2020-03-18 18:12:36 +03:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
|
|
|
|
#include "TRRLoadInfo.h"
|
|
|
|
#include "mozilla/dom/ClientSource.h"
|
2024-06-20 16:22:41 +03:00
|
|
|
#include "mozilla/dom/FeaturePolicy.h"
|
|
|
|
#include "mozilla/dom/DOMTypes.h"
|
2020-07-15 15:45:10 +03:00
|
|
|
#include "nsContentUtils.h"
|
2020-03-18 18:12:36 +03:00
|
|
|
#include "nsIRedirectHistoryEntry.h"
|
|
|
|
|
|
|
|
using namespace mozilla::dom;
|
|
|
|
|
|
|
|
namespace mozilla {
|
|
|
|
namespace net {
|
|
|
|
|
|
|
|
NS_IMPL_ISUPPORTS(TRRLoadInfo, nsILoadInfo)
|
|
|
|
|
|
|
|
TRRLoadInfo::TRRLoadInfo(nsIURI* aResultPrincipalURI,
|
|
|
|
nsContentPolicyType aContentPolicyType)
|
|
|
|
: mResultPrincipalURI(aResultPrincipalURI),
|
|
|
|
mInternalContentPolicyType(aContentPolicyType) {}
|
|
|
|
|
|
|
|
already_AddRefed<nsILoadInfo> TRRLoadInfo::Clone() const {
|
|
|
|
nsCOMPtr<nsILoadInfo> loadInfo =
|
|
|
|
new TRRLoadInfo(mResultPrincipalURI, mInternalContentPolicyType);
|
|
|
|
|
|
|
|
return loadInfo.forget();
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetLoadingPrincipal(nsIPrincipal** aLoadingPrincipal) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-04-06 21:57:36 +03:00
|
|
|
nsIPrincipal* TRRLoadInfo::VirtualGetLoadingPrincipal() { return nullptr; }
|
2020-03-18 18:12:36 +03:00
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetTriggeringPrincipal(nsIPrincipal** aTriggeringPrincipal) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsIPrincipal* TRRLoadInfo::TriggeringPrincipal() { return nullptr; }
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetPrincipalToInherit(nsIPrincipal** aPrincipalToInherit) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetPrincipalToInherit(nsIPrincipal* aPrincipalToInherit) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsIPrincipal* TRRLoadInfo::PrincipalToInherit() { return nullptr; }
|
|
|
|
|
|
|
|
nsIPrincipal* TRRLoadInfo::FindPrincipalToInherit(nsIChannel* aChannel) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2021-07-16 00:09:15 +03:00
|
|
|
const nsID& TRRLoadInfo::GetSandboxedNullPrincipalID() {
|
|
|
|
return mSandboxedNullPrincipalID;
|
|
|
|
}
|
|
|
|
|
|
|
|
void TRRLoadInfo::ResetSandboxedNullPrincipalID() {}
|
2020-03-18 18:12:36 +03:00
|
|
|
|
|
|
|
nsIPrincipal* TRRLoadInfo::GetTopLevelPrincipal() { return nullptr; }
|
|
|
|
|
Bug 1538028 - Part 2: Track TriggeringRemoteType through nsDocShellLoadState and LoadInfo, r=smaug,ckerschb,necko-reviewers,valentin
This is done using slightly different mechanisms for each of LoadInfo and
nsDocShellLoadState, and will be used in the next part to validate document
loads based on the RemoteType responsible for the load.
For subresource loads, the TriggeringRemoteType is fairly straightforward - it
is the process which created the channel. We can handle this by getting the
current remote type when creating the channel, and then using the remote type
of the sending process when receiving the LoadInfo over IPC to either replace
the triggering remote type, or validate it.
For document loads, the situation is a bit more complex, as there are at least
3 (potentially-)different processes responsible for different parts of the
navigation:
1. The "Triggering Process" is the process which provided the URI to load.
This is also the process which provides the Triggering Principal. This is
the process being tracked in this patch.
2. The "Loading Process" is the process which actually creates the channel and
starts the load. This may be the same as the triggering process, or may be
a different process starting the navigation on behalf of the triggering
process. In general this is the process hosting the current docshell,
though it may be the parent process in the case of parent-initiated loads.
3. The "Final Process" is the process which receives the response and renders
the final document. This isn't known at channel creation time, and is
determined by the result principal and process isolation policy.
