summaryrefslogtreecommitdiffstats
path: root/image/ImageBlocker.cpp
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 01:47:29 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 01:47:29 +0000
commit0ebf5bdf043a27fd3dfb7f92e0cb63d88954c44d (patch)
treea31f07c9bcca9d56ce61e9a1ffd30ef350d513aa /image/ImageBlocker.cpp
parentInitial commit. (diff)
downloadfirefox-esr-upstream/115.8.0esr.tar.xz
firefox-esr-upstream/115.8.0esr.zip
Adding upstream version 115.8.0esr.upstream/115.8.0esr
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'image/ImageBlocker.cpp')
-rw-r--r--image/ImageBlocker.cpp59
1 files changed, 59 insertions, 0 deletions
diff --git a/image/ImageBlocker.cpp b/image/ImageBlocker.cpp
new file mode 100644
index 0000000000..eee07589f7
--- /dev/null
+++ b/image/ImageBlocker.cpp
@@ -0,0 +1,59 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "ImageBlocker.h"
+#include "nsIPermissionManager.h"
+#include "nsContentUtils.h"
+#include "mozilla/StaticPrefs_permissions.h"
+#include "nsNetUtil.h"
+
+using namespace mozilla;
+using namespace mozilla::image;
+
+NS_IMPL_ISUPPORTS(ImageBlocker, nsIContentPolicy)
+
+NS_IMETHODIMP
+ImageBlocker::ShouldLoad(nsIURI* aContentLocation, nsILoadInfo* aLoadInfo,
+ const nsACString& aMimeGuess, int16_t* aShouldLoad) {
+ ExtContentPolicyType contentType = aLoadInfo->GetExternalContentPolicyType();
+
+ *aShouldLoad = nsIContentPolicy::ACCEPT;
+
+ if (!aContentLocation) {
+ // Bug 1720280: Ideally we should block the load, but to avoid a potential
+ // null pointer deref, we return early in this case. Please note that
+ // the ImageBlocker only applies about http/https loads anyway.
+ return NS_OK;
+ }
+
+ // we only want to check http, https
+ // for chrome:// and resources and others, no need to check.
+ nsAutoCString scheme;
+ aContentLocation->GetScheme(scheme);
+ if (!scheme.LowerCaseEqualsLiteral("http") &&
+ !scheme.LowerCaseEqualsLiteral("https")) {
+ return NS_OK;
+ }
+
+ // Block loading images depending on the permissions.default.image pref.
+ if ((contentType == ExtContentPolicy::TYPE_IMAGE ||
+ contentType == ExtContentPolicy::TYPE_IMAGESET) &&
+ StaticPrefs::permissions_default_image() ==
+ nsIPermissionManager::DENY_ACTION) {
+ NS_SetRequestBlockingReason(
+ aLoadInfo, nsILoadInfo::BLOCKING_REASON_CONTENT_POLICY_CONTENT_BLOCKED);
+ *aShouldLoad = nsIContentPolicy::REJECT_TYPE;
+ }
+
+ return NS_OK;
+}
+
+NS_IMETHODIMP
+ImageBlocker::ShouldProcess(nsIURI* aContentLocation, nsILoadInfo* aLoadInfo,
+ const nsACString& aMimeGuess,
+ int16_t* aShouldProcess) {
+ // We block images at load level already, so those should not end up here.
+ *aShouldProcess = nsIContentPolicy::ACCEPT;
+ return NS_OK;
+}