/work/obj-fuzz/dist/include/nsIScriptSecurityManager.h
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * DO NOT EDIT. THIS FILE IS GENERATED FROM /src/mozilla-central/caps/nsIScriptSecurityManager.idl |
3 | | */ |
4 | | |
5 | | #ifndef __gen_nsIScriptSecurityManager_h__ |
6 | | #define __gen_nsIScriptSecurityManager_h__ |
7 | | |
8 | | |
9 | | #ifndef __gen_nsISupports_h__ |
10 | | #include "nsISupports.h" |
11 | | #endif |
12 | | |
13 | | #ifndef __gen_nsIPrincipal_h__ |
14 | | #include "nsIPrincipal.h" |
15 | | #endif |
16 | | |
17 | | #include "js/Value.h" |
18 | | |
19 | | #include "js/GCAnnotations.h" |
20 | | |
21 | | /* For IDL files that don't want to include root IDL files. */ |
22 | | #ifndef NS_NO_VTABLE |
23 | | #define NS_NO_VTABLE |
24 | | #endif |
25 | | class nsIURI; /* forward declaration */ |
26 | | |
27 | | class nsIChannel; /* forward declaration */ |
28 | | |
29 | | class nsIClassInfo; /* forward declaration */ |
30 | | |
31 | | class nsIDocShell; /* forward declaration */ |
32 | | |
33 | | class nsIDomainPolicy; /* forward declaration */ |
34 | | |
35 | | class nsILoadContext; /* forward declaration */ |
36 | | |
37 | | #include "jspubtd.h" |
38 | | namespace mozilla { |
39 | | namespace dom { |
40 | | class DomainPolicyClone; |
41 | | } |
42 | | } |
43 | | |
44 | | /* starting interface: nsIScriptSecurityManager */ |
45 | | #define NS_ISCRIPTSECURITYMANAGER_IID_STR "51daad87-3a0c-44cc-b620-7356801c9022" |
46 | | |
47 | | #define NS_ISCRIPTSECURITYMANAGER_IID \ |
48 | | {0x51daad87, 0x3a0c, 0x44cc, \ |
49 | | { 0xb6, 0x20, 0x73, 0x56, 0x80, 0x1c, 0x90, 0x22 }} |
50 | | |
51 | | class nsIScriptSecurityManager : public nsISupports { |
52 | | public: |
53 | | |
54 | | NS_DECLARE_STATIC_IID_ACCESSOR(NS_ISCRIPTSECURITYMANAGER_IID) |
55 | | |
56 | | /* [noscript] void canCreateWrapper (in JSContextPtr aJSContext, in nsIIDRef aIID, in nsISupports aObj, in nsIClassInfo aClassInfo); */ |
57 | | NS_IMETHOD CanCreateWrapper(JSContext * aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo) = 0; |
58 | | |
59 | | /* [noscript] void canCreateInstance (in JSContextPtr aJSContext, in nsCIDRef aCID); */ |
60 | | NS_IMETHOD CanCreateInstance(JSContext * aJSContext, const nsCID & aCID) = 0; |
61 | | |
62 | | /* [noscript] void canGetService (in JSContextPtr aJSContext, in nsCIDRef aCID); */ |
63 | | NS_IMETHOD CanGetService(JSContext * aJSContext, const nsCID & aCID) = 0; |
64 | | |
65 | | /* [noscript] void checkLoadURIFromScript (in JSContextPtr cx, in nsIURI uri); */ |
66 | | NS_IMETHOD CheckLoadURIFromScript(JSContext * cx, nsIURI *uri) = 0; |
67 | | |
68 | | enum { |
69 | | STANDARD = 0U, |
70 | | LOAD_IS_AUTOMATIC_DOCUMENT_REPLACEMENT = 1U, |
71 | | ALLOW_CHROME = 2U, |
72 | | DISALLOW_INHERIT_PRINCIPAL = 4U, |
73 | | DISALLOW_SCRIPT_OR_DATA = 4U, |
74 | | DISALLOW_SCRIPT = 8U, |
75 | | DONT_REPORT_ERRORS = 16U |
76 | | }; |
77 | | |
78 | | /* void checkLoadURIWithPrincipal (in nsIPrincipal aPrincipal, in nsIURI uri, in unsigned long flags); */ |
79 | | JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags) = 0; |
80 | | |
81 | | /* void checkLoadURIStrWithPrincipal (in nsIPrincipal aPrincipal, in AUTF8String uri, in unsigned long flags); */ |
82 | | JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString& uri, uint32_t flags) = 0; |
83 | | |
84 | | /* bool inFileURIWhitelist (in nsIURI aUri); */ |
85 | | JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD InFileURIWhitelist(nsIURI *aUri, bool *_retval) = 0; |
86 | | |
87 | | /* nsIPrincipal getSystemPrincipal (); */ |
88 | | JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD GetSystemPrincipal(nsIPrincipal **_retval) = 0; |
89 | | |
90 | | /* nsIPrincipal getLoadContextCodebasePrincipal (in nsIURI uri, in nsILoadContext loadContext); */ |
