File: PBackgroundSharedTypes.ipdlh

package info (click to toggle)
firefox 147.0.3-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 4,683,320 kB
  • sloc: cpp: 7,607,359; javascript: 6,533,295; ansic: 3,775,223; python: 1,415,500; xml: 634,561; asm: 438,949; java: 186,241; sh: 62,752; makefile: 18,079; objc: 13,092; perl: 12,808; yacc: 4,583; cs: 3,846; pascal: 3,448; lex: 1,720; ruby: 1,003; php: 436; lisp: 258; awk: 247; sql: 66; sed: 54; csh: 10; exp: 6
file content (103 lines) | stat: -rw-r--r-- 2,689 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

include "mozilla/dom/DomSecurityIPCUtils.h";

using mozilla::OriginAttributes from "mozilla/ipc/BackgroundUtils.h";
using struct mozilla::void_t from "mozilla/ipc/IPCCore.h";
using nsIContentSecurityPolicy::RequireTrustedTypesForDirectiveState from "nsIContentSecurityPolicy.h";
using mozilla::dom::IntegrityPolicy::Sources from "mozilla/dom/IntegrityPolicy.h";
using mozilla::dom::IntegrityPolicy::Destinations from "mozilla/dom/IntegrityPolicy.h";

namespace mozilla {
namespace ipc {

[Comparable] struct ContentSecurityPolicy
{
  nsString policy;
  bool reportOnlyFlag;
  bool deliveredViaMetaTagFlag;
  bool hasRequireTrustedTypesForDirective;
};

[Comparable] struct ContentPrincipalInfo
{
  OriginAttributes attrs;

  // Origin is not simply a part of the spec. Based on the scheme of the URI
  // spec, we generate different kind of origins: for instance any file: URL
  // shares the same origin, about: URLs have the full spec as origin and so
  // on.
  // Another important reason why we have this attribute is that
  // ContentPrincipalInfo is used out of the main-thread. Having this value
  // here allows us to retrive the origin without creating a full nsIPrincipal.
  nsCString originNoSuffix;

  nsCString spec;

  nsCString? domain;

  // Like originNoSuffix, baseDomain is used out of the main-thread.
  nsCString baseDomain;
};

[Comparable] struct SystemPrincipalInfo
{ };

[Comparable] struct NullPrincipalInfo
{
  OriginAttributes attrs;
  nsCString spec;
};

[Comparable] struct ExpandedPrincipalInfo
{
  OriginAttributes attrs;
  PrincipalInfo[] allowlist;
};

[Comparable] union PrincipalInfo
{
  ContentPrincipalInfo;
  SystemPrincipalInfo;
  NullPrincipalInfo;
  ExpandedPrincipalInfo;
};

[Comparable] struct CSPInfo
{
  ContentSecurityPolicy[] policyInfos;
  PrincipalInfo requestPrincipalInfo;
  nsCString selfURISpec;
  nsCString referrer;
  uint64_t innerWindowID;
  RequireTrustedTypesForDirectiveState requireTrustedTypesForDirectiveState;
  bool skipAllowInlineStyleCheck;
};

[Comparable] struct IntegrityPolicyEntry {
  Sources sources;
  Destinations destinations;
  nsCString[] endpoints;
};

[Comparable] struct IntegrityPolicyArgs
{
  IntegrityPolicyEntry? enforcement;
  IntegrityPolicyEntry? reportOnly;
};

[Comparable] struct PolicyContainerArgs
{
  CSPInfo? csp;
  IntegrityPolicyArgs? integrityPolicy;
};

[Comparable] struct WebTransportHash {
  nsCString algorithm;
  uint8_t[] value;
};

} // namespace ipc
} // namespace mozilla