Bumping manifests a=b2g-bump
[gecko.git] / caps / nsIScriptSecurityManager.idl
blob33503a33ef0cbd1e68a3b0f61c7b274c117ea63c
1 /* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* This Source Code Form is subject to the terms of the Mozilla Public
3 * License, v. 2.0. If a copy of the MPL was not distributed with this
4 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
6 #include "nsISupports.idl"
7 #include "nsIPrincipal.idl"
8 interface nsIURI;
9 interface nsIChannel;
10 interface nsIClassInfo;
11 interface nsIDocShell;
12 interface nsIDomainPolicy;
13 interface nsILoadContext;
15 %{ C++
16 #include "jspubtd.h"
19 [ptr] native JSContextPtr(JSContext);
20 [ptr] native JSObjectPtr(JSObject);
22 [scriptable, uuid(f649959d-dae3-4027-83fd-5b7f8c8a8815)]
23 interface nsIScriptSecurityManager : nsISupports
25 /**
26 * For each of these hooks returning NS_OK means 'let the action continue'.
27 * Returning an error code means 'veto the action'. XPConnect will return
28 * false to the js engine if the action is vetoed. The implementor of this
29 * interface is responsible for setting a JS exception into the JSContext
30 * if that is appropriate.
32 [noscript] void canCreateWrapper(in JSContextPtr aJSContext,
33 in nsIIDRef aIID,
34 in nsISupports aObj,
35 in nsIClassInfo aClassInfo);
37 [noscript] void canCreateInstance(in JSContextPtr aJSContext,
38 in nsCIDRef aCID);
40 [noscript] void canGetService(in JSContextPtr aJSContext,
41 in nsCIDRef aCID);
43 /**
44 * Check that the script currently running in context "cx" can load "uri".
46 * Will return error code NS_ERROR_DOM_BAD_URI if the load request
47 * should be denied.
49 * @param cx the JSContext of the script causing the load
50 * @param uri the URI that is being loaded
52 [noscript] void checkLoadURIFromScript(in JSContextPtr cx, in nsIURI uri);
54 /**
55 * Default CheckLoadURI permissions
57 // Default permissions
58 const unsigned long STANDARD = 0;
60 // Indicate that the load is a load of a new document that is not
61 // user-triggered. Here "user-triggered" could be broadly interpreted --
62 // for example, scripted sets of window.location.href might be treated as
63 // "user-triggered" in some circumstances. A typical example of a load
64 // that is not user-triggered is a <meta> refresh load. If this flag is
65 // set, the load will be denied if the originating principal's URI has the
66 // nsIProtocolHandler::URI_FORBIDS_AUTOMATIC_DOCUMENT_REPLACEMENT flag set.
67 const unsigned long LOAD_IS_AUTOMATIC_DOCUMENT_REPLACEMENT = 1 << 0;
69 // Allow the loading of chrome URLs by non-chrome URLs. Use with great
70 // care! This will actually allow the loading of any URI which has the
71 // nsIProtocolHandler::URI_IS_UI_RESOURCE protocol handler flag set. Ths
72 // probably means at least chrome: and resource:.
73 const unsigned long ALLOW_CHROME = 1 << 1;
75 // Don't allow URLs which would inherit the caller's principal (such as
76 // javascript: or data:) to load. See
77 // nsIProtocolHandler::URI_INHERITS_SECURITY_CONTEXT.
78 const unsigned long DISALLOW_INHERIT_PRINCIPAL = 1 << 2;
80 // Alias for DISALLOW_INHERIT_PRINCIPAL for backwards compat with
81 // JS-implemented extensions.
82 const unsigned long DISALLOW_SCRIPT_OR_DATA = DISALLOW_INHERIT_PRINCIPAL;
84 // Don't allow javascript: URLs to load
85 // WARNING: Support for this value was added in Mozilla 1.7.8 and
86 // Firefox 1.0.4. Use in prior versions WILL BE IGNORED.
87 // When using this, make sure that you actually want DISALLOW_SCRIPT, not
88 // DISALLOW_INHERIT_PRINCIPAL
89 const unsigned long DISALLOW_SCRIPT = 1 << 3;
91 // Do not report errors if we just want to check if a principal can load
92 // a URI to not unnecessarily spam the error console.
93 const unsigned long DONT_REPORT_ERRORS = 1 << 4;
95 /**
96 * Check that content with principal aPrincipal can load "uri".
98 * Will return error code NS_ERROR_DOM_BAD_URI if the load request
99 * should be denied.
101 * @param aPrincipal the principal identifying the actor causing the load
102 * @param uri the URI that is being loaded
103 * @param flags the permission set, see above
105 void checkLoadURIWithPrincipal(in nsIPrincipal aPrincipal,
106 in nsIURI uri,
107 in unsigned long flags);
110 * Similar to checkLoadURIWithPrincipal but there are two differences:
112 * 1) The URI is a string, not a URI object.
113 * 2) This function assumes that the URI may still be subject to fixup (and
114 * hence will check whether fixed-up versions of the URI are allowed to
115 * load as well); if any of the versions of this URI is not allowed, this
116 * function will return error code NS_ERROR_DOM_BAD_URI.