91 | | JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal **_retval) = 0; |
92 | | |
93 | | /* nsIPrincipal getDocShellCodebasePrincipal (in nsIURI uri, in nsIDocShell docShell); */ |
94 | | JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal **_retval) = 0; |
95 | | |
96 | | /* [implicit_jscontext] nsIPrincipal createCodebasePrincipal (in nsIURI uri, in jsval originAttributes); */ |
97 | | JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval) = 0; |
98 | | |
99 | | /* nsIPrincipal createCodebasePrincipalFromOrigin (in ACString origin); */ |
100 | | JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD CreateCodebasePrincipalFromOrigin(const nsACString& origin, nsIPrincipal **_retval) = 0; |
101 | | |
102 | | /* [implicit_jscontext] nsIPrincipal createNullPrincipal (in jsval originAttributes); */ |
103 | | JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval) = 0; |
104 | | |
105 | | /* void checkSameOriginURI (in nsIURI aSourceURI, in nsIURI aTargetURI, in boolean reportError, in boolean fromPrivateWindow); */ |
106 | | JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError, bool fromPrivateWindow) = 0; |
107 | | |
108 | | /* nsIPrincipal getChannelResultPrincipal (in nsIChannel aChannel); */ |
109 | | JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval) = 0; |
110 | | |
111 | | /* [noscript,nostdcall] nsIPrincipal getChannelResultPrincipalIfNotSandboxed (in nsIChannel aChannel); */ |
112 | | virtual nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal **_retval) = 0; |
113 | | |
114 | | /* nsIPrincipal getChannelURIPrincipal (in nsIChannel aChannel); */ |
115 | | JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval) = 0; |
116 | | |
117 | | /* boolean isSystemPrincipal (in nsIPrincipal aPrincipal); */ |
118 | | JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval) = 0; |
119 | | |
120 | 9 | bool IsSystemPrincipal(nsIPrincipal* aPrincipal) { |
121 | 9 | bool isSystem = false; |
122 | 9 | IsSystemPrincipal(aPrincipal, &isSystem); |
123 | 9 | return isSystem; |
124 | 9 | } |
125 | | enum { |
126 | | NO_APP_ID = 0U, |
127 | | UNKNOWN_APP_ID = 4294967295U, |
128 | | DEFAULT_USER_CONTEXT_ID = 0U |
129 | | }; |
130 | | |
131 | | /* nsIDomainPolicy activateDomainPolicy (); */ |
132 | | JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD ActivateDomainPolicy(nsIDomainPolicy **_retval) = 0; |
133 | | |
134 | | /* readonly attribute boolean domainPolicyActive; */ |
135 | | JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD GetDomainPolicyActive(bool *aDomainPolicyActive) = 0; |
136 | | |
137 | | /* [noscript] nsIDomainPolicy activateDomainPolicyInternal (); */ |
138 | | NS_IMETHOD ActivateDomainPolicyInternal(nsIDomainPolicy **_retval) = 0; |
139 | | |
140 | | /* [noscript,notxpcom] void cloneDomainPolicy (in DomainPolicyClonePtr aClone); */ |
141 | | NS_IMETHOD_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone * aClone) = 0; |
142 | | |
143 | | /* bool policyAllowsScript (in nsIURI aDomain); */ |
144 | | JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD PolicyAllowsScript(nsIURI *aDomain, bool *_retval) = 0; |
145 | | |
146 | | }; |
147 | | |
148 | | NS_DEFINE_STATIC_IID_ACCESSOR(nsIScriptSecurityManager, NS_ISCRIPTSECURITYMANAGER_IID) |
149 | | |
150 | | /* Use this macro when declaring classes that implement this interface. */ |
151 | | #define NS_DECL_NSISCRIPTSECURITYMANAGER \ |
152 | | NS_IMETHOD CanCreateWrapper(JSContext * aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo) override; \ |
153 | | NS_IMETHOD CanCreateInstance(JSContext * aJSContext, const nsCID & aCID) override; \ |
154 | | NS_IMETHOD CanGetService(JSContext * aJSContext, const nsCID & aCID) override; \ |
155 | | NS_IMETHOD CheckLoadURIFromScript(JSContext * cx, nsIURI *uri) override; \ |
156 | | NS_IMETHOD CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags) override; \ |
