summaryrefslogtreecommitdiffstats
path: root/dom/base/nsIDroppedLinkHandler.idl
blob: da2f539310833e6abe8537c2cb0a2632e49dbb6b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

#include "nsISupports.idl"
#include "nsIPrincipal.idl"
#include "nsIContentSecurityPolicy.idl"

webidl DragEvent;
webidl DataTransfer;

[scriptable, uuid(69E14F91-2E09-4CA6-A511-A715C99A2804)]
interface nsIDroppedLinkItem : nsISupports
{
  /**
   * Returns the URL of the link.
   */
  readonly attribute AString url;

  /**
   * Returns the link name.
   */
  readonly attribute AString name;

  /**
   * Returns the MIME-Type.
   */
  readonly attribute AString type;
};

[scriptable, uuid(21B5C25A-28A9-47BD-8431-FA9116305DED)]
interface nsIDroppedLinkHandler : nsISupports
{
  /**
   * Determines if a link being dragged can be dropped and returns true if so.
   * aEvent should be a dragenter or dragover event.
   *
   * If aAllowSameDocument is false, drops are only allowed if the document
   * of the source of the drag is different from the destination. This check
   * includes any parent, sibling and child frames in the same content tree.
   * If true, the source is not checked.
   */
  boolean canDropLink(in DragEvent aEvent, in boolean aAllowSameDocument);

  /**
   * Given a drop event aEvent, determines links being dragged and returns
   * them. If links are returned the caller can, for instance, load them. If
   * the returned array is empty, there is no valid link to be dropped.
   *
   * A NS_ERROR_DOM_SECURITY_ERR error will be thrown and the event cancelled if
   * the receiving target should not load the uri for security reasons. This
   * will occur if any of the following conditions are true:
   *  - the source of the drag initiated a link for dragging that
   *    it itself cannot access. This prevents a source document from tricking
   *    the user into a dragging a chrome url, for example.
   *  - aDisallowInherit is true, and the URI being dropped would inherit the
   *    current document's security context (URI_INHERITS_SECURITY_CONTEXT).
   */
  Array<nsIDroppedLinkItem> dropLinks(in DragEvent aEvent,
                                      [optional] in boolean aDisallowInherit);

  /**
   * Given a drop event aEvent, validate the extra URIs for the event,
   * this is used when the caller extracts yet another URIs from the dropped
   * text, like home button that splits the text with "|".
   */
  void validateURIsForDrop(in DragEvent aEvent,
                           in Array<AString> aURIs,
                           [optional] in boolean aDisallowInherit);

  /**
   * Given a dataTransfer, allows caller to determine and verify links being
   * dragged. Since drag/drop performs a roundtrip of parent, child, parent,
   * it allows the parent to verify that the child did not modify links
   * being dropped.
   */
  Array<nsIDroppedLinkItem> queryLinks(in DataTransfer aDataTransfer);

  /**
   * Given a drop event aEvent, determines the triggering principal for the
   * event and returns it.
   */
  nsIPrincipal getTriggeringPrincipal(in DragEvent aEvent);

  /**
   * Given a drop event aEvent, determines the CSP for the event and returns it.
   */
  nsIContentSecurityPolicy getCsp(in DragEvent aEvent);
};