/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=8 sts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
class nsContentSecurityManager : public nsIContentSecurityManager, public nsIChannelEventSink { public:
NS_DECL_ISUPPORTS
NS_DECL_NSICONTENTSECURITYMANAGER
NS_DECL_NSICHANNELEVENTSINK
enum CORSSecurityMapping { // Disables all CORS checking overriding the value of aCORSMode. All checks // are disabled even when CORSMode::CORS_ANONYMOUS or // CORSMode::CORS_USE_CREDENTIALS is passed. This is mostly used for chrome // code, where we don't need security checks. See // SEC_ALLOW_CROSS_ORIGIN_SEC_CONTEXT_IS_NULL for the detailed explanation // of the security mode.
DISABLE_CORS_CHECKS, // Disables all CORS checking on CORSMode::CORS_NONE. The other two CORS // modes CORSMode::CORS_ANONYMOUS and CORSMode::CORS_USE_CREDENTIALS are // respected.
CORS_NONE_MAPS_TO_DISABLED_CORS_CHECKS, // Allow load from any origin, but cross-origin requests require CORS. See // SEC_ALLOW_CROSS_ORIGIN_INHERITS_SEC_CONTEXT. Like above the other two // CORS modes are unaffected and get parsed.
CORS_NONE_MAPS_TO_INHERITED_CONTEXT, // Always require the server to acknowledge the request via CORS. // CORSMode::CORS_NONE is parsed as if CORSMode::CORS_ANONYMOUS is passed.
REQUIRE_CORS_CHECKS,
};
// computes the security flags for the requested CORS mode // @param aCORSSecurityMapping: See CORSSecurityMapping for variant // descriptions static nsSecurityFlags ComputeSecurityFlags(
mozilla::CORSMode aCORSMode, CORSSecurityMapping aCORSSecurityMapping);
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung ist noch experimentell.