This change uses a serializer and special field on nsDocShellLoadState to track
the "Triggering Process" for the load, even as the load state is serialized
between processes by tracking which loads were sent into which content
processes, and matching them up when the parent process sees them again. The
information is then copied into the LoadInfo before configuring the real
channel, so it can be used for security checks.
The "Triggering Process" is overridden to be the parent process for history
loads, as history loads are often started in processes which wouldn't normally
be able to navigate to those pages. This is OK thanks to the changes in part 1
which validate history loads against the real session history when SHIP is
enabled.
Differential Revision: https://phabricator.services.mozilla.com/D161198
2022-11-29 23:41:45 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetTriggeringRemoteType(nsACString& aTriggeringRemoteType) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetTriggeringRemoteType(const nsACString& aTriggeringRemoteType) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-03-18 18:12:36 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetLoadingDocument(Document** aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsINode* TRRLoadInfo::LoadingNode() { return nullptr; }
|
|
|
|
|
|
|
|
already_AddRefed<nsISupports> TRRLoadInfo::ContextForTopLevelLoad() {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
already_AddRefed<nsISupports> TRRLoadInfo::GetLoadingContext() {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetLoadingContextXPCOM(nsISupports** aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetSecurityFlags(nsSecurityFlags* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetSandboxFlags(uint32_t* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
2020-07-29 14:43:23 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetTriggeringSandboxFlags(uint32_t* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetTriggeringSandboxFlags(uint32_t aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
2020-03-18 18:12:36 +03:00
|
|
|
|
Bug 1835907, part 1 - Add has storage access bit and triggering window id to the LoadInfo - r=smaug,necko-reviewers,kershaw,pbz
In the Storage Access API's latest draft, a few items were added to the user-agent state. Relevant here,
the source snapshot params gained two fields that are initialized from the sourceDocument during
snapshotting source params while navigating: "has storage access" and "environment id".
https://privacycg.github.io/storage-access/#ua-state
These are used to identify self-initiated navigations that come from documents that have obtained storage access.
Combined with a same-origin check, this determines if the destination document of the navigation should start
with storage access.
This is stricter than the current behavior, where if the permission is available, all documents start with storage access.
Instead, now a document will only have storage access if it requests it explicitly or if a same-origin document that has
storage access navigates itself to that document. This is seen as a security win.
Security discussion of this change was here: https://github.com/privacycg/storage-access/issues/113
Artur at Google wrote up a great summary here: https://docs.google.com/document/d/1AsrETl-7XvnZNbG81Zy9BcZfKbqACQYBSrjM3VsIpjY/edit#
Differential Revision: https://phabricator.services.mozilla.com/D184821
2023-08-15 16:04:04 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetTriggeringWindowId(uint64_t* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetTriggeringWindowId(uint64_t aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetTriggeringStorageAccess(bool* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetTriggeringStorageAccess(bool aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-03-18 18:12:36 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetSecurityMode(uint32_t* aFlags) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetIsInThirdPartyContext(bool* aIsInThirdPartyContext) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-06-17 23:18:23 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetIsInThirdPartyContext(bool aIsInThirdPartyContext) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-05-13 16:38:41 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetIsThirdPartyContextToTopWindow(
|
|
|
|
bool* aIsThirdPartyContextToTopWindow) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetIsThirdPartyContextToTopWindow(
|
|
|
|
bool aIsThirdPartyContextToTopWindow) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-03-18 18:12:36 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetCookiePolicy(uint32_t* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetCookieJarSettings(nsICookieJarSettings** aCookieJarSettings) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetCookieJarSettings(nsICookieJarSettings* aCookieJarSettings) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-03-30 17:10:07 +03:00
|
|
|
NS_IMETHODIMP
|
2021-09-28 01:50:41 +03:00
|
|
|
TRRLoadInfo::GetStoragePermission(
|
|
|
|
nsILoadInfo::StoragePermissionState* aHasStoragePermission) {
|
2020-03-30 17:10:07 +03:00
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
2021-09-28 01:50:41 +03:00
|
|
|
TRRLoadInfo::SetStoragePermission(
|
|
|
|
nsILoadInfo::StoragePermissionState aHasStoragePermission) {
|
2020-03-30 17:10:07 +03:00
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2023-10-18 01:02:27 +03:00
|
|
|
const Maybe<RFPTarget>& TRRLoadInfo::GetOverriddenFingerprintingSettings() {
|
|
|
|
return mOverriddenFingerprintingSettings;
|
|
|
|
}
|
|
|
|
|
|
|
|
void TRRLoadInfo::SetOverriddenFingerprintingSettings(RFPTarget aTargets) {}
|
|
|
|
|
2021-03-17 14:42:55 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetIsMetaRefresh(bool* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetIsMetaRefresh(bool aResult) { return NS_ERROR_NOT_IMPLEMENTED; }
|
|
|
|
|
2020-03-18 18:12:36 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetForceInheritPrincipal(bool* aInheritPrincipal) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetForceInheritPrincipalOverruleOwner(bool* aInheritPrincipal) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetLoadingSandboxed(bool* aLoadingSandboxed) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetAboutBlankInherits(bool* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetAllowChrome(bool* aResult) { return NS_ERROR_NOT_IMPLEMENTED; }
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetDisallowScript(bool* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetDontFollowRedirects(bool* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetLoadErrorPage(bool* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetIsFormSubmission(bool* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetIsFormSubmission(bool aValue) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetSendCSPViolationEvents(bool* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetSendCSPViolationEvents(bool aValue) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetExternalContentPolicyType(nsContentPolicyType* aResult) {
|
2021-01-15 15:07:16 +03:00
|
|
|
// We have to use nsContentPolicyType because ExtContentPolicyType is not
|
|
|
|
// visible from xpidl.
