forked from mirrors/gecko-dev
Backed out changeset 4a3b391e08c4 (bug 1626404) Backed out changeset 1a5a559ec6d5 (bug 1626404) Backed out changeset 2ffdab0072e7 (bug 1626404) Backed out changeset 6fb384961b99 (bug 1626404) Backed out changeset c0c2e85e33da (bug 1626404) Backed out changeset bf32b30efa49 (bug 1626404) --HG-- extra : rebase_source : 466bf9356539fbc47cb015df212e38698322bfb3
380 lines
12 KiB
C++
380 lines
12 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#ifndef nsDocShellLoadState_h__
|
|
#define nsDocShellLoadState_h__
|
|
|
|
#include "mozilla/dom/BrowsingContext.h"
|
|
|
|
// Helper Classes
|
|
#include "nsCOMPtr.h"
|
|
#include "nsString.h"
|
|
#include "nsDocShellLoadTypes.h"
|
|
|
|
class nsIContentSecurityPolicy;
|
|
class nsIInputStream;
|
|
class nsISHEntry;
|
|
class nsIURI;
|
|
class nsIDocShell;
|
|
class nsIChannel;
|
|
class nsIReferrerInfo;
|
|
class OriginAttibutes;
|
|
namespace mozilla {
|
|
namespace dom {
|
|
class DocShellLoadStateInit;
|
|
} // namespace dom
|
|
} // namespace mozilla
|
|
|
|
/**
|
|
* nsDocShellLoadState contains setup information used in a nsIDocShell::loadURI
|
|
* call.
|
|
*/
|
|
class nsDocShellLoadState final {
|
|
public:
|
|
NS_INLINE_DECL_REFCOUNTING(nsDocShellLoadState);
|
|
|
|
explicit nsDocShellLoadState(nsIURI* aURI);
|
|
explicit nsDocShellLoadState(
|
|
const mozilla::dom::DocShellLoadStateInit& aLoadState);
|
|
|
|
static nsresult CreateFromPendingChannel(nsIChannel* aPendingChannel,
|
|
nsDocShellLoadState** aResult);
|
|
|
|
static nsresult CreateFromLoadURIOptions(
|
|
nsISupports* aConsumer, const nsAString& aURI,
|
|
const mozilla::dom::LoadURIOptions& aLoadURIOptions,
|
|
nsDocShellLoadState** aResult);
|
|
|
|
// Getters and Setters
|
|
|
|
nsIReferrerInfo* GetReferrerInfo() const;
|
|
|
|
void SetReferrerInfo(nsIReferrerInfo* aReferrerInfo);
|
|
|
|
nsIURI* URI() const;
|
|
|
|
void SetURI(nsIURI* aURI);
|
|
|
|
nsIURI* OriginalURI() const;
|
|
|
|
void SetOriginalURI(nsIURI* aOriginalURI);
|
|
|
|
nsIURI* ResultPrincipalURI() const;
|
|
|
|
void SetResultPrincipalURI(nsIURI* aResultPrincipalURI);
|
|
|
|
bool ResultPrincipalURIIsSome() const;
|
|
|
|
void SetResultPrincipalURIIsSome(bool aIsSome);
|
|
|
|
bool KeepResultPrincipalURIIfSet() const;
|
|
|
|
void SetKeepResultPrincipalURIIfSet(bool aKeep);
|
|
|
|
nsIPrincipal* PrincipalToInherit() const;
|
|
|
|
void SetPrincipalToInherit(nsIPrincipal* aPrincipalToInherit);
|
|
|
|
nsIPrincipal* StoragePrincipalToInherit() const;
|
|
|
|
void SetStoragePrincipalToInherit(nsIPrincipal* aStoragePrincipalToInherit);
|
|
|
|
bool LoadReplace() const;
|
|
|
|
void SetLoadReplace(bool aLoadReplace);
|
|
|
|
nsIPrincipal* TriggeringPrincipal() const;
|
|
|
|
void SetTriggeringPrincipal(nsIPrincipal* aTriggeringPrincipal);
|
|
|
|
nsIContentSecurityPolicy* Csp() const;
|
|