157 | | NS_IMETHOD CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString& uri, uint32_t flags) override; \ |
158 | | NS_IMETHOD InFileURIWhitelist(nsIURI *aUri, bool *_retval) override; \ |
159 | | NS_IMETHOD GetSystemPrincipal(nsIPrincipal **_retval) override; \ |
160 | | NS_IMETHOD GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal **_retval) override; \ |
161 | | NS_IMETHOD GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal **_retval) override; \ |
162 | | NS_IMETHOD CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval) override; \ |
163 | | NS_IMETHOD CreateCodebasePrincipalFromOrigin(const nsACString& origin, nsIPrincipal **_retval) override; \ |
164 | | NS_IMETHOD CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval) override; \ |
165 | | NS_IMETHOD CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError, bool fromPrivateWindow) override; \ |
166 | | NS_IMETHOD GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval) override; \ |
167 | | virtual nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal **_retval) override; \ |
168 | | NS_IMETHOD GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval) override; \ |
169 | | NS_IMETHOD IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval) override; \ |
170 | | NS_IMETHOD ActivateDomainPolicy(nsIDomainPolicy **_retval) override; \ |
171 | | NS_IMETHOD GetDomainPolicyActive(bool *aDomainPolicyActive) override; \ |
172 | | NS_IMETHOD ActivateDomainPolicyInternal(nsIDomainPolicy **_retval) override; \ |
173 | | NS_IMETHOD_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone * aClone) override; \ |
174 | | NS_IMETHOD PolicyAllowsScript(nsIURI *aDomain, bool *_retval) override; |
175 | | |
176 | | /* Use this macro when declaring the members of this interface when the |
177 | | class doesn't implement the interface. This is useful for forwarding. */ |
178 | | #define NS_DECL_NON_VIRTUAL_NSISCRIPTSECURITYMANAGER \ |
179 | | nsresult CanCreateWrapper(JSContext * aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo); \ |
180 | | nsresult CanCreateInstance(JSContext * aJSContext, const nsCID & aCID); \ |
181 | | nsresult CanGetService(JSContext * aJSContext, const nsCID & aCID); \ |
182 | | nsresult CheckLoadURIFromScript(JSContext * cx, nsIURI *uri); \ |
183 | | nsresult CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags); \ |
184 | | nsresult CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString& uri, uint32_t flags); \ |
185 | | nsresult InFileURIWhitelist(nsIURI *aUri, bool *_retval); \ |
186 | | nsresult GetSystemPrincipal(nsIPrincipal **_retval); \ |
187 | | nsresult GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal **_retval); \ |
188 | | nsresult GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal **_retval); \ |
189 | | nsresult CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval); \ |
190 | | nsresult CreateCodebasePrincipalFromOrigin(const nsACString& origin, nsIPrincipal **_retval); \ |
191 | | nsresult CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval); \ |
192 | | nsresult CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError, bool fromPrivateWindow); \ |
193 | | nsresult GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval); \ |
194 | | nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal **_retval); \ |
195 | | nsresult GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval); \ |
196 | | nsresult IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval); \ |
197 | | nsresult ActivateDomainPolicy(nsIDomainPolicy **_retval); \ |
198 | | nsresult GetDomainPolicyActive(bool *aDomainPolicyActive); \ |
199 | | nsresult ActivateDomainPolicyInternal(nsIDomainPolicy **_retval); \ |
200 | | nsresult_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone * aClone); \ |
