forked from mirrors/gecko-dev
Bug 1419382 - Moving ownership of nsIInputStream when using netUtil functions - part 2 - NS_NewInputStreamChannel, r=smaug
This commit is contained in:
parent
8a7dedba69
commit
ad64933e5a
8 changed files with 25 additions and 22 deletions
|
|
@ -1695,9 +1695,10 @@ nsDocShell::LoadStream(nsIInputStream* aStream, nsIURI* aURI,
|
|||
|
||||
// build up a channel for this stream.
|
||||
nsCOMPtr<nsIChannel> channel;
|
||||
nsCOMPtr<nsIInputStream> stream = aStream;
|
||||
nsresult rv = NS_NewInputStreamChannel(getter_AddRefs(channel),
|
||||
uri,
|
||||
aStream,
|
||||
stream.forget(),
|
||||
triggeringPrincipal,
|
||||
nsILoadInfo::SEC_ALLOW_CROSS_ORIGIN_DATA_IS_NULL,
|
||||
nsIContentPolicy::TYPE_OTHER,
|
||||
|
|
|
|||
|
|
@ -118,7 +118,7 @@ moz_icon_to_channel(nsIURI* aURI, const nsACString& aFileExt,
|
|||
nsCOMPtr<nsIPrincipal> nullPrincipal = NullPrincipal::Create();
|
||||
return NS_NewInputStreamChannel(aChannel,
|
||||
aURI,
|
||||
stream,
|
||||
stream.forget(),
|
||||
nullPrincipal,
|
||||
nsILoadInfo::SEC_REQUIRE_SAME_ORIGIN_DATA_IS_BLOCKED,
|
||||
nsIContentPolicy::TYPE_INTERNAL_IMAGE,
|
||||
|
|
|
|||
|
|
@ -109,7 +109,7 @@ moz_gdk_pixbuf_to_channel(GdkPixbuf* aPixbuf, nsIURI* aURI,
|
|||
nsCOMPtr<nsIPrincipal> nullPrincipal = NullPrincipal::Create();
|
||||
return NS_NewInputStreamChannel(aChannel,
|
||||
aURI,
|
||||
stream,
|
||||
stream.forget(),
|
||||
nullPrincipal,
|
||||
nsILoadInfo::SEC_REQUIRE_SAME_ORIGIN_DATA_IS_BLOCKED,
|
||||
nsIContentPolicy::TYPE_INTERNAL_IMAGE,
|
||||
|
|
|
|||
|
|
@ -1367,7 +1367,7 @@ Loader::LoadSheet(SheetLoadData* aLoadData,
|
|||
|
||||
rv = NS_NewInputStreamChannel(getter_AddRefs(channel),
|
||||
aLoadData->mURI,
|
||||
stream,
|
||||
stream.forget(),
|
||||
nsContentUtils::GetSystemPrincipal(),
|
||||
securityFlags,
|
||||
contentPolicyType);
|
||||
|
|
|
|||
|
|
@ -614,15 +614,15 @@ NS_NewInputStreamChannelInternal(nsIChannel** outChannel,
|
|||
loadInfo);
|
||||
}
|
||||
|
||||
nsresult /* NS_NewInputStreamChannelPrincipal */
|
||||
NS_NewInputStreamChannel(nsIChannel **outChannel,
|
||||
nsIURI *aUri,
|
||||
nsIInputStream *aStream,
|
||||
nsIPrincipal *aLoadingPrincipal,
|
||||
nsSecurityFlags aSecurityFlags,
|
||||
nsresult
|
||||
NS_NewInputStreamChannel(nsIChannel** outChannel,
|
||||
nsIURI* aUri,
|
||||
already_AddRefed<nsIInputStream> aStream,
|
||||
nsIPrincipal* aLoadingPrincipal,
|
||||
nsSecurityFlags aSecurityFlags,
|
||||
nsContentPolicyType aContentPolicyType,
|
||||
const nsACString &aContentType /* = EmptyCString() */,
|
||||
const nsACString &aContentCharset /* = EmptyCString() */)
|
||||
const nsACString& aContentType /* = EmptyCString() */,
|
||||
const nsACString& aContentCharset /* = EmptyCString() */)
|
||||
{
|
||||
nsCOMPtr<nsIInputStream> stream = aStream;
|
||||
return NS_NewInputStreamChannelInternal(outChannel,
|
||||
|
|
|
|||
|
|
@ -263,15 +263,15 @@ NS_NewInputStreamChannelInternal(nsIChannel** outChannel,
|
|||
nsContentPolicyType aContentPolicyType);
|
||||
|
||||
|
||||
nsresult /* NS_NewInputStreamChannelPrincipal */
|
||||
NS_NewInputStreamChannel(nsIChannel **outChannel,
|
||||
nsIURI *aUri,
|
||||
nsIInputStream *aStream,
|
||||
nsIPrincipal *aLoadingPrincipal,
|
||||
nsSecurityFlags aSecurityFlags,
|
||||
nsresult
|
||||
NS_NewInputStreamChannel(nsIChannel* *outChannel,
|
||||
nsIURI* aUri,
|
||||
already_AddRefed<nsIInputStream> aStream,
|
||||
nsIPrincipal* aLoadingPrincipal,
|
||||
nsSecurityFlags aSecurityFlags,
|
||||
nsContentPolicyType aContentPolicyType,
|
||||
const nsACString &aContentType = EmptyCString(),
|
||||
const nsACString &aContentCharset = EmptyCString());
|
||||
const nsACString& aContentType = EmptyCString(),
|
||||
const nsACString& aContentCharset = EmptyCString());
|
||||
|
||||
nsresult NS_NewInputStreamChannelInternal(nsIChannel **outChannel,
|
||||
nsIURI *aUri,
|
||||
|
|
|
|||
|
|
@ -289,9 +289,10 @@ nsSAXXMLReader::ParseFromStream(nsIInputStream *aStreamPtr,
|
|||
// The following channel is never openend, so it does not matter what
|
||||
// securityFlags we pass; let's follow the principle of least privilege.
|
||||
nsCOMPtr<nsIChannel> parserChannel;
|
||||
nsCOMPtr<nsIInputStream> tmpStream = stream;
|
||||
rv = NS_NewInputStreamChannel(getter_AddRefs(parserChannel),
|
||||
mBaseURI,
|
||||
stream,
|
||||
tmpStream.forget(),
|
||||
nullPrincipal,
|
||||
nsILoadInfo::SEC_REQUIRE_SAME_ORIGIN_DATA_IS_BLOCKED,
|
||||
nsIContentPolicy::TYPE_OTHER,
|
||||
|
|
|
|||
|
|
@ -119,9 +119,10 @@ nsRDFXMLParser::ParseString(nsIRDFDataSource* aSink, nsIURI* aBaseURI, const nsA
|
|||
// The following channel is never openend, so it does not matter what
|
||||
// securityFlags we pass; let's follow the principle of least privilege.
|
||||
nsCOMPtr<nsIChannel> channel;
|
||||
nsCOMPtr<nsIInputStream> tmpStream = stream;
|
||||
rv = NS_NewInputStreamChannel(getter_AddRefs(channel),
|
||||
aBaseURI,
|
||||
stream,
|
||||
tmpStream.forget(),
|
||||
nullPrincipal,
|
||||
nsILoadInfo::SEC_REQUIRE_SAME_ORIGIN_DATA_IS_BLOCKED,
|
||||
nsIContentPolicy::TYPE_OTHER,
|
||||
|
|
|
|||
Loading…
Reference in a new issue