|
|
void SetCsp(nsIContentSecurityPolicy* aCsp);
|
|
|
|
bool InheritPrincipal() const;
|
|
|
|
void SetInheritPrincipal(bool aInheritPrincipal);
|
|
|
|
bool PrincipalIsExplicit() const;
|
|
|
|
void SetPrincipalIsExplicit(bool aPrincipalIsExplicit);
|
|
|
|
bool ForceAllowDataURI() const;
|
|
|
|
void SetForceAllowDataURI(bool aForceAllowDataURI);
|
|
|
|
bool OriginalFrameSrc() const;
|
|
|
|
void SetOriginalFrameSrc(bool aOriginalFrameSrc);
|
|
|
|
bool IsFormSubmission() const;
|
|
|
|
void SetIsFormSubmission(bool aIsFormSubmission);
|
|
|
|
uint32_t LoadType() const;
|
|
|
|
void SetLoadType(uint32_t aLoadType);
|
|
|
|
nsISHEntry* SHEntry() const;
|
|
|
|
void SetSHEntry(nsISHEntry* aSHEntry);
|
|
|
|
const nsString& Target() const;
|
|
|
|
void SetTarget(const nsAString& aTarget);
|
|
|
|
nsIInputStream* PostDataStream() const;
|
|
|
|
void SetPostDataStream(nsIInputStream* aStream);
|
|
|
|
nsIInputStream* HeadersStream() const;
|
|
|
|
void SetHeadersStream(nsIInputStream* aHeadersStream);
|
|
|
|
bool IsSrcdocLoad() const;
|
|
|
|
const nsString& SrcdocData() const;
|
|
|
|
void SetSrcdocData(const nsAString& aSrcdocData);
|
|
|
|
nsIDocShell* SourceDocShell() const;
|
|
|
|
void SetSourceDocShell(nsIDocShell* aSourceDocShell);
|
|
|
|
nsIURI* BaseURI() const;
|
|
|
|
void SetBaseURI(nsIURI* aBaseURI);
|
|
|
|
// Helper function allowing convenient work with mozilla::Maybe in C++, hiding
|
|
// resultPrincipalURI and resultPrincipalURIIsSome attributes from the
|
|
// consumer.
|
|
void GetMaybeResultPrincipalURI(
|
|
mozilla::Maybe<nsCOMPtr<nsIURI>>& aRPURI) const;
|
|
|
|
void SetMaybeResultPrincipalURI(
|
|
mozilla::Maybe<nsCOMPtr<nsIURI>> const& aRPURI);
|
|
|
|
uint32_t LoadFlags() const;
|
|
|
|
void SetLoadFlags(uint32_t aFlags);
|
|
|
|
void SetLoadFlag(uint32_t aFlag);
|
|
|
|
void UnsetLoadFlag(uint32_t aFlag);
|
|
|
|
bool HasLoadFlags(uint32_t aFlag);
|
|
|
|
bool FirstParty() const;
|
|
|
|
void SetFirstParty(bool aFirstParty);
|
|
|
|
const nsCString& TypeHint() const;
|
|
|
|
void SetTypeHint(const nsCString& aTypeHint);
|
|
|
|
const nsString& FileName() const;
|
|
|
|
void SetFileName(const nsAString& aFileName);
|
|
|
|
// Give the type of DocShell we're loading into (chrome/content/etc) and
|
|
// origin attributes for the URI we're loading, figure out if we should
|
|
// inherit our principal from the document the load was requested from, or
|
|
// else if the principal should be set up later in the process (after loads).
|
|
// See comments in function for more info on principal selection algorithm
|
|
nsresult SetupInheritingPrincipal(
|
|
mozilla::dom::BrowsingContext::Type aType,
|
|
const mozilla::OriginAttributes& aOriginAttributes);
|
|
|
|
// If no triggering principal exists at the moment, create one using referrer
|
|
// information and origin attributes.
