LCOV - code coverage report
Current view: top level - obj-x86_64-pc-linux-gnu/dist/include - nsIScriptSecurityManager.h (source / functions) Hit Total Coverage
Test: output.info Lines: 5 5 100.0 %
Date: 2017-07-14 16:53:18 Functions: 2 2 100.0 %
Legend: Lines: hit not hit

          Line data    Source code
       1             : /*
       2             :  * DO NOT EDIT.  THIS FILE IS GENERATED FROM ../../../dist/idl/nsIScriptSecurityManager.idl
       3             :  */
       4             : 
       5             : #ifndef __gen_nsIScriptSecurityManager_h__
       6             : #define __gen_nsIScriptSecurityManager_h__
       7             : 
       8             : 
       9             : #ifndef __gen_nsISupports_h__
      10             : #include "nsISupports.h"
      11             : #endif
      12             : 
      13             : #ifndef __gen_nsIPrincipal_h__
      14             : #include "nsIPrincipal.h"
      15             : #endif
      16             : 
      17             : #include "js/Value.h"
      18             : 
      19             : /* For IDL files that don't want to include root IDL files. */
      20             : #ifndef NS_NO_VTABLE
      21             : #define NS_NO_VTABLE
      22             : #endif
      23             : class nsIURI; /* forward declaration */
      24             : 
      25             : class nsIChannel; /* forward declaration */
      26             : 
      27             : class nsIClassInfo; /* forward declaration */
      28             : 
      29             : class nsIDocShell; /* forward declaration */
      30             : 
      31             : class nsIDomainPolicy; /* forward declaration */
      32             : 
      33             : class nsILoadContext; /* forward declaration */
      34             : 
      35             : #include "jspubtd.h"
      36             : namespace mozilla {
      37             : namespace dom {
      38             : class DomainPolicyClone;
      39             : }
      40             : }
      41             : 
      42             : /* starting interface:    nsIScriptSecurityManager */
      43             : #define NS_ISCRIPTSECURITYMANAGER_IID_STR "51daad87-3a0c-44cc-b620-7356801c9022"
      44             : 
      45             : #define NS_ISCRIPTSECURITYMANAGER_IID \
      46             :   {0x51daad87, 0x3a0c, 0x44cc, \
      47             :     { 0xb6, 0x20, 0x73, 0x56, 0x80, 0x1c, 0x90, 0x22 }}
      48             : 
      49           3 : class nsIScriptSecurityManager : public nsISupports {
      50             :  public:
      51             : 
      52             :   NS_DECLARE_STATIC_IID_ACCESSOR(NS_ISCRIPTSECURITYMANAGER_IID)
      53             : 
      54             :   /* [noscript] void canCreateWrapper (in JSContextPtr aJSContext, in nsIIDRef aIID, in nsISupports aObj, in nsIClassInfo aClassInfo); */
      55             :   NS_IMETHOD CanCreateWrapper(JSContext *aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo) = 0;
      56             : 
      57             :   /* [noscript] void canCreateInstance (in JSContextPtr aJSContext, in nsCIDRef aCID); */
      58             :   NS_IMETHOD CanCreateInstance(JSContext *aJSContext, const nsCID & aCID) = 0;
      59             : 
      60             :   /* [noscript] void canGetService (in JSContextPtr aJSContext, in nsCIDRef aCID); */
      61             :   NS_IMETHOD CanGetService(JSContext *aJSContext, const nsCID & aCID) = 0;
      62             : 
      63             :   /* [noscript] void checkLoadURIFromScript (in JSContextPtr cx, in nsIURI uri); */
      64             :   NS_IMETHOD CheckLoadURIFromScript(JSContext *cx, nsIURI *uri) = 0;
      65             : 
      66             :   enum {
      67             :     STANDARD = 0U,
      68             :     LOAD_IS_AUTOMATIC_DOCUMENT_REPLACEMENT = 1U,
      69             :     ALLOW_CHROME = 2U,
      70             :     DISALLOW_INHERIT_PRINCIPAL = 4U,
      71             :     DISALLOW_SCRIPT_OR_DATA = 4U,
      72             :     DISALLOW_SCRIPT = 8U,
      73             :     DONT_REPORT_ERRORS = 16U
      74             :   };
      75             : 
      76             :   /* void checkLoadURIWithPrincipal (in nsIPrincipal aPrincipal, in nsIURI uri, in unsigned long flags); */
      77             :   NS_IMETHOD CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags) = 0;
      78             : 
      79             :   /* void checkLoadURIStrWithPrincipal (in nsIPrincipal aPrincipal, in AUTF8String uri, in unsigned long flags); */
      80             :   NS_IMETHOD CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString & uri, uint32_t flags) = 0;
