1 /* This Source Code Form is subject to the terms of the Mozilla Public
2 * License, v. 2.0. If a copy of the MPL was not distributed with this
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
5 #include "ImageBlocker.h"
6 #include "nsIPermissionManager.h"
7 #include "nsContentUtils.h"
8 #include "mozilla/StaticPrefs_permissions.h"
11 using namespace mozilla
;
12 using namespace mozilla::image
;
14 NS_IMPL_ISUPPORTS(ImageBlocker
, nsIContentPolicy
)
17 ImageBlocker::ShouldLoad(nsIURI
* aContentLocation
, nsILoadInfo
* aLoadInfo
,
18 const nsACString
& aMimeGuess
, int16_t* aShouldLoad
) {
19 ExtContentPolicyType contentType
= aLoadInfo
->GetExternalContentPolicyType();
21 *aShouldLoad
= nsIContentPolicy::ACCEPT
;
23 // we only want to check http, https, ftp
24 // for chrome:// and resources and others, no need to check.
26 aContentLocation
->GetScheme(scheme
);
27 if (!scheme
.LowerCaseEqualsLiteral("ftp") &&
28 !scheme
.LowerCaseEqualsLiteral("http") &&
29 !scheme
.LowerCaseEqualsLiteral("https")) {
33 // Block loading images depending on the permissions.default.image pref.
34 if ((contentType
== ExtContentPolicy::TYPE_IMAGE
||
35 contentType
== ExtContentPolicy::TYPE_IMAGESET
) &&
36 StaticPrefs::permissions_default_image() ==
37 nsIPermissionManager::DENY_ACTION
) {
38 NS_SetRequestBlockingReason(
39 aLoadInfo
, nsILoadInfo::BLOCKING_REASON_CONTENT_POLICY_CONTENT_BLOCKED
);
40 *aShouldLoad
= nsIContentPolicy::REJECT_TYPE
;
47 ImageBlocker::ShouldProcess(nsIURI
* aContentLocation
, nsILoadInfo
* aLoadInfo
,
48 const nsACString
& aMimeGuess
,
49 int16_t* aShouldProcess
) {
50 // We block images at load level already, so those should not end up here.
51 *aShouldProcess
= nsIContentPolicy::ACCEPT
;