201 | | nsresult PolicyAllowsScript(nsIURI *aDomain, bool *_retval); |
202 | | |
203 | | /* Use this macro to declare functions that forward the behavior of this interface to another object. */ |
204 | | #define NS_FORWARD_NSISCRIPTSECURITYMANAGER(_to) \ |
205 | | NS_IMETHOD CanCreateWrapper(JSContext * aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo) override { return _to CanCreateWrapper(aJSContext, aIID, aObj, aClassInfo); } \ |
206 | | NS_IMETHOD CanCreateInstance(JSContext * aJSContext, const nsCID & aCID) override { return _to CanCreateInstance(aJSContext, aCID); } \ |
207 | | NS_IMETHOD CanGetService(JSContext * aJSContext, const nsCID & aCID) override { return _to CanGetService(aJSContext, aCID); } \ |
208 | | NS_IMETHOD CheckLoadURIFromScript(JSContext * cx, nsIURI *uri) override { return _to CheckLoadURIFromScript(cx, uri); } \ |
209 | | NS_IMETHOD CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags) override { return _to CheckLoadURIWithPrincipal(aPrincipal, uri, flags); } \ |
210 | | NS_IMETHOD CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString& uri, uint32_t flags) override { return _to CheckLoadURIStrWithPrincipal(aPrincipal, uri, flags); } \ |
211 | | NS_IMETHOD InFileURIWhitelist(nsIURI *aUri, bool *_retval) override { return _to InFileURIWhitelist(aUri, _retval); } \ |
212 | | NS_IMETHOD GetSystemPrincipal(nsIPrincipal **_retval) override { return _to GetSystemPrincipal(_retval); } \ |
213 | | NS_IMETHOD GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal **_retval) override { return _to GetLoadContextCodebasePrincipal(uri, loadContext, _retval); } \ |
214 | | NS_IMETHOD GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal **_retval) override { return _to GetDocShellCodebasePrincipal(uri, docShell, _retval); } \ |
215 | | NS_IMETHOD CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval) override { return _to CreateCodebasePrincipal(uri, originAttributes, cx, _retval); } \ |
216 | | NS_IMETHOD CreateCodebasePrincipalFromOrigin(const nsACString& origin, nsIPrincipal **_retval) override { return _to CreateCodebasePrincipalFromOrigin(origin, _retval); } \ |
217 | | NS_IMETHOD CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval) override { return _to CreateNullPrincipal(originAttributes, cx, _retval); } \ |
218 | | NS_IMETHOD CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError, bool fromPrivateWindow) override { return _to CheckSameOriginURI(aSourceURI, aTargetURI, reportError, fromPrivateWindow); } \ |
219 | | NS_IMETHOD GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval) override { return _to GetChannelResultPrincipal(aChannel, _retval); } \ |
220 | | virtual nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal **_retval) override { return _to GetChannelResultPrincipalIfNotSandboxed(aChannel, _retval); } \ |
221 | | NS_IMETHOD GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval) override { return _to GetChannelURIPrincipal(aChannel, _retval); } \ |
222 | | NS_IMETHOD IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval) override { return _to IsSystemPrincipal(aPrincipal, _retval); } \ |
223 | | NS_IMETHOD ActivateDomainPolicy(nsIDomainPolicy **_retval) override { return _to ActivateDomainPolicy(_retval); } \ |
224 | | NS_IMETHOD GetDomainPolicyActive(bool *aDomainPolicyActive) override { return _to GetDomainPolicyActive(aDomainPolicyActive); } \ |
225 | | NS_IMETHOD ActivateDomainPolicyInternal(nsIDomainPolicy **_retval) override { return _to ActivateDomainPolicyInternal(_retval); } \ |
226 | | NS_IMETHOD_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone * aClone) override { return _to CloneDomainPolicy(aClone); } \ |
227 | | NS_IMETHOD PolicyAllowsScript(nsIURI *aDomain, bool *_retval) override { return _to PolicyAllowsScript(aDomain, _retval); } |
228 | | |