|
|
nsresult SetupTriggeringPrincipal(
|
|
const mozilla::OriginAttributes& aOriginAttributes);
|
|
|
|
void SetIsFromProcessingFrameAttributes() {
|
|
mIsFromProcessingFrameAttributes = true;
|
|
}
|
|
bool GetIsFromProcessingFrameAttributes() const {
|
|
return mIsFromProcessingFrameAttributes;
|
|
}
|
|
|
|
nsIChannel* GetPendingRedirectedChannel() {
|
|
return mPendingRedirectedChannel;
|
|
}
|
|
|
|
void SetOriginalURIString(const nsCString& aOriginalURI) {
|
|
mOriginalURIString.emplace(aOriginalURI);
|
|
}
|
|
const mozilla::Maybe<nsCString>& GetOriginalURIString() const {
|
|
return mOriginalURIString;
|
|
}
|
|
|
|
void SetCancelContentJSEpoch(int32_t aCancelEpoch) {
|
|
mCancelContentJSEpoch.emplace(aCancelEpoch);
|
|
}
|
|
const mozilla::Maybe<int32_t>& GetCancelContentJSEpoch() const {
|
|
return mCancelContentJSEpoch;
|
|
}
|
|
|
|
// When loading a document through nsDocShell::LoadURI(), a special set of
|
|
// flags needs to be set based on other values in nsDocShellLoadState. This
|
|
// function calculates those flags, before the LoadState is passed to
|
|
// nsDocShell::InternalLoad.
|
|
void CalculateLoadURIFlags();
|
|
|
|
mozilla::dom::DocShellLoadStateInit Serialize();
|
|
|
|
protected:
|
|
// Destructor can't be defaulted or inlined, as header doesn't have all type
|
|
// includes it needs to do so.
|
|
~nsDocShellLoadState();
|
|
|
|
protected:
|
|
// This is the referrer for the load.
|
|
nsCOMPtr<nsIReferrerInfo> mReferrerInfo;
|
|
|
|
// The URI we are navigating to. Will not be null once set.
|
|
nsCOMPtr<nsIURI> mURI;
|
|
|
|
// The URI to set as the originalURI on the channel that does the load. If
|
|
// null, aURI will be set as the originalURI.
|
|
nsCOMPtr<nsIURI> mOriginalURI;
|
|
|
|
// The URI to be set to loadInfo.resultPrincipalURI
|
|
// - When Nothing, there will be no change
|
|
// - When Some, the principal URI will overwrite even
|
|
// with a null value.
|
|
//
|
|
// Valid only if mResultPrincipalURIIsSome is true (has the same meaning as
|
|
// isSome() on mozilla::Maybe.)
|
|
nsCOMPtr<nsIURI> mResultPrincipalURI;
|
|
bool mResultPrincipalURIIsSome;
|
|
|
|
// The principal of the load, that is, the entity responsible for causing the
|
|
// load to occur. In most cases the referrer and the triggeringPrincipal's URI
|
|
// will be identical.
|
|
//
|
|
// Please note that this is the principal that is used for security checks. If
|
|
// the argument aURI is provided by the web, then please do not pass a
|
|
// SystemPrincipal as the triggeringPrincipal.
|
|
nsCOMPtr<nsIPrincipal> mTriggeringPrincipal;
|
|
|
|
// The CSP of the load, that is, the CSP of the entity responsible for causing
|
|
// the load to occur. Most likely this is the CSP of the document that started
|
|
// the load. In case the entity starting the load did not use a CSP, then mCsp
|
|
// can be null. Please note that this is also the CSP that will be applied to
|
|
// the load in case the load encounters a server side redirect.
|
|
nsCOMPtr<nsIContentSecurityPolicy> mCsp;
|
|
|
|
// If a refresh is caused by http-equiv="refresh" we want to set
|
|
// aResultPrincipalURI, but we do not want to overwrite the channel's
|
|
// ResultPrincipalURI, if it has already been set on the channel by a protocol
|
|
// handler.
|
|
bool mKeepResultPrincipalURIIfSet;
|
|
|
|
// If set LOAD_REPLACE flag will be set on the channel. If aOriginalURI is
|
|
// null, this argument is ignored.
|
|
bool mLoadReplace;
|
|
|
|
// If this attribute is true and no triggeringPrincipal is specified,
|
|
// copy the principal from the referring document.
|
|
bool mInheritPrincipal;
|
|
|
|
// If this attribute is true only ever use the principal specified
|
|
// by the triggeringPrincipal and inheritPrincipal attributes.