      81             : 
      82             :   /* nsIPrincipal getSystemPrincipal (); */
      83             :   NS_IMETHOD GetSystemPrincipal(nsIPrincipal * *_retval) = 0;
      84             : 
      85             :   /* nsIPrincipal getLoadContextCodebasePrincipal (in nsIURI uri, in nsILoadContext loadContext); */
      86             :   NS_IMETHOD GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal * *_retval) = 0;
      87             : 
      88             :   /* nsIPrincipal getDocShellCodebasePrincipal (in nsIURI uri, in nsIDocShell docShell); */
      89             :   NS_IMETHOD GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal * *_retval) = 0;
      90             : 
      91             :   /* [deprecated] nsIPrincipal getCodebasePrincipal (in nsIURI uri); */
      92             :   NS_IMETHOD GetCodebasePrincipal(nsIURI *uri, nsIPrincipal * *_retval) = 0;
      93             : 
      94             :   /* [implicit_jscontext] nsIPrincipal createCodebasePrincipal (in nsIURI uri, in jsval originAttributes); */
      95             :   NS_IMETHOD CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval) = 0;
      96             : 
      97             :   /* nsIPrincipal createCodebasePrincipalFromOrigin (in ACString origin); */
      98             :   NS_IMETHOD CreateCodebasePrincipalFromOrigin(const nsACString & origin, nsIPrincipal * *_retval) = 0;
      99             : 
     100             :   /* [implicit_jscontext] nsIPrincipal createNullPrincipal (in jsval originAttributes); */
     101             :   NS_IMETHOD CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval) = 0;
     102             : 
     103             :   /* void checkSameOriginURI (in nsIURI aSourceURI, in nsIURI aTargetURI, in boolean reportError); */
     104             :   NS_IMETHOD CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError) = 0;
     105             : 
     106             :   /* nsIPrincipal getChannelResultPrincipal (in nsIChannel aChannel); */
     107             :   NS_IMETHOD GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval) = 0;
     108             : 
     109             :   /* [noscript,nostdcall] nsIPrincipal getChannelResultPrincipalIfNotSandboxed (in nsIChannel aChannel); */
     110             :   virtual nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal * *_retval) = 0;
     111             : 
     112             :   /* nsIPrincipal getChannelURIPrincipal (in nsIChannel aChannel); */
     113             :   NS_IMETHOD GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval) = 0;
     114             : 
     115             :   /* boolean isSystemPrincipal (in nsIPrincipal aPrincipal); */
     116             :   NS_IMETHOD IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval) = 0;
     117             : 
     118         571 :      bool IsSystemPrincipal(nsIPrincipal* aPrincipal) {
     119         571 :       bool isSystem = false;
     120         571 :       IsSystemPrincipal(aPrincipal, &isSystem);
     121         571 :       return isSystem;
     122             :     }
     123             :   enum {
     124             :     NO_APP_ID = 0U,
     125             :     UNKNOWN_APP_ID = 4294967295U,
     126             :     DEFAULT_USER_CONTEXT_ID = 0U
     127             :   };
     128             : 
     129             :   /* nsIDomainPolicy activateDomainPolicy (); */
     130             :   NS_IMETHOD ActivateDomainPolicy(nsIDomainPolicy * *_retval) = 0;
     131             : 
     132             :   /* readonly attribute boolean domainPolicyActive; */
     133             :   NS_IMETHOD GetDomainPolicyActive(bool *aDomainPolicyActive) = 0;
     134             : 
     135             :   /* [noscript] nsIDomainPolicy activateDomainPolicyInternal (); */
     136             :   NS_IMETHOD ActivateDomainPolicyInternal(nsIDomainPolicy * *_retval) = 0;
     137             : 
     138             :   /* [noscript,notxpcom] void cloneDomainPolicy (in DomainPolicyClonePtr aClone); */
     139             :   NS_IMETHOD_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone *aClone) = 0;
     140             : 
     141             :   /* bool policyAllowsScript (in nsIURI aDomain); */
     142             :   NS_IMETHOD PolicyAllowsScript(nsIURI *aDomain, bool *_retval) = 0;
     143             : 
     144             : };
     145             : 
     146             :   NS_DEFINE_STATIC_IID_ACCESSOR(nsIScriptSecurityManager, NS_ISCRIPTSECURITYMANAGER_IID)
     147             : 
     148             : /* Use this macro when declaring classes that implement this interface. */