229 | | /* Use this macro to declare functions that forward the behavior of this interface to another object in a safe way. */ |
230 | | #define NS_FORWARD_SAFE_NSISCRIPTSECURITYMANAGER(_to) \ |
231 | | NS_IMETHOD CanCreateWrapper(JSContext * aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CanCreateWrapper(aJSContext, aIID, aObj, aClassInfo); } \ |
232 | | NS_IMETHOD CanCreateInstance(JSContext * aJSContext, const nsCID & aCID) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CanCreateInstance(aJSContext, aCID); } \ |
233 | | NS_IMETHOD CanGetService(JSContext * aJSContext, const nsCID & aCID) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CanGetService(aJSContext, aCID); } \ |
234 | | NS_IMETHOD CheckLoadURIFromScript(JSContext * cx, nsIURI *uri) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CheckLoadURIFromScript(cx, uri); } \ |
235 | | NS_IMETHOD CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CheckLoadURIWithPrincipal(aPrincipal, uri, flags); } \ |
236 | | NS_IMETHOD CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString& uri, uint32_t flags) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CheckLoadURIStrWithPrincipal(aPrincipal, uri, flags); } \ |
237 | | NS_IMETHOD InFileURIWhitelist(nsIURI *aUri, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->InFileURIWhitelist(aUri, _retval); } \ |
238 | | NS_IMETHOD GetSystemPrincipal(nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetSystemPrincipal(_retval); } \ |
239 | | NS_IMETHOD GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetLoadContextCodebasePrincipal(uri, loadContext, _retval); } \ |
240 | | NS_IMETHOD GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetDocShellCodebasePrincipal(uri, docShell, _retval); } \ |
241 | | NS_IMETHOD CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CreateCodebasePrincipal(uri, originAttributes, cx, _retval); } \ |
242 | | NS_IMETHOD CreateCodebasePrincipalFromOrigin(const nsACString& origin, nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CreateCodebasePrincipalFromOrigin(origin, _retval); } \ |
243 | | NS_IMETHOD CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CreateNullPrincipal(originAttributes, cx, _retval); } \ |
244 | | NS_IMETHOD CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError, bool fromPrivateWindow) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CheckSameOriginURI(aSourceURI, aTargetURI, reportError, fromPrivateWindow); } \ |
245 | | NS_IMETHOD GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetChannelResultPrincipal(aChannel, _retval); } \ |
246 | | virtual nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetChannelResultPrincipalIfNotSandboxed(aChannel, _retval); } \ |
247 | | NS_IMETHOD GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetChannelURIPrincipal(aChannel, _retval); } \ |
248 | | NS_IMETHOD IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->IsSystemPrincipal(aPrincipal, _retval); } \ |
249 | | NS_IMETHOD ActivateDomainPolicy(nsIDomainPolicy **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->ActivateDomainPolicy(_retval); } \ |
250 | | NS_IMETHOD GetDomainPolicyActive(bool *aDomainPolicyActive) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetDomainPolicyActive(aDomainPolicyActive); } \ |
251 | | NS_IMETHOD ActivateDomainPolicyInternal(nsIDomainPolicy **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->ActivateDomainPolicyInternal(_retval); } \ |
252 | | NS_IMETHOD_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone * aClone) override; \ |
253 | | NS_IMETHOD PolicyAllowsScript(nsIURI *aDomain, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->PolicyAllowsScript(aDomain, _retval); } |
254 | | |
255 | 0 | #define NS_SCRIPTSECURITYMANAGER_CONTRACTID "@mozilla.org/scriptsecuritymanager;1" |
256 | | |
257 | | #endif /* __gen_nsIScriptSecurityManager_h__ */ |