityManager::GetSystemPrincipal(nsIPrincipal * *_retval)
323 : {
324 : return NS_ERROR_NOT_IMPLEMENTED;
325 : }
326 :
327 : /* nsIPrincipal getLoadContextCodebasePrincipal (in nsIURI uri, in nsILoadContext loadContext); */
328 : NS_IMETHODIMP nsScriptSecurityManager::GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal * *_retval)
329 : {
330 : return NS_ERROR_NOT_IMPLEMENTED;
331 : }
332 :
333 : /* nsIPrincipal getDocShellCodebasePrincipal (in nsIURI uri, in nsIDocShell docShell); */
334 : NS_IMETHODIMP nsScriptSecurityManager::GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal * *_retval)
335 : {
336 : return NS_ERROR_NOT_IMPLEMENTED;
337 : }
338 :
339 : /* [deprecated] nsIPrincipal getCodebasePrincipal (in nsIURI uri); */
340 : NS_IMETHODIMP nsScriptSecurityManager::GetCodebasePrincipal(nsIURI *uri, nsIPrincipal * *_retval)
341 : {
342 : return NS_ERROR_NOT_IMPLEMENTED;
343 : }
344 :
345 : /* [implicit_jscontext] nsIPrincipal createCodebasePrincipal (in nsIURI uri, in jsval originAttributes); */
346 : NS_IMETHODIMP nsScriptSecurityManager::CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval)
347 : {
348 : return NS_ERROR_NOT_IMPLEMENTED;
349 : }
350 :
351 : /* nsIPrincipal createCodebasePrincipalFromOrigin (in ACString origin); */
352 : NS_IMETHODIMP nsScriptSecurityManager::CreateCodebasePrincipalFromOrigin(const nsACString & origin, nsIPrincipal * *_retval)
353 : {
354 : return NS_ERROR_NOT_IMPLEMENTED;
355 : }
356 :
357 : /* [implicit_jscontext] nsIPrincipal createNullPrincipal (in jsval originAttributes); */
358 : NS_IMETHODIMP nsScriptSecurityManager::CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval)
359 : {
360 : return NS_ERROR_NOT_IMPLEMENTED;
361 : }
362 :
363 : /* void checkSameOriginURI (in nsIURI aSourceURI, in nsIURI aTargetURI, in boolean reportError); */
364 : NS_IMETHODIMP nsScriptSecurityManager::CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError)
365 : {
366 : return NS_ERROR_NOT_IMPLEMENTED;
367 : }
368 :
369 : /* nsIPrincipal getChannelResultPrincipal (in nsIChannel aChannel); */
370 : NS_IMETHODIMP nsScriptSecurityManager::GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval)
371 : {
372 : return NS_ERROR_NOT_IMPLEMENTED;
373 : }
374 :
375 : /* [noscript,nostdcall] nsIPrincipal getChannelResultPrincipalIfNotSandboxed (in nsIChannel aChannel); */
376 : nsresult nsScriptSecurityManager::GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal * *_retval)
377 : {
378 : return NS_ERROR_NOT_IMPLEMENTED;
379 : }
380 :
381 : /* nsIPrincipal getChannelURIPrincipal (in nsIChannel aChannel); */
382 : NS_IMETHODIMP nsScriptSecurityManager::GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval)
383 : {
384 : return NS_ERROR_NOT_IMPLEMENTED;
385 : }
386 :
387 : /* boolean isSystemPrincipal (in nsIPrincipal aPrincipal); */
388 : NS_IMETHODIMP nsScriptSecurityManager::IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval)
389 : {
390 : return NS_ERROR_NOT_IMPLEMENTED;
391 : }
392 :
393 : /* nsIDomainPolicy activateDomainPolicy (); */
394 : NS_IMETHODIMP nsScriptSecurityManager::ActivateDomainPolicy(nsIDomainPolicy * *_retval)
395 : {
396 : return NS_ERROR_NOT_IMPLEMENTED;
397 : }
398 :
399 : /* readonly attribute boolean domainPolicyActive; */
400 : NS_IMETHODIMP nsScriptSecurityManager::GetDomainPolicyActive(bool *aDomainPolicyActive)
401 : {
402 : return NS_ERROR_NOT_IMPLEMENTED;
403 : }
404 :
405 : /* [noscript] nsIDomainPolicy activateDomainPolicyInternal (); */
406 : NS_IMETHODIMP nsScriptSecurityManager::ActivateDomainPolicyInternal(nsIDomainPolicy * *_retval)
407 : {
408 : return NS_ERROR_NOT_IMPLEMENTED;
409 : }
410 :
411 : /* [noscript,notxpcom] void cloneDomainPolicy (in DomainPolicyClonePtr aClone); */
412 : NS_IMETHODIMP_(void) nsScriptSecurityManager::CloneDomainPolicy(mozilla::dom::DomainPolicyClone *aClone)
413 : {
414 : return NS_ERROR_NOT_IMPLEMENTED;
415 : }
416 :
417 : /* bool policyAllowsScript (in nsIURI aDomain); */
418 : NS_IMETHODIMP nsScriptSecurityManager::PolicyAllowsScript(nsIURI *aDomain, bool *_retval)
419 : {
420 : return NS_ERROR_NOT_IMPLEMENTED;
421 : }
422 :
423 : /* End of implementation class template. */
424 : #endif
425 :
426 : #define NS_SCRIPTSECURITYMANAGER_CONTRACTID "@mozilla.org/scriptsecuritymanager;1"
427 :
428 : #endif /* __gen_nsIScriptSecurityManager_h__ */
|