     149             : #define NS_DECL_NSISCRIPTSECURITYMANAGER \
     150             :   NS_IMETHOD CanCreateWrapper(JSContext *aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo) override; \
     151             :   NS_IMETHOD CanCreateInstance(JSContext *aJSContext, const nsCID & aCID) override; \
     152             :   NS_IMETHOD CanGetService(JSContext *aJSContext, const nsCID & aCID) override; \
     153             :   NS_IMETHOD CheckLoadURIFromScript(JSContext *cx, nsIURI *uri) override; \
     154             :   NS_IMETHOD CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags) override; \
     155             :   NS_IMETHOD CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString & uri, uint32_t flags) override; \
     156             :   NS_IMETHOD GetSystemPrincipal(nsIPrincipal * *_retval) override; \
     157             :   NS_IMETHOD GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal * *_retval) override; \
     158             :   NS_IMETHOD GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal * *_retval) override; \
     159             :   NS_IMETHOD GetCodebasePrincipal(nsIURI *uri, nsIPrincipal * *_retval) override; \
     160             :   NS_IMETHOD CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval) override; \
     161             :   NS_IMETHOD CreateCodebasePrincipalFromOrigin(const nsACString & origin, nsIPrincipal * *_retval) override; \
     162             :   NS_IMETHOD CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval) override; \
     163             :   NS_IMETHOD CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError) override; \
     164             :   NS_IMETHOD GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval) override; \
     165             :   virtual nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal * *_retval) override; \
     166             :   NS_IMETHOD GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval) override; \
     167             :   NS_IMETHOD IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval) override; \
     168             :   NS_IMETHOD ActivateDomainPolicy(nsIDomainPolicy * *_retval) override; \
     169             :   NS_IMETHOD GetDomainPolicyActive(bool *aDomainPolicyActive) override; \
     170             :   NS_IMETHOD ActivateDomainPolicyInternal(nsIDomainPolicy * *_retval) override; \
     171             :   NS_IMETHOD_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone *aClone) override; \
     172             :   NS_IMETHOD PolicyAllowsScript(nsIURI *aDomain, bool *_retval) override; 
     173             : 
     174             : /* Use this macro when declaring the members of this interface when the
     175             :    class doesn't implement the interface. This is useful for forwarding. */
     176             : #define NS_DECL_NON_VIRTUAL_NSISCRIPTSECURITYMANAGER \
     177             :   nsresult CanCreateWrapper(JSContext *aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo); \
     178             :   nsresult CanCreateInstance(JSContext *aJSContext, const nsCID & aCID); \
     179             :   nsresult CanGetService(JSContext *aJSContext, const nsCID & aCID); \
     180             :   nsresult CheckLoadURIFromScript(JSContext *cx, nsIURI *uri); \
     181             :   nsresult CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags); \
     182             :   nsresult CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString & uri, uint32_t flags); \
     183             :   nsresult GetSystemPrincipal(nsIPrincipal * *_retval); \
     184             :   nsresult GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal * *_retval); \
     185             :   nsresult GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal * *_retval); \
     186             :   nsresult GetCodebasePrincipal(nsIURI *uri, nsIPrincipal * *_retval); \
     187             :   nsresult CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval); \
     188             :   nsresult CreateCodebasePrincipalFromOrigin(const nsACString & origin, nsIPrincipal * *_retval); \
     189             :   nsresult CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval); \
     190             :   nsresult CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError); \
     191             :   nsresult GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval); \
     192             :   nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal * *_retval); \
     193             :   nsresult GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval); \
