2020-01-22 13:45:15 +03:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#include "ImageBlocker.h"
|
|
|
|
#include "nsIPermissionManager.h"
|
|
|
|
#include "nsContentUtils.h"
|
|
|
|
#include "mozilla/StaticPrefs_permissions.h"
|
|
|
|
#include "nsNetUtil.h"
|
|
|
|
|
|
|
|
using namespace mozilla;
|
|
|
|
using namespace mozilla::image;
|
|
|
|
|
|
|
|
NS_IMPL_ISUPPORTS(ImageBlocker, nsIContentPolicy)
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
ImageBlocker::ShouldLoad(nsIURI* aContentLocation, nsILoadInfo* aLoadInfo,
|
|
|
|
const nsACString& aMimeGuess, int16_t* aShouldLoad) {
|
2021-01-15 15:07:16 +03:00
|
|
|
ExtContentPolicyType contentType = aLoadInfo->GetExternalContentPolicyType();
|
2020-01-22 13:45:15 +03:00
|
|
|
|
|
|
|
*aShouldLoad = nsIContentPolicy::ACCEPT;
|
|
|
|
|
2021-12-09 15:09:40 +03:00
|
|
|
if (!aContentLocation) {
|
|
|
|
// Bug 1720280: Ideally we should block the load, but to avoid a potential
|
|
|
|
// null pointer deref, we return early in this case. Please note that
|
|
|
|
// the ImageBlocker only applies about http/https loads anyway.
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
// we only want to check http, https
|
2020-01-22 13:45:15 +03:00
|
|
|
// for chrome:// and resources and others, no need to check.
|
|
|
|
nsAutoCString scheme;
|
|
|
|
aContentLocation->GetScheme(scheme);
|
2021-12-09 15:09:40 +03:00
|
|
|
if (!scheme.LowerCaseEqualsLiteral("http") &&
|
2020-01-22 13:45:15 +03:00
|
|
|
!scheme.LowerCaseEqualsLiteral("https")) {
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Block loading images depending on the permissions.default.image pref.
|
2021-01-15 15:07:16 +03:00
|
|
|
if ((contentType == ExtContentPolicy::TYPE_IMAGE ||
|
|
|
|
contentType == ExtContentPolicy::TYPE_IMAGESET) &&
|
2020-01-22 13:45:15 +03:00
|
|
|
StaticPrefs::permissions_default_image() ==
|
|
|
|
nsIPermissionManager::DENY_ACTION) {
|
|
|
|
NS_SetRequestBlockingReason(
|
|
|
|
aLoadInfo, nsILoadInfo::BLOCKING_REASON_CONTENT_POLICY_CONTENT_BLOCKED);
|
|
|
|
*aShouldLoad = nsIContentPolicy::REJECT_TYPE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
ImageBlocker::ShouldProcess(nsIURI* aContentLocation, nsILoadInfo* aLoadInfo,
|
|
|
|
const nsACString& aMimeGuess,
|
|
|
|
int16_t* aShouldProcess) {
|
|
|
|
// We block images at load level already, so those should not end up here.
|
|
|
|
*aShouldProcess = nsIContentPolicy::ACCEPT;
|
|
|
|
return NS_OK;
|
|
|
|
}
|