summaryrefslogtreecommitdiffstats
path: root/dom/interfaces/security
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-05-15 03:34:42 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-05-15 03:34:42 +0000
commitda4c7e7ed675c3bf405668739c3012d140856109 (patch)
treecdd868dba063fecba609a1d819de271f0d51b23e /dom/interfaces/security
parentAdding upstream version 125.0.3. (diff)
downloadfirefox-da4c7e7ed675c3bf405668739c3012d140856109.tar.xz
firefox-da4c7e7ed675c3bf405668739c3012d140856109.zip
Adding upstream version 126.0.upstream/126.0
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'dom/interfaces/security')
-rw-r--r--dom/interfaces/security/nsIContentSecurityPolicy.idl14
-rw-r--r--dom/interfaces/security/nsIReferrerInfo.idl2
2 files changed, 8 insertions, 8 deletions
diff --git a/dom/interfaces/security/nsIContentSecurityPolicy.idl b/dom/interfaces/security/nsIContentSecurityPolicy.idl
index fdb99ceb26..26f00a0220 100644
--- a/dom/interfaces/security/nsIContentSecurityPolicy.idl
+++ b/dom/interfaces/security/nsIContentSecurityPolicy.idl
@@ -91,7 +91,7 @@ interface nsIContentSecurityPolicy : nsISerializable
* Please note that upgrade-insecure-reqeusts also applies if the parent or
* including document (context) makes use of the directive.
*/
- readonly attribute bool upgradeInsecureRequests;
+ readonly attribute boolean upgradeInsecureRequests;
/**
* Returns whether this policy uses the directive block-all-mixed-content.
@@ -100,12 +100,12 @@ interface nsIContentSecurityPolicy : nsISerializable
* will therefore block all mixed content without even trying to perform
* an upgrade.
*/
- readonly attribute bool blockAllMixedContent;
+ readonly attribute boolean blockAllMixedContent;
/**
* Returns whether this policy enforces the frame-ancestors directive.
*/
- readonly attribute bool enforcesFrameAncestors;
+ readonly attribute boolean enforcesFrameAncestors;
/**
* Parse and install a CSP policy.
@@ -144,7 +144,7 @@ interface nsIContentSecurityPolicy : nsISerializable
* (block the rules if false).
*/
boolean getAllowsInline(in nsIContentSecurityPolicy_CSPDirective aDirective,
- in bool aHasUnsafeHash,
+ in boolean aHasUnsafeHash,
in AString aNonce,
in boolean aParserCreated,
in Element aTriggeringElement,
@@ -241,7 +241,7 @@ interface nsIContentSecurityPolicy : nsISerializable
[must_use] void setRequestContextWithDocument(in Document aDocument);
[must_use] void setRequestContextWithPrincipal(in nsIPrincipal aRequestPrincipal,
in nsIURI aSelfURI,
- in AString aReferrer,
+ in ACString aReferrer,
in unsigned long long aInnerWindowId);
/**
@@ -249,7 +249,7 @@ interface nsIContentSecurityPolicy : nsISerializable
*/
[noscript, notxpcom, nostdcall] readonly attribute nsIPrincipal requestPrincipal;
[noscript, notxpcom, nostdcall] readonly attribute nsIURI selfURI;
- [noscript] readonly attribute AString referrer;
+ [noscript] readonly attribute ACString referrer;
[noscript, notxpcom, nostdcall] readonly attribute unsigned long long innerWindowID;
/**
@@ -328,7 +328,7 @@ interface nsIContentSecurityPolicy : nsISerializable
in nsILoadInfo aLoadInfo,
in nsIURI aContentLocation,
in nsIURI aOriginalURIIfRedirect,
- in bool aSendViolationReports);
+ in boolean aSendViolationReports);
%{ C++
// nsIObserver topic to fire when the policy encounters a violation.
diff --git a/dom/interfaces/security/nsIReferrerInfo.idl b/dom/interfaces/security/nsIReferrerInfo.idl
index 07e2f603bc..fc8b39465d 100644
--- a/dom/interfaces/security/nsIReferrerInfo.idl
+++ b/dom/interfaces/security/nsIReferrerInfo.idl
@@ -108,7 +108,7 @@ interface nsIReferrerInfo : nsISerializable
/**
* Indicates if the referrer should not be sent or not even when it's available.
*/
- readonly attribute AString computedReferrerSpec;
+ readonly attribute ACString computedReferrerSpec;
/**
* Get the computed referrer, if one has been set. The computed referrer is