summaryrefslogtreecommitdiffstats
path: root/js/xpconnect/idl/xpccomponents.idl
blob: 02352286634b721641a47a9520270499c40548ff (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
/* -*- Mode: IDL; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

#include "nsISupports.idl"

%{C++
#include "jspubtd.h"
%}

interface xpcIJSWeakReference;
interface nsIClassInfo;
interface nsICommandParams;
interface nsIComponentManager;
interface nsICycleCollectorListener;
interface nsIDocumentEncoder;
interface nsIEditorSpellCheck;
interface nsIFile;
interface nsILoadContext;
interface nsIPersistentProperties;
interface nsIURI;
interface nsIPrincipal;
interface nsIStackFrame;
webidl Element;

/**
* interface of Components.interfaces
* (interesting stuff only reflected into JavaScript)
*/
[scriptable, builtinclass, uuid(b8c31bba-79db-4a1d-930d-4cdd68713f9e)]
interface nsIXPCComponents_Interfaces : nsISupports
{
};

/**
* interface of Components.classes
* (interesting stuff only reflected into JavaScript)
*/
[scriptable, builtinclass, uuid(978ff520-d26c-11d2-9842-006008962422)]
interface nsIXPCComponents_Classes : nsISupports
{
};

/**
* interface of Components.results
* (interesting stuff only reflected into JavaScript)
*/
[scriptable, builtinclass, uuid(2fc229a0-5860-11d3-9899-006008962422)]
interface nsIXPCComponents_Results : nsISupports
{
};

/**
* interface of Components.ID
* (interesting stuff only reflected into JavaScript)
*/
[scriptable, builtinclass, uuid(7994a6e0-e028-11d3-8f5d-0010a4e73d9a)]
interface nsIXPCComponents_ID : nsISupports
{
};

/**
* interface of Components.Exception
* (interesting stuff only reflected into JavaScript)
*/
[scriptable, builtinclass, uuid(5bf039c0-e028-11d3-8f5d-0010a4e73d9a)]
interface nsIXPCComponents_Exception : nsISupports
{
};

/**
* interface of Components.Constructor
* (interesting stuff only reflected into JavaScript)
*/
[scriptable, builtinclass, uuid(88655640-e028-11d3-8f5d-0010a4e73d9a)]
interface nsIXPCComponents_Constructor : nsISupports
{
};

/**
* interface of object returned by Components.utils.Sandbox.
*/
[scriptable, builtinclass, uuid(4f8ae0dc-d266-4a32-875b-6a9de71a8ce9)]
interface nsIXPCComponents_utils_Sandbox : nsISupports
{
};

/**
 * interface for callback to be passed to Cu.schedulePreciseGC
 */
[scriptable, function, uuid(71000535-b0fd-44d1-8ce0-909760e3953c)]
interface nsIScheduledGCCallback : nsISupports
{
    void callback();
};

/**
* interface of Components.utils
*/
[scriptable, builtinclass, uuid(86003fe3-ee9a-4620-91dc-eef8b1e58815)]
interface nsIXPCComponents_Utils : nsISupports
{
    /*
     * Prints the provided message to stderr.
     */
    void printStderr(in AUTF8String message);

    /*
     * reportError is designed to be called from JavaScript only.
     *
     * It will report a JS Error object to the JS console, and return. It
     * is meant for use in exception handler blocks which want to "eat"
     * an exception, but still want to report it to the console.
     *
     * It must be called with one param, usually an object which was caught by
     * an exception handler.  If it is not a JS error object, the parameter
     * is converted to a string and reported as a new error.
     *
     * If called with two parameters, and the first parameter is not an
     * object, the second parameter is used as the stack for the error report.
     */
    [implicit_jscontext]
    void reportError(in jsval error, [optional] in jsval stack);


