mirror of
https://github.com/Feodor2/Mypal68.git
synced 2025-06-19 07:15:36 -04:00
101 lines
3.5 KiB
C++
101 lines
3.5 KiB
C++
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "nsWebBrowserContentPolicy.h"
|
|
#include "nsIDocShell.h"
|
|
#include "nsCOMPtr.h"
|
|
#include "nsContentPolicyUtils.h"
|
|
#include "nsNetUtil.h"
|
|
|
|
nsWebBrowserContentPolicy::nsWebBrowserContentPolicy() = default;
|
|
|
|
nsWebBrowserContentPolicy::~nsWebBrowserContentPolicy() = default;
|
|
|
|
NS_IMPL_ISUPPORTS(nsWebBrowserContentPolicy, nsIContentPolicy)
|
|
|
|
NS_IMETHODIMP
|
|
nsWebBrowserContentPolicy::ShouldLoad(nsIURI* aContentLocation,
|
|
nsILoadInfo* aLoadInfo,
|
|
const nsACString& aMimeGuess,
|
|
int16_t* aShouldLoad) {
|
|
MOZ_ASSERT(aShouldLoad, "Null out param");
|
|
|
|
uint32_t contentType = aLoadInfo->GetExternalContentPolicyType();
|
|
MOZ_ASSERT(contentType == nsContentUtils::InternalContentPolicyTypeToExternal(
|
|
contentType),
|
|
"We should only see external content policy types here.");
|
|
|
|
*aShouldLoad = nsIContentPolicy::ACCEPT;
|
|
|
|
nsCOMPtr<nsISupports> context = aLoadInfo->GetLoadingContext();
|
|
nsIDocShell* shell = NS_CP_GetDocShellFromContext(context);
|
|
/* We're going to dereference shell, so make sure it isn't null */
|
|
if (!shell) {
|
|
return NS_OK;
|
|
}
|
|
|
|
nsresult rv;
|
|
bool allowed = true;
|
|
|
|
switch (contentType) {
|
|
case nsIContentPolicy::TYPE_SCRIPT:
|
|
rv = shell->GetAllowJavascript(&allowed);
|
|
break;
|
|
case nsIContentPolicy::TYPE_SUBDOCUMENT:
|
|
rv = shell->GetAllowSubframes(&allowed);
|
|
break;
|
|
#if 0
|
|
/* XXXtw: commented out in old code; add during conpol phase 2 */
|
|
case nsIContentPolicy::TYPE_REFRESH:
|
|
rv = shell->GetAllowMetaRedirects(&allowed); /* meta _refresh_ */
|
|
break;
|
|
#endif
|
|
case nsIContentPolicy::TYPE_IMAGE:
|
|
case nsIContentPolicy::TYPE_IMAGESET:
|
|
rv = shell->GetAllowImages(&allowed);
|
|
break;
|
|
default:
|
|
return NS_OK;
|
|
}
|
|
|
|
if (NS_SUCCEEDED(rv) && !allowed) {
|
|
NS_SetRequestBlockingReason(
|
|
aLoadInfo, nsILoadInfo::BLOCKING_REASON_CONTENT_POLICY_WEB_BROWSER);
|
|
*aShouldLoad = nsIContentPolicy::REJECT_TYPE;
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsWebBrowserContentPolicy::ShouldProcess(nsIURI* aContentLocation,
|
|
nsILoadInfo* aLoadInfo,
|
|
const nsACString& aMimeGuess,
|
|
int16_t* aShouldProcess) {
|
|
MOZ_ASSERT(aShouldProcess, "Null out param");
|
|
|
|
uint32_t contentType = aLoadInfo->GetExternalContentPolicyType();
|
|
MOZ_ASSERT(contentType == nsContentUtils::InternalContentPolicyTypeToExternal(
|
|
contentType),
|
|
"We should only see external content policy types here.");
|
|
|
|
*aShouldProcess = nsIContentPolicy::ACCEPT;
|
|
|
|
// Object tags will always open channels with TYPE_OBJECT, but may end up
|
|
// loading with TYPE_IMAGE or TYPE_DOCUMENT as their final type, so we block
|
|
// actual-plugins at the process stage
|
|
if (contentType != nsIContentPolicy::TYPE_OBJECT) {
|
|
return NS_OK;
|
|
}
|
|
|
|
nsCOMPtr<nsISupports> context = aLoadInfo->GetLoadingContext();
|
|
nsIDocShell* shell = NS_CP_GetDocShellFromContext(context);
|
|
if (shell && (!shell->PluginsAllowedInCurrentDoc())) {
|
|
NS_SetRequestBlockingReason(
|
|
aLoadInfo, nsILoadInfo::BLOCKING_REASON_CONTENT_POLICY_WEB_BROWSER);
|
|
*aShouldProcess = nsIContentPolicy::REJECT_TYPE;
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|