зеркало из https://github.com/mozilla/gecko-dev.git
242 строки
9.0 KiB
Plaintext
242 строки
9.0 KiB
Plaintext
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "nsISupports.idl"
|
|
|
|
interface nsIURI;
|
|
interface mozIDOMWindowProxy;
|
|
interface nsIChannel;
|
|
interface nsIPrincipal;
|
|
interface nsILoadInfo;
|
|
|
|
%{C++
|
|
|
|
#include "mozilla/EnumSet.h"
|
|
|
|
enum class ThirdPartyAnalysis {
|
|
IsForeign,
|
|
IsThirdPartyTrackingResource,
|
|
IsThirdPartySocialTrackingResource,
|
|
IsFirstPartyStorageAccessGranted,
|
|
};
|
|
|
|
using ThirdPartyAnalysisResult = mozilla::EnumSet<ThirdPartyAnalysis>;
|
|
|
|
typedef bool (*RequireThirdPartyCheck)(nsILoadInfo*);
|
|
|
|
%}
|
|
|
|
native ThirdPartyAnalysisResult(ThirdPartyAnalysisResult);
|
|
native RequireThirdPartyCheck(RequireThirdPartyCheck);
|
|
|
|
/**
|
|
* Utility functions for determining whether a given URI, channel, or window
|
|
* hierarchy is third party with respect to a known URI.
|
|
*/
|
|
[scriptable, builtinclass, uuid(fd82700e-ffb4-4932-b7d6-08f0b5697dda)]
|
|
interface mozIThirdPartyUtil : nsISupports
|
|
{
|
|
/**
|
|
* isThirdPartyURI
|
|
*
|
|
* Determine whether two URIs are third party with respect to each other.
|
|
* This is determined by computing the base domain for both URIs. If they can
|
|
* be determined, and the base domains match, the request is defined as first
|
|
* party. If it cannot be determined because one or both URIs do not have a
|
|
* base domain (for instance, in the case of IP addresses, host aliases such
|
|
* as 'localhost', or a file:// URI), an exact string comparison on host is
|
|
* performed.
|
|
*
|
|
* For example, the URI "http://mail.google.com/" is not third party with
|
|
* respect to "http://images.google.com/", but "http://mail.yahoo.com/" and
|
|
* "http://192.168.1.1/" are.
|
|
*
|
|
* @return true if aFirstURI is third party with respect to aSecondURI.
|
|
*
|
|
* @throws if either URI is null, has a malformed host, or has an empty host
|
|
* and is not a file:// URI.
|
|
*/
|
|
boolean isThirdPartyURI(in nsIURI aFirstURI, in nsIURI aSecondURI);
|
|
|
|
/**
|
|
* isThirdPartyWindow
|
|
*
|
|
* Determine whether the given window hierarchy is third party. This is done
|
|
* as follows:
|
|
*
|
|
* 1) Obtain the URI of the principal associated with 'aWindow'. Call this the
|
|
* 'bottom URI'.
|
|
* 2) If 'aURI' is provided, determine if it is third party with respect to
|
|
* the bottom URI. If so, return.
|
|
* 3) Find the same-type parent window, if there is one, and its URI.
|
|
* Determine whether it is third party with respect to the bottom URI. If
|
|
* so, return.
|
|
*
|
|
* Therefore, each level in the window hierarchy is tested. (This means that
|
|
* nested iframes with different base domains, even though the bottommost and
|
|
* topmost URIs might be equal, will be considered third party.)
|
|
*
|
|
* @param aWindow
|
|
* The bottommost window in the hierarchy.
|
|
* @param aURI
|
|
* A URI to test against. If null, the URI of the principal
|
|
* associated with 'aWindow' will be used.
|
|
*
|
|
* For example, if 'aURI' is "http://mail.google.com/", 'aWindow' has a URI
|
|
* of "http://google.com/", and its parent is the topmost content window with
|
|
* a URI of "http://mozilla.com", the result will be true.
|
|
*
|
|
* @return true if 'aURI' is third party with respect to any of the URIs
|
|
* associated with aWindow and its same-type parents.
|
|
*
|
|
* @throws if aWindow is null; the same-type parent of any window in the
|
|
* hierarchy cannot be determined; or the URI associated with any
|
|
* window in the hierarchy is null, has a malformed host, or has an
|
|
* empty host and is not a file:// URI.
|
|
*
|
|
* @see isThirdPartyURI
|
|
*/
|
|
boolean isThirdPartyWindow(in mozIDOMWindowProxy aWindow, [optional] in nsIURI aURI);
|
|
|
|
/**
|
|
* isThirdPartyChannel
|
|
*
|
|
* Determine whether the given channel and its content window hierarchy is
|
|
* third party. This is done as follows:
|
|
*
|
|
* 1) If 'aChannel' is an nsIHttpChannel and has the
|
|
* 'forceAllowThirdPartyCookie' property set, then:
|
|
* a) If 'aURI' is null, return false.
|
|
* b) Otherwise, find the URI of the channel, determine whether it is
|
|
* foreign with respect to 'aURI', and return.
|
|
* 2) Find the URI of the channel and determine whether it is third party with
|
|
* respect to the URI of the channel. If so, return.