|
|
|
|
*aResult = static_cast<nsContentPolicyType>(
|
|
|
|
nsContentUtils::InternalContentPolicyTypeToExternal(
|
|
|
|
mInternalContentPolicyType));
|
2020-03-18 18:12:36 +03:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsContentPolicyType TRRLoadInfo::InternalContentPolicyType() {
|
|
|
|
return mInternalContentPolicyType;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetBlockAllMixedContent(bool* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetUpgradeInsecureRequests(bool* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetBrowserUpgradeInsecureRequests(bool* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-11-09 17:40:30 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetBrowserDidUpgradeInsecureRequests(bool* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetBrowserDidUpgradeInsecureRequests(
|
|
|
|
bool aBrowserDidUpgradeInsecureRequests) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-03-18 18:12:36 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetBrowserWouldUpgradeInsecureRequests(bool* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetForceAllowDataURI(bool aForceAllowDataURI) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetForceAllowDataURI(bool* aForceAllowDataURI) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetAllowInsecureRedirectToDataURI(
|
|
|
|
bool aAllowInsecureRedirectToDataURI) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetAllowInsecureRedirectToDataURI(
|
|
|
|
bool* aAllowInsecureRedirectToDataURI) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetSkipContentPolicyCheckForWebRequest(bool aSkip) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetSkipContentPolicyCheckForWebRequest(bool* aSkip) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetOriginalFrameSrcLoad(bool aOriginalFrameSrcLoad) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetOriginalFrameSrcLoad(bool* aOriginalFrameSrcLoad) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetForceInheritPrincipalDropped(bool* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetInnerWindowID(uint64_t* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetBrowsingContextID(uint64_t* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2023-05-05 18:24:09 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetWorkerAssociatedBrowsingContextID(uint64_t* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetWorkerAssociatedBrowsingContextID(uint64_t aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-03-18 18:12:36 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetFrameBrowsingContextID(uint64_t* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetTargetBrowsingContextID(uint64_t* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetBrowsingContext(dom::BrowsingContext** aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2023-05-05 18:24:09 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetWorkerAssociatedBrowsingContext(
|
|
|
|
dom::BrowsingContext** aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-03-18 18:12:36 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetFrameBrowsingContext(dom::BrowsingContext** aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetTargetBrowsingContext(dom::BrowsingContext** aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetScriptableOriginAttributes(
|
|
|
|
JSContext* aCx, JS::MutableHandle<JS::Value> aOriginAttributes) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::ResetPrincipalToInheritToNullPrincipal() {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetScriptableOriginAttributes(
|
|
|
|
JSContext* aCx, JS::Handle<JS::Value> aOriginAttributes) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult TRRLoadInfo::GetOriginAttributes(
|
|
|
|
mozilla::OriginAttributes* aOriginAttributes) {
|
|
|
|
NS_ENSURE_ARG(aOriginAttributes);
|
|
|
|
*aOriginAttributes = mOriginAttributes;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsresult TRRLoadInfo::SetOriginAttributes(
|
|
|
|
const mozilla::OriginAttributes& aOriginAttributes) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetInitialSecurityCheckDone(bool aInitialSecurityCheckDone) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetInitialSecurityCheckDone(bool* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
2021-10-04 16:24:15 +03:00
|
|
|
TRRLoadInfo::AppendRedirectHistoryEntry(nsIChannel* aChannelToDeriveFrom,
|
2020-03-18 18:12:36 +03:00
|
|
|
bool aIsInternalRedirect) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetRedirectChainIncludingInternalRedirects(
|
|
|
|
