/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=8 sts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
/* A namespace class for static content security utilities. */
struct JSContext; class nsIChannel; class nsIHttpChannel; class nsIPrincipal; class NS_ConvertUTF8toUTF16;
namespace mozilla::dom { class Document; class Element;
} // namespace mozilla::dom
using FilenameTypeAndDetails = std::pair<nsCString, mozilla::Maybe<nsCString>>;
class nsContentSecurityUtils { public: // CSPs upgrade-insecure-requests directive applies to same origin top level // navigations. Using the SOP would return false for the case when an https // page triggers and http page to load, even though that http page would be // upgraded to https later. Hence we have to use that custom function instead // of simply calling aTriggeringPrincipal->Equals(aResultPrincipal). staticbool IsConsideredSameOriginForUIR(nsIPrincipal* aTriggeringPrincipal,
nsIPrincipal* aResultPrincipal);
// Helper function for various checks: // This function detects profiles with userChrome.js or extension signatures // disabled. We can't/won't enforce strong security for people with those // hacks. The function will cache its result. staticvoid DetectJsHacks(); // Helper function for detecting custom agent styles staticvoid DetectCssHacks();
// Helper function to query the HTTP Channel of a potential // multi-part channel. Mostly used for querying response headers static nsresult GetHttpChannelFromPotentialMultiPart(
nsIChannel* aChannel, nsIHttpChannel** aHttpChannel);
// Helper function which performs the following framing checks // * CSP frame-ancestors // * x-frame-options // If any of the two disallows framing, the channel will be cancelled. staticvoid PerformCSPFrameAncestorAndXFOCheck(nsIChannel* aChannel);
// Helper function which just checks if the channel violates any: // 1. CSP frame-ancestors properties // 2. x-frame-options staticbool CheckCSPFrameAncestorAndXFO(nsIChannel* aChannel);
// Implements https://w3c.github.io/webappsec-csp/#is-element-nonceable. // // Returns an empty nonce for elements without a nonce OR when a potential // dangling markup attack was detected. static nsString GetIsElementNonceableNonce( const mozilla::dom::Element& aElement);
// Helper function to Check if a Download is allowed; staticlong ClassifyDownload(nsIChannel* aChannel, const nsAutoCString& aMimeTypeGuess);
staticbool ValidateScriptFilename(JSContext* cx, constchar* aFilename); // Helper Function to Post a message to the corresponding JS-Console staticvoid LogMessageToConsole(nsIHttpChannel* aChannel, constchar* aMsg);
};
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung ist noch experimentell.