File: ImageBlocker.cpp

package info (click to toggle)
firefox 149.0-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 4,767,760 kB
  • sloc: cpp: 7,416,064; javascript: 6,752,859; ansic: 3,774,850; python: 1,250,473; xml: 641,578; asm: 439,191; java: 186,617; sh: 56,634; makefile: 18,856; objc: 13,092; perl: 12,763; pascal: 5,960; yacc: 4,583; cs: 3,846; lex: 1,720; ruby: 1,002; php: 436; lisp: 258; awk: 105; sql: 66; sed: 53; csh: 10; exp: 6
file content (62 lines) | stat: -rw-r--r-- 2,087 bytes parent folder | download | duplicates (13)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

#include "ImageBlocker.h"
#include "nsIPermissionManager.h"
#include "nsContentUtils.h"
#include "mozilla/StaticPrefs_permissions.h"
#include "nsNetUtil.h"

using namespace mozilla;
using namespace mozilla::image;

NS_IMPL_ISUPPORTS(ImageBlocker, nsIContentPolicy)

NS_IMETHODIMP
ImageBlocker::ShouldLoad(nsIURI* aContentLocation, nsILoadInfo* aLoadInfo,
                         int16_t* aShouldLoad) {
  *aShouldLoad = nsIContentPolicy::ACCEPT;

  if (!aContentLocation) {
    // Bug 1720280: Ideally we should block the load, but to avoid a potential
    // null pointer deref, we return early in this case. Please note that
    // the ImageBlocker only applies about http/https loads anyway.
    return NS_OK;
  }

  ExtContentPolicyType contentType = aLoadInfo->GetExternalContentPolicyType();
  if (contentType != ExtContentPolicy::TYPE_IMAGE &&
      contentType != ExtContentPolicy::TYPE_IMAGESET) {
    return NS_OK;
  }

  if (ImageBlocker::ShouldBlock(aContentLocation)) {
    NS_SetRequestBlockingReason(
        aLoadInfo, nsILoadInfo::BLOCKING_REASON_CONTENT_POLICY_CONTENT_BLOCKED);
    *aShouldLoad = nsIContentPolicy::REJECT_TYPE;
  }

  return NS_OK;
}

NS_IMETHODIMP
ImageBlocker::ShouldProcess(nsIURI* aContentLocation, nsILoadInfo* aLoadInfo,
                            int16_t* aShouldProcess) {
  // We block images at load level already, so those should not end up here.
  *aShouldProcess = nsIContentPolicy::ACCEPT;
  return NS_OK;
}

/* static */
bool ImageBlocker::ShouldBlock(nsIURI* aContentLocation) {
  // Block loading images depending on the permissions.default.image pref.
  if (StaticPrefs::permissions_default_image() !=
      nsIPermissionManager::DENY_ACTION) {
    return false;
  }

  // we only want to check http, https
  // for chrome:// and resources and others, no need to check.
  return net::SchemeIsHttpOrHttps(aContentLocation);
}