     194             :   nsresult IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval); \
     195             :   nsresult ActivateDomainPolicy(nsIDomainPolicy * *_retval); \
     196             :   nsresult GetDomainPolicyActive(bool *aDomainPolicyActive); \
     197             :   nsresult ActivateDomainPolicyInternal(nsIDomainPolicy * *_retval); \
     198             :   nsresult_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone *aClone); \
     199             :   nsresult PolicyAllowsScript(nsIURI *aDomain, bool *_retval); 
     200             : 
     201             : /* Use this macro to declare functions that forward the behavior of this interface to another object. */
     202             : #define NS_FORWARD_NSISCRIPTSECURITYMANAGER(_to) \
     203             :   NS_IMETHOD CanCreateWrapper(JSContext *aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo) override { return _to CanCreateWrapper(aJSContext, aIID, aObj, aClassInfo); } \
     204             :   NS_IMETHOD CanCreateInstance(JSContext *aJSContext, const nsCID & aCID) override { return _to CanCreateInstance(aJSContext, aCID); } \
     205             :   NS_IMETHOD CanGetService(JSContext *aJSContext, const nsCID & aCID) override { return _to CanGetService(aJSContext, aCID); } \
     206             :   NS_IMETHOD CheckLoadURIFromScript(JSContext *cx, nsIURI *uri) override { return _to CheckLoadURIFromScript(cx, uri); } \
     207             :   NS_IMETHOD CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags) override { return _to CheckLoadURIWithPrincipal(aPrincipal, uri, flags); } \
     208             :   NS_IMETHOD CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString & uri, uint32_t flags) override { return _to CheckLoadURIStrWithPrincipal(aPrincipal, uri, flags); } \
     209             :   NS_IMETHOD GetSystemPrincipal(nsIPrincipal * *_retval) override { return _to GetSystemPrincipal(_retval); } \
     210             :   NS_IMETHOD GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal * *_retval) override { return _to GetLoadContextCodebasePrincipal(uri, loadContext, _retval); } \
     211             :   NS_IMETHOD GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal * *_retval) override { return _to GetDocShellCodebasePrincipal(uri, docShell, _retval); } \
     212             :   NS_IMETHOD GetCodebasePrincipal(nsIURI *uri, nsIPrincipal * *_retval) override { return _to GetCodebasePrincipal(uri, _retval); } \
     213             :   NS_IMETHOD CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval) override { return _to CreateCodebasePrincipal(uri, originAttributes, cx, _retval); } \
     214             :   NS_IMETHOD CreateCodebasePrincipalFromOrigin(const nsACString & origin, nsIPrincipal * *_retval) override { return _to CreateCodebasePrincipalFromOrigin(origin, _retval); } \
     215             :   NS_IMETHOD CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval) override { return _to CreateNullPrincipal(originAttributes, cx, _retval); } \
     216             :   NS_IMETHOD CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError) override { return _to CheckSameOriginURI(aSourceURI, aTargetURI, reportError); } \
     217             :   NS_IMETHOD GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval) override { return _to GetChannelResultPrincipal(aChannel, _retval); } \
     218             :   virtual nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal * *_retval) override { return _to GetChannelResultPrincipalIfNotSandboxed(aChannel, _retval); } \
     219             :   NS_IMETHOD GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval) override { return _to GetChannelURIPrincipal(aChannel, _retval); } \
     220             :   NS_IMETHOD IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval) override { return _to IsSystemPrincipal(aPrincipal, _retval); } \
     221             :   NS_IMETHOD ActivateDomainPolicy(nsIDomainPolicy * *_retval) override { return _to ActivateDomainPolicy(_retval); } \
     222             :   NS_IMETHOD GetDomainPolicyActive(bool *aDomainPolicyActive) override { return _to GetDomainPolicyActive(aDomainPolicyActive); } \
     223             :   NS_IMETHOD ActivateDomainPolicyInternal(nsIDomainPolicy * *_retval) override { return _to ActivateDomainPolicyInternal(_retval); } \
     224             :   NS_IMETHOD_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone *aClone) override { return _to CloneDomainPolicy(aClone); } \
     225             :   NS_IMETHOD PolicyAllowsScript(nsIURI *aDomain, bool *_retval) override { return _to PolicyAllowsScript(aDomain, _retval); } 
     226             : 