JSContext* aCx, JS::MutableHandle<JS::Value> aChain) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
const nsTArray<nsCOMPtr<nsIRedirectHistoryEntry>>&
|
|
|
|
TRRLoadInfo::RedirectChainIncludingInternalRedirects() {
|
|
|
|
return mEmptyRedirectChain;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetRedirectChain(JSContext* aCx,
|
|
|
|
JS::MutableHandle<JS::Value> aChain) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
const nsTArray<nsCOMPtr<nsIRedirectHistoryEntry>>&
|
|
|
|
TRRLoadInfo::RedirectChain() {
|
|
|
|
return mEmptyRedirectChain;
|
|
|
|
}
|
|
|
|
|
|
|
|
const nsTArray<nsCOMPtr<nsIPrincipal>>& TRRLoadInfo::AncestorPrincipals() {
|
|
|
|
return mEmptyPrincipals;
|
|
|
|
}
|
|
|
|
|
2020-07-08 00:14:42 +03:00
|
|
|
const nsTArray<uint64_t>& TRRLoadInfo::AncestorBrowsingContextIDs() {
|
|
|
|
return mEmptyBrowsingContextIDs;
|
|
|
|
}
|
|
|
|
|
2020-03-18 18:12:36 +03:00
|
|
|
void TRRLoadInfo::SetCorsPreflightInfo(const nsTArray<nsCString>& aHeaders,
|
|
|
|
bool aForcePreflight) {}
|
|
|
|
|
|
|
|
const nsTArray<nsCString>& TRRLoadInfo::CorsUnsafeHeaders() {
|
|
|
|
return mCorsUnsafeHeaders;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetForcePreflight(bool* aForcePreflight) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetIsPreflight(bool* aIsPreflight) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetLoadTriggeredFromExternal(bool aLoadTriggeredFromExternal) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetLoadTriggeredFromExternal(bool* aLoadTriggeredFromExternal) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetServiceWorkerTaintingSynthesized(
|
|
|
|
bool* aServiceWorkerTaintingSynthesized) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetTainting(uint32_t* aTaintingOut) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::MaybeIncreaseTainting(uint32_t aTainting) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
void TRRLoadInfo::SynthesizeServiceWorkerTainting(LoadTainting aTainting) {}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetDocumentHasUserInteracted(bool* aDocumentHasUserInteracted) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetDocumentHasUserInteracted(bool aDocumentHasUserInteracted) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetAllowListFutureDocumentsCreatedFromThisRedirectChain(
|
|
|
|
bool* aValue) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetAllowListFutureDocumentsCreatedFromThisRedirectChain(
|
|
|
|
bool aValue) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2021-03-12 11:45:29 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetNeedForCheckingAntiTrackingHeuristic(bool* aValue) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetNeedForCheckingAntiTrackingHeuristic(bool aValue) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-03-18 18:12:36 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetCspNonce(nsAString& aCspNonce) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetCspNonce(const nsAString& aCspNonce) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2023-06-09 21:39:59 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetIntegrityMetadata(nsAString& aIntegrityMetadata) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetIntegrityMetadata(const nsAString& aIntegrityMetadata) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-03-18 18:12:36 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetSkipContentSniffing(bool* aSkipContentSniffing) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetSkipContentSniffing(bool aSkipContentSniffing) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetIsTopLevelLoad(bool* aResult) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetIsFromProcessingFrameAttributes(
|
|
|
|
bool* aIsFromProcessingFrameAttributes) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2021-03-30 03:52:31 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetIsMediaRequest(bool aIsMediaRequest) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetIsMediaRequest(bool* aIsMediaRequest) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetIsMediaInitialRequest(bool aIsMediaInitialRequest) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetIsMediaInitialRequest(bool* aIsMediaInitialRequest) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2021-07-03 02:11:55 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetIsFromObjectOrEmbed(bool aIsFromObjectOrEmbed) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetIsFromObjectOrEmbed(bool* aIsFromObjectOrEmbed) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2022-07-05 12:18:31 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetShouldSkipCheckForBrokenURLOrZeroSized(