118 void checkLoadURIStrWithPrincipal(in nsIPrincipal aPrincipal,
119 in AUTF8String uri,
120 in unsigned long flags);
123 * Return true if scripts may be executed in the scope of the given global.
125 [noscript,notxpcom] boolean scriptAllowed(in JSObjectPtr aGlobal);
127 ///////////////// Principals ///////////////////////
130 * Return the all-powerful system principal.
132 nsIPrincipal getSystemPrincipal();
135 * Return a principal that has the same origin as aURI.
136 * This principals should not be used for any data/permission check, it will
137 * have appId = UNKNOWN_APP_ID.
139 nsIPrincipal getSimpleCodebasePrincipal(in nsIURI aURI);
142 * Returns a principal that has the given information.
143 * @param appId is the app id of the principal. It can't be UNKNOWN_APP_ID.
144 * @param inMozBrowser is true if the principal has to be considered as
145 * inside a mozbrowser frame.
147 nsIPrincipal getAppCodebasePrincipal(in nsIURI uri,
148 in unsigned long appId,
149 in boolean inMozBrowser);
152 * Returns a principal that has the appId and inMozBrowser of the load
153 * context.
154 * @param loadContext to get appId/inMozBrowser from.
156 nsIPrincipal getLoadContextCodebasePrincipal(in nsIURI uri,
157 in nsILoadContext loadContext);
160 * Returns a principal that has the appId and inMozBrowser of the docshell
161 * inside a mozbrowser frame.
162 * @param docShell to get appId/inMozBrowser from.
164 nsIPrincipal getDocShellCodebasePrincipal(in nsIURI uri,
165 in nsIDocShell docShell);
168 * Returns a principal with that has the same origin as uri and is not part
169 * of an appliction.
170 * The returned principal will have appId = NO_APP_ID.
172 nsIPrincipal getNoAppCodebasePrincipal(in nsIURI uri);
175 * Legacy name for getNoAppCodebasePrincipal.
177 * @deprecated use getNoAppCodebasePrincipal instead.
179 [deprecated] nsIPrincipal getCodebasePrincipal(in nsIURI uri);
182 * Returns OK if aSourceURI and target have the same "origin"
183 * (scheme, host, and port).
184 * ReportError flag suppresses error reports for functions that
185 * don't need reporting.
187 void checkSameOriginURI(in nsIURI aSourceURI,
188 in nsIURI aTargetURI,
189 in boolean reportError);
191 * Get the principal for the given channel. This will typically be the
192 * channel owner if there is one, and the codebase principal for the
193 * channel's URI otherwise. aChannel must not be null.
195 nsIPrincipal getChannelResultPrincipal(in nsIChannel aChannel);
198 * Get the codebase principal for the channel's URI.
199 * aChannel must not be null.
201 nsIPrincipal getChannelURIPrincipal(in nsIChannel aChannel);
204 * Check whether a given principal is a system principal. This allows us
205 * to avoid handing back the system principal to script while allowing
206 * script to check whether a given principal is system.
208 boolean isSystemPrincipal(in nsIPrincipal aPrincipal);
209 %{C++
210 bool IsSystemPrincipal(nsIPrincipal* aPrincipal) {
211 bool isSystem = false;
212 IsSystemPrincipal(aPrincipal, &isSystem);
213 return isSystem;
217 const unsigned long NO_APP_ID = 0;
218 const unsigned long UNKNOWN_APP_ID = 4294967295; // UINT32_MAX
219 const unsigned long SAFEBROWSING_APP_ID = 4294967294; // UINT32_MAX - 1
222 * Returns the jar prefix for the app.
223 * appId can be NO_APP_ID or a valid app id. appId should not be
224 * UNKNOWN_APP_ID.
225 * inMozBrowser has to be true if the app is inside a mozbrowser iframe.
227 AUTF8String getJarPrefix(in unsigned long appId, in boolean inMozBrowser);
230 * Per-domain controls to enable and disable script. This system is designed
231 * to be used by at most one consumer, and enforces this with its semantics.
233 * Initially, domainPolicyActive is false. When activateDomainPolicy() is
234 * invoked, domainPolicyActive becomes true, and subsequent calls to
235 * activateDomainPolicy() will fail until deactivate() is invoked on the
236 * nsIDomainPolicy returned from activateDomainPolicy(). At this point,
237 * domainPolicyActive becomes false again, and a new consumer may acquire
238 * control of the system by invoking activateDomainPolicy().
240 nsIDomainPolicy activateDomainPolicy();
241 readonly attribute boolean domainPolicyActive;
244 * Query mechanism for the above policy.
246 * If domainPolicyEnabled is false, this simply returns the current value
247 * of javascript.enabled. Otherwise, it returns the same value, but taking
248 * the various blacklist/whitelist exceptions into account.
250 bool policyAllowsScript(in nsIURI aDomain);
253 %{C++
254 #define NS_SCRIPTSECURITYMANAGER_CONTRACTID "@mozilla.org/scriptsecuritymanager;1"