     227             : /* Use this macro to declare functions that forward the behavior of this interface to another object in a safe way. */
     228             : #define NS_FORWARD_SAFE_NSISCRIPTSECURITYMANAGER(_to) \
     229             :   NS_IMETHOD CanCreateWrapper(JSContext *aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CanCreateWrapper(aJSContext, aIID, aObj, aClassInfo); } \
     230             :   NS_IMETHOD CanCreateInstance(JSContext *aJSContext, const nsCID & aCID) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CanCreateInstance(aJSContext, aCID); } \
     231             :   NS_IMETHOD CanGetService(JSContext *aJSContext, const nsCID & aCID) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CanGetService(aJSContext, aCID); } \
     232             :   NS_IMETHOD CheckLoadURIFromScript(JSContext *cx, nsIURI *uri) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CheckLoadURIFromScript(cx, uri); } \
     233             :   NS_IMETHOD CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CheckLoadURIWithPrincipal(aPrincipal, uri, flags); } \
     234             :   NS_IMETHOD CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString & uri, uint32_t flags) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CheckLoadURIStrWithPrincipal(aPrincipal, uri, flags); } \
     235             :   NS_IMETHOD GetSystemPrincipal(nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetSystemPrincipal(_retval); } \
     236             :   NS_IMETHOD GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetLoadContextCodebasePrincipal(uri, loadContext, _retval); } \
     237             :   NS_IMETHOD GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetDocShellCodebasePrincipal(uri, docShell, _retval); } \
     238             :   NS_IMETHOD GetCodebasePrincipal(nsIURI *uri, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetCodebasePrincipal(uri, _retval); } \
     239             :   NS_IMETHOD CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CreateCodebasePrincipal(uri, originAttributes, cx, _retval); } \
     240             :   NS_IMETHOD CreateCodebasePrincipalFromOrigin(const nsACString & origin, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CreateCodebasePrincipalFromOrigin(origin, _retval); } \
     241             :   NS_IMETHOD CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CreateNullPrincipal(originAttributes, cx, _retval); } \
     242             :   NS_IMETHOD CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CheckSameOriginURI(aSourceURI, aTargetURI, reportError); } \
     243             :   NS_IMETHOD GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetChannelResultPrincipal(aChannel, _retval); } \
     244             :   virtual nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetChannelResultPrincipalIfNotSandboxed(aChannel, _retval); } \
     245             :   NS_IMETHOD GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetChannelURIPrincipal(aChannel, _retval); } \
     246             :   NS_IMETHOD IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->IsSystemPrincipal(aPrincipal, _retval); } \
     247             :   NS_IMETHOD ActivateDomainPolicy(nsIDomainPolicy * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->ActivateDomainPolicy(_retval); } \
     248             :   NS_IMETHOD GetDomainPolicyActive(bool *aDomainPolicyActive) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetDomainPolicyActive(aDomainPolicyActive); } \
     249             :   NS_IMETHOD ActivateDomainPolicyInternal(nsIDomainPolicy * *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->ActivateDomainPolicyInternal(_retval); } \
     250             :   NS_IMETHOD_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone *aClone) override; \
     251             :   NS_IMETHOD PolicyAllowsScript(nsIURI *aDomain, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->PolicyAllowsScript(aDomain, _retval); } 
     252             : 
     253             : #if 0
     254             : /* Use the code below as a template for the implementation class for this interface. */
     255             : 
     256             : /* Header file */
     257             : class nsScriptSecurityManager : public nsIScriptSecurityManager
     258             : {
     259             : public:
     260             :   NS_DECL_ISUPPORTS
     261             :   NS_DECL_NSISCRIPTSECURITYMANAGER
     262             : 
     263             :   nsScriptSecurityManager();
     264             : 
     265             : private:
     266             :   ~nsScriptSecurityManager();
     267             : 
     268             : protected:
     269             :   /* additional members */