|
|
|
|
bool* aShouldSkipCheckForBrokenURLOrZeroSized) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-03-18 18:12:36 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetResultPrincipalURI(nsIURI** aURI) {
|
|
|
|
nsCOMPtr<nsIURI> uri = mResultPrincipalURI;
|
|
|
|
uri.forget(aURI);
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetResultPrincipalURI(nsIURI* aURI) {
|
|
|
|
mResultPrincipalURI = aURI;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2021-12-21 01:39:29 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetChannelCreationOriginalURI(nsIURI** aURI) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetChannelCreationOriginalURI(nsIURI* aURI) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-03-18 18:12:36 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetRequestBlockingReason(uint32_t aReason) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetRequestBlockingReason(uint32_t* aReason) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
void TRRLoadInfo::SetClientInfo(const ClientInfo& aClientInfo) {}
|
|
|
|
|
|
|
|
const Maybe<ClientInfo>& TRRLoadInfo::GetClientInfo() { return mClientInfo; }
|
|
|
|
|
|
|
|
void TRRLoadInfo::GiveReservedClientSource(
|
|
|
|
UniquePtr<ClientSource>&& aClientSource) {}
|
|
|
|
|
|
|
|
UniquePtr<ClientSource> TRRLoadInfo::TakeReservedClientSource() {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
void TRRLoadInfo::SetReservedClientInfo(const ClientInfo& aClientInfo) {}
|
|
|
|
|
|
|
|
void TRRLoadInfo::OverrideReservedClientInfoInParent(
|
|
|
|
const ClientInfo& aClientInfo) {}
|
|
|
|
|
|
|
|
const Maybe<ClientInfo>& TRRLoadInfo::GetReservedClientInfo() {
|
|
|
|
return mReservedClientInfo;
|
|
|
|
}
|
|
|
|
|
|
|
|
void TRRLoadInfo::SetInitialClientInfo(const ClientInfo& aClientInfo) {}
|
|
|
|
|
|
|
|
const Maybe<ClientInfo>& TRRLoadInfo::GetInitialClientInfo() {
|
|
|
|
return mInitialClientInfo;
|
|
|
|
}
|
|
|
|
|
|
|
|
void TRRLoadInfo::SetController(const ServiceWorkerDescriptor& aServiceWorker) {
|
|
|
|
}
|
|
|
|
|
|
|
|
void TRRLoadInfo::ClearController() {}
|
|
|
|
|
|
|
|
const Maybe<ServiceWorkerDescriptor>& TRRLoadInfo::GetController() {
|
|
|
|
return mController;
|
|
|
|
}
|
|
|
|
|
|
|
|
void TRRLoadInfo::SetPerformanceStorage(
|
|
|
|
PerformanceStorage* aPerformanceStorage) {}
|
|
|
|
|
|
|
|
PerformanceStorage* TRRLoadInfo::GetPerformanceStorage() { return nullptr; }
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetCspEventListener(nsICSPEventListener** aCSPEventListener) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetCspEventListener(nsICSPEventListener* aCSPEventListener) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
already_AddRefed<nsIContentSecurityPolicy> TRRLoadInfo::GetCsp() {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
already_AddRefed<nsIContentSecurityPolicy> TRRLoadInfo::GetPreloadCsp() {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
already_AddRefed<nsIContentSecurityPolicy> TRRLoadInfo::GetCspToInherit() {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2024-06-20 16:22:41 +03:00
|
|
|
Maybe<FeaturePolicyInfo> TRRLoadInfo::GetContainerFeaturePolicyInfo() {
|
|
|
|
return Nothing();
|
|
|
|
}
|
|
|
|
|
|
|
|
void TRRLoadInfo::SetContainerFeaturePolicyInfo(
|
|
|
|
const FeaturePolicyInfo& aContainerFeaturePolicyInfo) {}
|
|
|
|
|
2020-03-18 18:12:36 +03:00
|
|
|
NS_IMETHODIMP
|
2020-03-27 20:09:15 +03:00
|
|
|
TRRLoadInfo::GetHttpsOnlyStatus(uint32_t* aHttpsOnlyStatus) {
|
2020-03-18 18:12:36 +03:00
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
2020-03-27 20:09:15 +03:00
|
|
|
TRRLoadInfo::SetHttpsOnlyStatus(uint32_t aHttpsOnlyStatus) {
|
2020-03-18 18:12:36 +03:00
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2023-05-15 12:31:49 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetHstsStatus(bool* aHstsStatus) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetHstsStatus(bool aHstsStatus) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-04-16 11:04:26 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetHasValidUserGestureActivation(
|
|
|
|
bool* aHasValidUserGestureActivation) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetHasValidUserGestureActivation(
|
|
|
|
bool aHasValidUserGestureActivation) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
2024-06-26 17:24:31 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetTextDirectiveUserActivation(
|
|
|
|
