зеркало из https://github.com/mozilla/gecko-dev.git
Bug 1637487 - Factor out calls to log changes to mixed content security state. r=ckerschb
Depends on D75023 Differential Revision: https://phabricator.services.mozilla.com/D75024
This commit is contained in:
Родитель
c29977cc47
Коммит
7701a47ec5
|
@ -749,9 +749,6 @@ nsresult nsMixedContentBlocker::ShouldLoad(bool aHadInsecureImageRedirect,
|
|||
}
|
||||
}
|
||||
|
||||
uint64_t topInnerWindowID =
|
||||
docShell->GetBrowsingContext()->GetTopWindowContext()->Id();
|
||||
|
||||
uint32_t state = nsIWebProgressListener::STATE_IS_BROKEN;
|
||||
nsCOMPtr<nsISecureBrowserUI> securityUI;
|
||||
rootShell->GetSecurityUI(getter_AddRefs(securityUI));
|
||||
|
@ -817,8 +814,6 @@ nsresult nsMixedContentBlocker::ShouldLoad(bool aHadInsecureImageRedirect,
|
|||
if (classification == eMixedDisplay) {
|
||||
if (!StaticPrefs::security_mixed_content_block_display_content() ||
|
||||
allowMixedContent) {
|
||||
LogMixedContentMessage(classification, aContentLocation, topInnerWindowID,
|
||||
eUserOverride, requestingLocation);
|
||||
*aDecision = nsIContentPolicy::ACCEPT;
|
||||
if (rootHasSecureConnection) {
|
||||
broken = true;
|
||||
|
@ -828,8 +823,6 @@ nsresult nsMixedContentBlocker::ShouldLoad(bool aHadInsecureImageRedirect,
|
|||
newState |= nsIWebProgressListener::STATE_LOADED_MIXED_DISPLAY_CONTENT;
|
||||
} else {
|
||||
*aDecision = nsIContentPolicy::REJECT_REQUEST;
|
||||
LogMixedContentMessage(classification, aContentLocation, topInnerWindowID,
|
||||
eBlocked, requestingLocation);
|
||||
newState |= nsIWebProgressListener::STATE_BLOCKED_MIXED_DISPLAY_CONTENT;
|
||||
}
|
||||
} else {
|
||||
|
@ -838,8 +831,6 @@ nsresult nsMixedContentBlocker::ShouldLoad(bool aHadInsecureImageRedirect,
|
|||
// be blocked, block it unless the user has choosen to override the pref
|
||||
if (!StaticPrefs::security_mixed_content_block_active_content() ||
|
||||
allowMixedContent) {
|
||||
LogMixedContentMessage(classification, aContentLocation, topInnerWindowID,
|
||||
eUserOverride, requestingLocation);
|
||||
*aDecision = nsIContentPolicy::ACCEPT;
|
||||
|
||||
if (rootHasSecureConnection) {
|
||||
|
@ -853,14 +844,18 @@ nsresult nsMixedContentBlocker::ShouldLoad(bool aHadInsecureImageRedirect,
|
|||
// User has not overriden the pref by Disabling protection. Reject the
|
||||
// request and update the security state.
|
||||
*aDecision = nsIContentPolicy::REJECT_REQUEST;
|
||||
LogMixedContentMessage(classification, aContentLocation, topInnerWindowID,
|
||||
eBlocked, requestingLocation);
|
||||
// The user has not overriden the pref, so make sure they still have an
|
||||
// option by calling nativeDocShell which will invoke the doorhanger
|
||||
newState |= nsIWebProgressListener::STATE_BLOCKED_MIXED_ACTIVE_CONTENT;
|
||||
}
|
||||
}
|
||||
|
||||
LogMixedContentMessage(classification, aContentLocation, topWC->Id(),
|
||||
(*aDecision == nsIContentPolicy::REJECT_REQUEST)
|
||||
? eBlocked
|
||||
: eUserOverride,
|
||||
requestingLocation);
|
||||
|
||||
// Check if the new flags we computed match the current state on the doc.
|
||||
// This is really painful, and life would be eaiser if the doc had the same
|
||||
// flags instead of bools.
|
||||
|
|
Загрузка…
Ссылка в новой задаче