     270             : };
     271             : 
     272             : /* Implementation file */
     273             : NS_IMPL_ISUPPORTS(nsScriptSecurityManager, nsIScriptSecurityManager)
     274             : 
     275             : nsScriptSecurityManager::nsScriptSecurityManager()
     276             : {
     277             :   /* member initializers and constructor code */
     278             : }
     279             : 
     280             : nsScriptSecurityManager::~nsScriptSecurityManager()
     281             : {
     282             :   /* destructor code */
     283             : }
     284             : 
     285             : /* [noscript] void canCreateWrapper (in JSContextPtr aJSContext, in nsIIDRef aIID, in nsISupports aObj, in nsIClassInfo aClassInfo); */
     286             : NS_IMETHODIMP nsScriptSecurityManager::CanCreateWrapper(JSContext *aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo)
     287             : {
     288             :     return NS_ERROR_NOT_IMPLEMENTED;
     289             : }
     290             : 
     291             : /* [noscript] void canCreateInstance (in JSContextPtr aJSContext, in nsCIDRef aCID); */
     292             : NS_IMETHODIMP nsScriptSecurityManager::CanCreateInstance(JSContext *aJSContext, const nsCID & aCID)
     293             : {
     294             :     return NS_ERROR_NOT_IMPLEMENTED;
     295             : }
     296             : 
     297             : /* [noscript] void canGetService (in JSContextPtr aJSContext, in nsCIDRef aCID); */
     298             : NS_IMETHODIMP nsScriptSecurityManager::CanGetService(JSContext *aJSContext, const nsCID & aCID)
     299             : {
     300             :     return NS_ERROR_NOT_IMPLEMENTED;
     301             : }
     302             : 
     303             : /* [noscript] void checkLoadURIFromScript (in JSContextPtr cx, in nsIURI uri); */
     304             : NS_IMETHODIMP nsScriptSecurityManager::CheckLoadURIFromScript(JSContext *cx, nsIURI *uri)
     305             : {
     306             :     return NS_ERROR_NOT_IMPLEMENTED;
     307             : }
     308             : 
     309             : /* void checkLoadURIWithPrincipal (in nsIPrincipal aPrincipal, in nsIURI uri, in unsigned long flags); */
     310             : NS_IMETHODIMP nsScriptSecurityManager::CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags)
     311             : {
     312             :     return NS_ERROR_NOT_IMPLEMENTED;
     313             : }
     314             : 
     315             : /* void checkLoadURIStrWithPrincipal (in nsIPrincipal aPrincipal, in AUTF8String uri, in unsigned long flags); */
     316             : NS_IMETHODIMP nsScriptSecurityManager::CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString & uri, uint32_t flags)
     317             : {
     318             :     return NS_ERROR_NOT_IMPLEMENTED;
     319             : }
     320             : 
     321             : /* nsIPrincipal getSystemPrincipal (); */
     322             : NS_IMETHODIMP nsScriptSecurityManager::GetSystemPrincipal(nsIPrincipal * *_retval)
     323             : {
     324             :     return NS_ERROR_NOT_IMPLEMENTED;
     325             : }
     326             : 
     327             : /* nsIPrincipal getLoadContextCodebasePrincipal (in nsIURI uri, in nsILoadContext loadContext); */
     328             : NS_IMETHODIMP nsScriptSecurityManager::GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal * *_retval)
     329             : {
     330             :     return NS_ERROR_NOT_IMPLEMENTED;
     331             : }
     332             : 
     333             : /* nsIPrincipal getDocShellCodebasePrincipal (in nsIURI uri, in nsIDocShell docShell); */
     334             : NS_IMETHODIMP nsScriptSecurityManager::GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal * *_retval)
     335             : {
     336             :     return NS_ERROR_NOT_IMPLEMENTED;
     337             : }
     338             : 
     339             : /* [deprecated] nsIPrincipal getCodebasePrincipal (in nsIURI uri); */
     340             : NS_IMETHODIMP nsScriptSecurityManager::GetCodebasePrincipal(nsIURI *uri, nsIPrincipal * *_retval)
     341             : {
     342             :     return NS_ERROR_NOT_IMPLEMENTED;
     343             : }
     344             : 
     345             : /* [implicit_jscontext] nsIPrincipal createCodebasePrincipal (in nsIURI uri, in jsval originAttributes); */
     346             : NS_IMETHODIMP nsScriptSecurityManager::CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval)
     347             : {