bool* aTextDirectiveUserActivation) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetTextDirectiveUserActivation(bool aTextDirectiveUserActivation) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
2024-06-26 17:24:32 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetIsSameDocumentNavigation(bool* aTextDirectiveUserActivation) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetIsSameDocumentNavigation(bool aTextDirectiveUserActivation) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
2020-04-16 11:04:26 +03:00
|
|
|
}
|
|
|
|
|
2020-03-25 16:04:35 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetInternalContentPolicyType(nsContentPolicyType* aResult) {
|
|
|
|
*aResult = mInternalContentPolicyType;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2020-04-07 14:55:20 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetAllowDeprecatedSystemRequests(
|
|
|
|
bool* aAllowDeprecatedSystemRequests) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetAllowDeprecatedSystemRequests(
|
|
|
|
bool aAllowDeprecatedSystemRequests) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
2022-06-07 01:23:58 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetIsUserTriggeredSave(bool* aIsUserTriggeredSave) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetIsUserTriggeredSave(bool aIsUserTriggeredSave) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
2020-04-07 14:55:20 +03:00
|
|
|
}
|
|
|
|
|
2020-06-29 12:34:54 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetIsInDevToolsContext(bool* aIsInDevToolsContext) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetIsInDevToolsContext(bool aIsInDevToolsContext) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-04-10 13:56:57 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetParserCreatedScript(bool* aParserCreatedScript) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetParserCreatedScript(bool aParserCreatedScript) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-05-19 15:50:39 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetLoadingEmbedderPolicy(
|
|
|
|
nsILoadInfo::CrossOriginEmbedderPolicy* aOutPolicy) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetLoadingEmbedderPolicy(
|
|
|
|
nsILoadInfo::CrossOriginEmbedderPolicy aPolicy) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2022-07-27 23:33:19 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetIsOriginTrialCoepCredentiallessEnabledForTopLevel(
|
|
|
|
bool* aIsOriginTrialCoepCredentiallessEnabledForTopLevel) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetIsOriginTrialCoepCredentiallessEnabledForTopLevel(
|
|
|
|
bool aIsOriginTrialCoepCredentiallessEnabledForTopLevel) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2021-06-02 22:46:19 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetUnstrippedURI(nsIURI** aURI) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetUnstrippedURI(nsIURI* aURI) { return NS_ERROR_NOT_IMPLEMENTED; }
|
|
|
|
|
2022-10-01 01:39:23 +03:00
|
|
|
nsIInterceptionInfo* TRRLoadInfo::InterceptionInfo() { return nullptr; }
|
|
|
|
void TRRLoadInfo::SetInterceptionInfo(nsIInterceptionInfo* aPrincipla) {}
|
|
|
|
|
2022-12-16 11:54:51 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetHasInjectedCookieForCookieBannerHandling(
|
|
|
|
bool* aHasInjectedCookieForCookieBannerHandling) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetHasInjectedCookieForCookieBannerHandling(
|
|
|
|
bool aHasInjectedCookieForCookieBannerHandling) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2023-10-11 20:49:42 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetWasSchemelessInput(bool* aWasSchemelessInput) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetWasSchemelessInput(bool aWasSchemelessInput) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2024-06-24 15:56:31 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetHttpsUpgradeTelemetry(
|
|
|
|
nsILoadInfo::HTTPSUpgradeTelemetryType* aOutHttpsTelemetry) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetHttpsUpgradeTelemetry(
|
|
|
|
nsILoadInfo::HTTPSUpgradeTelemetryType aHttpsTelemetry) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2024-09-03 19:00:23 +03:00
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::GetIsNewWindowTarget(bool* aIsNewWindowTarget) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
TRRLoadInfo::SetIsNewWindowTarget(bool aIsNewWindowTarget) {
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
|
2020-03-18 18:12:36 +03:00
|
|
|
} // namespace net
|
|
|
|
} // namespace mozilla
|