Bug 1558394 - Pass the TriggeringSandboxFlags to nsILoadinfo r=ckerschb,smaug,necko-reviewers,valentin
Add triggering Sandbox flags to loadinfo *** Pass triggering Flags into Loadinfo Differential Revision: https://phabricator.services.mozilla.com/D69588
This commit is contained in:
@@ -94,6 +94,7 @@ nsDocShellLoadState::nsDocShellLoadState(nsIURI* aURI)
|
||||
mHasValidUserGestureActivation(false),
|
||||
mTypeHint(VoidCString()),
|
||||
mFileName(VoidString()),
|
||||
mTriggeringSandboxFlags(0),
|
||||
mIsFromProcessingFrameAttributes(false),
|
||||
mLoadIdentifier(0) {
|
||||
MOZ_ASSERT(aURI, "Cannot create a LoadState with a null URI!");
|
||||
@@ -128,6 +129,7 @@ nsDocShellLoadState::nsDocShellLoadState(
|
||||
mTriggeringPrincipal = aLoadState.TriggeringPrincipal();
|
||||
mPrincipalToInherit = aLoadState.PrincipalToInherit();
|
||||
mStoragePrincipalToInherit = aLoadState.StoragePrincipalToInherit();
|
||||
mTriggeringSandboxFlags = aLoadState.TriggeringSandboxFlags();
|
||||
mCsp = aLoadState.Csp();
|
||||
mOriginalURIString = aLoadState.OriginalURIString();
|
||||
mCancelContentJSEpoch = aLoadState.CancelContentJSEpoch();
|
||||
@@ -349,6 +351,7 @@ nsresult nsDocShellLoadState::CreateFromLoadURIOptions(
|
||||
loadState->SetFirstParty(true);
|
||||
loadState->SetHasValidUserGestureActivation(
|
||||
aLoadURIOptions.mHasValidUserGestureActivation);
|
||||
loadState->SetTriggeringSandboxFlags(aLoadURIOptions.mTriggeringSandboxFlags);
|
||||
loadState->SetPostDataStream(postData);
|
||||
loadState->SetHeadersStream(aLoadURIOptions.mHeaders);
|
||||
loadState->SetBaseURI(aLoadURIOptions.mBaseURI);
|
||||
@@ -452,6 +455,14 @@ void nsDocShellLoadState::SetCsp(nsIContentSecurityPolicy* aCsp) {
|
||||
|
||||
nsIContentSecurityPolicy* nsDocShellLoadState::Csp() const { return mCsp; }
|
||||
|
||||
void nsDocShellLoadState::SetTriggeringSandboxFlags(uint32_t flags) {
|
||||
mTriggeringSandboxFlags = flags;
|
||||
}
|
||||
|
||||
uint32_t nsDocShellLoadState::TriggeringSandboxFlags() const {
|
||||
return mTriggeringSandboxFlags;
|
||||
}
|
||||
|
||||
bool nsDocShellLoadState::InheritPrincipal() const { return mInheritPrincipal; }
|
||||
|
||||
void nsDocShellLoadState::SetInheritPrincipal(bool aInheritPrincipal) {
|
||||
@@ -868,6 +879,7 @@ DocShellLoadStateInit nsDocShellLoadState::Serialize() {
|
||||
loadState.TriggeringPrincipal() = mTriggeringPrincipal;
|
||||
loadState.PrincipalToInherit() = mPrincipalToInherit;
|
||||
loadState.StoragePrincipalToInherit() = mStoragePrincipalToInherit;
|
||||
loadState.TriggeringSandboxFlags() = mTriggeringSandboxFlags;
|
||||
loadState.Csp() = mCsp;
|
||||
loadState.OriginalURIString() = mOriginalURIString;
|
||||
loadState.CancelContentJSEpoch() = mCancelContentJSEpoch;
|
||||
|
||||
Reference in New Issue
Block a user