     348             :     return NS_ERROR_NOT_IMPLEMENTED;
     349             : }
     350             : 
     351             : /* nsIPrincipal createCodebasePrincipalFromOrigin (in ACString origin); */
     352             : NS_IMETHODIMP nsScriptSecurityManager::CreateCodebasePrincipalFromOrigin(const nsACString & origin, nsIPrincipal * *_retval)
     353             : {
     354             :     return NS_ERROR_NOT_IMPLEMENTED;
     355             : }
     356             : 
     357             : /* [implicit_jscontext] nsIPrincipal createNullPrincipal (in jsval originAttributes); */
     358             : NS_IMETHODIMP nsScriptSecurityManager::CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal * *_retval)
     359             : {
     360             :     return NS_ERROR_NOT_IMPLEMENTED;
     361             : }
     362             : 
     363             : /* void checkSameOriginURI (in nsIURI aSourceURI, in nsIURI aTargetURI, in boolean reportError); */
     364             : NS_IMETHODIMP nsScriptSecurityManager::CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError)
     365             : {
     366             :     return NS_ERROR_NOT_IMPLEMENTED;
     367             : }
     368             : 
     369             : /* nsIPrincipal getChannelResultPrincipal (in nsIChannel aChannel); */
     370             : NS_IMETHODIMP nsScriptSecurityManager::GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval)
     371             : {
     372             :     return NS_ERROR_NOT_IMPLEMENTED;
     373             : }
     374             : 
     375             : /* [noscript,nostdcall] nsIPrincipal getChannelResultPrincipalIfNotSandboxed (in nsIChannel aChannel); */
     376             : nsresult nsScriptSecurityManager::GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal * *_retval)
     377             : {
     378             :     return NS_ERROR_NOT_IMPLEMENTED;
     379             : }
     380             : 
     381             : /* nsIPrincipal getChannelURIPrincipal (in nsIChannel aChannel); */
     382             : NS_IMETHODIMP nsScriptSecurityManager::GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal * *_retval)
     383             : {
     384             :     return NS_ERROR_NOT_IMPLEMENTED;
     385             : }
     386             : 
     387             : /* boolean isSystemPrincipal (in nsIPrincipal aPrincipal); */
     388             : NS_IMETHODIMP nsScriptSecurityManager::IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval)
     389             : {
     390             :     return NS_ERROR_NOT_IMPLEMENTED;
     391             : }
     392             : 
     393             : /* nsIDomainPolicy activateDomainPolicy (); */
     394             : NS_IMETHODIMP nsScriptSecurityManager::ActivateDomainPolicy(nsIDomainPolicy * *_retval)
     395             : {
     396             :     return NS_ERROR_NOT_IMPLEMENTED;
     397             : }
     398             : 
     399             : /* readonly attribute boolean domainPolicyActive; */
     400             : NS_IMETHODIMP nsScriptSecurityManager::GetDomainPolicyActive(bool *aDomainPolicyActive)
     401             : {
     402             :     return NS_ERROR_NOT_IMPLEMENTED;
     403             : }
     404             : 
     405             : /* [noscript] nsIDomainPolicy activateDomainPolicyInternal (); */
     406             : NS_IMETHODIMP nsScriptSecurityManager::ActivateDomainPolicyInternal(nsIDomainPolicy * *_retval)
     407             : {
     408             :     return NS_ERROR_NOT_IMPLEMENTED;
     409             : }
     410             : 
     411             : /* [noscript,notxpcom] void cloneDomainPolicy (in DomainPolicyClonePtr aClone); */
     412             : NS_IMETHODIMP_(void) nsScriptSecurityManager::CloneDomainPolicy(mozilla::dom::DomainPolicyClone *aClone)
     413             : {
     414             :     return NS_ERROR_NOT_IMPLEMENTED;
     415             : }
     416             : 
     417             : /* bool policyAllowsScript (in nsIURI aDomain); */
     418             : NS_IMETHODIMP nsScriptSecurityManager::PolicyAllowsScript(nsIURI *aDomain, bool *_retval)
     419             : {
     420             :     return NS_ERROR_NOT_IMPLEMENTED;
     421             : }
     422             : 
     423             : /* End of implementation class template. */
     424             : #endif
     425             : 
     426             : #define NS_SCRIPTSECURITYMANAGER_CONTRACTID "@mozilla.org/scriptsecuritymanager;1"
     427             : 
     428             : #endif /* __gen_nsIScriptSecurityManager_h__ */

Generated by: LCOV version 1.13