|
|
* 3) Obtain the bottommost nsIDOMWindow, and its same-type parent if it
|
|
* exists, from the channel's notification callbacks. Then:
|
|
* a) If the parent is the same as the bottommost window, and the channel
|
|
* has the LOAD_DOCUMENT_URI flag set, return false. This represents the
|
|
* case where a toplevel load is occurring and the window's URI has not
|
|
* yet been updated. (We have already checked that 'aURI' is not foreign
|
|
* with respect to the channel URI.)
|
|
* b) Otherwise, return the result of isThirdPartyWindow with arguments
|
|
* of the channel's bottommost window and the channel URI, respectively.
|
|
*
|
|
* Therefore, both the channel's URI and each level in the window hierarchy
|
|
* associated with the channel is tested.
|
|
*
|
|
* @param aChannel
|
|
* The channel associated with the load.
|
|
* @param aURI
|
|
* A URI to test against. If null, the URI of the channel will be used.
|
|
*
|
|
* For example, if 'aURI' is "http://mail.google.com/", 'aChannel' has a URI
|
|
* of "http://google.com/", and its parent is the topmost content window with
|
|
* a URI of "http://mozilla.com", the result will be true.
|
|
*
|
|
* @return true if aURI is third party with respect to the channel URI or any
|
|
* of the URIs associated with the same-type window hierarchy of the
|
|
* channel.
|
|
*
|
|
* @throws if 'aChannel' is null; the channel has no notification callbacks or
|
|
* an associated window; or isThirdPartyWindow throws.
|
|
*
|
|
* @see isThirdPartyWindow
|
|
*/
|
|
boolean isThirdPartyChannel(in nsIChannel aChannel, [optional] in nsIURI aURI);
|
|
|
|
/**
|
|
* getBaseDomain
|
|
*
|
|
* Get the base domain for aHostURI; e.g. for "www.bbc.co.uk", this would be
|
|
* "bbc.co.uk". Only properly-formed URI's are tolerated, though a trailing
|
|
* dot may be present. If aHostURI is an IP address, an alias such as
|
|
* 'localhost', an eTLD such as 'co.uk', or the empty string, aBaseDomain will
|
|
* be the exact host. The result of this function should only be used in exact
|
|
* string comparisons, since substring comparisons will not be valid for the
|
|
* special cases elided above.
|
|
*
|
|
* @param aHostURI
|
|
* The URI to analyze.
|
|
*
|
|
* @return the base domain.
|
|
*/
|
|
AUTF8String getBaseDomain(in nsIURI aHostURI);
|
|
|
|
/**
|
|
* NOTE: Long term, this method won't be needed once bug 922464 is fixed which
|
|
* will make it possible to parse all URI's off the main thread.
|
|
*
|
|
* getBaseDomainFromSchemeHost
|
|
*
|
|
* Get the base domain for aScheme and aHost. Otherwise identical to
|
|
* getBaseDomain().
|
|
*
|
|
* @param aScheme
|
|
* The scheme to analyze.
|
|
*
|
|
* @param aAsciiHost
|
|
* The host to analyze.
|
|
*
|
|
* @return the base domain.
|
|
*/
|
|
AUTF8String getBaseDomainFromSchemeHost(in AUTF8String aScheme,
|
|
in AUTF8String aAsciiHost);
|
|
|
|
/**
|
|
* getURIFromWindow
|
|
*
|
|
* Returns the URI associated with the script object principal for the
|
|
* window.
|
|
*/
|
|
nsIURI getURIFromWindow(in mozIDOMWindowProxy aWindow);
|
|
|
|
/**
|
|
* getPrincipalFromWindow
|
|
*
|
|
* Returns the script object principal for the window.
|
|
*/
|
|
nsIPrincipal getPrincipalFromWindow(in mozIDOMWindowProxy aWindow);
|
|
|
|
/**
|
|
* getContentBlockingAllowListPrincipalFromWindow
|
|
*
|
|
* Returns the content blocking allow list principal for the window.
|
|
*/
|
|
[noscript]
|
|
nsIPrincipal getContentBlockingAllowListPrincipalFromWindow(in mozIDOMWindowProxy aWindow,
|
|
[optional] in nsIURI aURIBeingLoaded);
|
|
|
|
/**
|
|
* getTopWindowForChannel
|
|
*
|
|
* Returns the top-level window associated with the given channel.
|
|
*/
|
|
[noscript]
|
|
mozIDOMWindowProxy getTopWindowForChannel(in nsIChannel aChannel, [optional] in nsIURI aURIBeingLoaded);
|
|
|
|
/*
|
|
* Performs a full analysis of a channel.
|
|
*
|
|
* aChannel the input channel
|
|
* aNotify whether to send content blocking notifications if access control checks fail
|
|
* aURI optional URI to check for (the channel URI will be used instead if not provided)
|
|
* aRequireThirdPartyCheck a functor used to determine whether the load info requires third-party checks
|
|
*/
|
|
[noscript, notxpcom]
|
|
ThirdPartyAnalysisResult analyzeChannel(in nsIChannel aChannel,
|
|
in boolean aNotify,
|
|
[optional] in nsIURI aURI,
|
|
[optional] in RequireThirdPartyCheck aRequireThirdPartyCheck,
|
|
out uint32_t aRejectedReason);
|
|
};
|
|
|
|
%{ C++
|
|
/**
|
|
* The mozIThirdPartyUtil implementation is an XPCOM service registered
|
|
* under the ContractID:
|
|
*/
|
|
#define THIRDPARTYUTIL_CONTRACTID "@mozilla.org/thirdpartyutil;1"
|
|
%}
|
|
|