|
|
// If there are security reasons for why this is unsafe, such
|
|
// as trying to use a systemprincipal as the triggeringPrincipal
|
|
// for a content docshell the load fails.
|
|
bool mPrincipalIsExplicit;
|
|
|
|
// Principal we're inheriting. If null, this means the principal should be
|
|
// inherited from the current document. If set to NullPrincipal, the channel
|
|
// will fill in principal information later in the load. See internal comments
|
|
// of SetupInheritingPrincipal for more info.
|
|
//
|
|
// When passed to InternalLoad, If this argument is null then
|
|
// principalToInherit is computed differently. See nsDocShell::InternalLoad
|
|
// for more comments.
|
|
|
|
nsCOMPtr<nsIPrincipal> mPrincipalToInherit;
|
|
|
|
nsCOMPtr<nsIPrincipal> mStoragePrincipalToInherit;
|
|
|
|
// If this attribute is true, then a top-level navigation
|
|
// to a data URI will be allowed.
|
|
bool mForceAllowDataURI;
|
|
|
|
// If this attribute is true, this load corresponds to a frame
|
|
// element loading its original src (or srcdoc) attribute.
|
|
bool mOriginalFrameSrc;
|
|
|
|
// If this attribute is true, then the load was initiated by a
|
|
// form submission. This is important to know for the CSP directive
|
|
// navigate-to.
|
|
bool mIsFormSubmission;
|
|
|
|
// Contains a load type as specified by the nsDocShellLoadTypes::load*
|
|
// constants
|
|
uint32_t mLoadType;
|
|
|
|
// Active Session History entry (if loading from SH)
|
|
nsCOMPtr<nsISHEntry> mSHEntry;
|
|
|
|
// Target for load, like _content, _blank etc.
|
|
nsString mTarget;
|
|
|
|
// Post data stream (if POSTing)
|
|
nsCOMPtr<nsIInputStream> mPostDataStream;
|
|
|
|
// Additional Headers
|
|
nsCOMPtr<nsIInputStream> mHeadersStream;
|
|
|
|
// When set, the load will be interpreted as a srcdoc load, where contents of
|
|
// this string will be loaded instead of the URI. Setting srcdocData sets
|
|
// isSrcdocLoad to true
|
|
nsString mSrcdocData;
|
|
|
|
// When set, this is the Source Browsing Context for the navigation.
|
|
nsCOMPtr<nsIDocShell> mSourceDocShell;
|
|
|
|
// Used for srcdoc loads to give view-source knowledge of the load's base URI
|
|
// as this information isn't embedded in the load's URI.
|
|
nsCOMPtr<nsIURI> mBaseURI;
|
|
|
|
// Set of Load Flags, taken from nsDocShellLoadTypes.h and nsIWebNavigation
|
|
uint32_t mLoadFlags;
|
|
|
|
// Is this a First Party Load?
|
|
bool mFirstParty;
|
|
|
|
// A hint as to the content-type of the resulting data. If no hint, IsVoid()
|
|
// should return true.
|
|
nsCString mTypeHint;
|
|
|
|
// Non-void when the link should be downloaded as the given filename.
|
|
// mFileName being non-void but empty means that no filename hint was
|
|
// specified, but link should still trigger a download. If not a download,
|
|
// mFileName.IsVoid() should return true.
|
|
nsString mFileName;
|
|
|
|
// This will be true if this load is triggered by attribute changes.
|
|
// See nsILoadInfo.isFromProcessingFrameAttributes
|
|
bool mIsFromProcessingFrameAttributes;
|
|
|
|
// If set, a pending cross-process redirected channel should be used to
|
|
// perform the load. The channel will be stored in this value.
|
|
nsCOMPtr<nsIChannel> mPendingRedirectedChannel;
|
|
|
|
// An optional string representation of mURI, before any
|
|
// fixups were applied, so that we can send it to a search
|
|
// engine service if needed.
|
|
mozilla::Maybe<nsCString> mOriginalURIString;
|
|
|
|
// An optional value to pass to nsIDocShell::setCancelJSEpoch
|
|
// when initiating the load.
|
|
mozilla::Maybe<int32_t> mCancelContentJSEpoch;
|
|
};
|
|
|
|
#endif /* nsDocShellLoadState_h__ */
|