    /**
     * Cu.Sandbox is used to create a sandbox object
     *
     *     let sandbox = Cu.Sandbox(principal[, options]);
     *
     * Using new Cu.Sandbox(...) to create a sandbox has the same effect as
     * calling Cu.Sandbox(...) without new.
     *
     * In JS, Cu.Sandbox uses the following parameters:
     *
     * @param {Principal} principal
     *        The security principal defined for a sandbox determines what code
     *        running in that sandbox will be allowed to do. The principal may be one
     *        of four types: the system principal, a content principal, an expanded
     *        principal or a null principal. Depending on the principal type,
     *        this argument can be a nsIPrincipal, a Window, a String, an Array
     *        or null. See below.
     *          A content principal can be provided by passing a nsIPrincipal, a
     *        DOM Window, or a string URI (not recommended).
     *          An expanded (or extended) principal is an array of principals,
     *        where each item can be either a nsIPrincipal, a DOM window or a
     *        string URI.
     *          A null principal can either be specified by passing `null` or
     *        created explicitly with `Cc["@mozilla.org/nullprincipal;1"].createInstance(Ci.nsIPrincipal);`
     * @param {Object} options
     *        Optional parameters, valid properties are:
     *        - allowWaivers: {Boolean} Allows the caller to waive Xrays, in case
     *          Xrays were used. Defaults to true.
     *        - discardSource: {Boolean} For certain globals, we know enough about
     *          the code that will run in them that we can discard script source
     *          entirely. A discarded source will be re-read when stringifying
     *          functions.
     *            Defaults to false.
     *        - forceSecureContext: {Boolean} Determines whether content windows and
     *          workers are marked as "Secure Context"s. If principal is the system
     *          principal, the value is forced to true. Otherwise defaults to false.
     *        - freshCompartment: {Boolean} Whether the sandbox should be created
     *          using a new compartment. Defaults to false.
     *        - freshZone: {Boolean} if true creates a new GC region separate from
     *          both the calling context's and the sandbox prototype's region.
     *            Defaults to false.
     *        - invisibleToDebugger: {Boolean} Whether this sandbox and its scripts
     *          can be accessed by the JavaScript Debugger.
     *            Defaults to false.
     *        - isWebExtensionContentScript: {Boolean} Whether this sandbox
     *          corresponds to a WebExtension content script, and should receive
     *          various bits of special compatibility behavior.
     *            Defaults to false.
     *        - metadata: {Object} Object to use as the metadata for the sandbox. See
     *          setSandboxMetadata.
     *        - originAttributes: {Object} Dictionary of origin attributes to use if
     *          the principal was provided as a string.
     *        - sameZoneAs: {Object} Javascript Object in whose garbage collection
     *          region the sandbox should be created. This helps to improve memory
     *          usage by allowing sandboxes to be discarded when that zone goes away.
     *          It also improves performance and memory usage by allowing strings
     *          to be passed between the compartments without copying or using
     *          wrappers.
     *            Content scripts should pass the window they're running in as this
     *          parameter, in order to ensure that the script is cleaned up at the
     *          same time as the content itself.
     *        - sandboxName: {String} Identifies the sandbox in about:memory. This
     *          property is optional, but very useful for tracking memory usage. A
     *          recommended value for this property is an absolute path to the script
     *          responsible for creating the sandbox. If you don't specify a sandbox
     *          name it will default to the caller's filename.
     *        - sandboxPrototype: {Object} Prototype object for the sandbox. The
     *          sandbox will inherit the contents of this object if it's provided.
     *          Passing a content window object, setting wantXrays:true (default) and
     *          using an extended principal provides a clean, isolated execution
     *          environment in which javascript code that needs Web APIs (such as
     *          accessing the window's DOM) can be executed without interference from
     *          untrusted content code.
     *        - userContextId: {Number} The id of the user context this sandbox is
     *          inside. Defaults to 0.
     *        - wantComponents: {Boolean} Indicates whether the Components object is
     *          available or not in the sandbox. If the sandbox interacts with
     *          untrusted content this should be set to false when possible to
     *          further reduce possible attack surface.
     *            Defaults to true.
     *        - wantExportHelpers: {Boolean} if true, then createObjectIn(),
     *          evalInWindow(), and exportFunction() are available in the sandbox.
     *            Defaults to false.
     *        - wantGlobalProperties: {Array<String>} Each string is the name of an
     *          object that you want to make available as a global to code running in
     *          the sandbox. Possible values: Blob, ChromeUtils, CSS, CSSRule,
     *          Directory, DOMParser, Element, Event, File, FileReader, FormData,
     *          InspectorUtils, MessageChannel, Node, NodeFilter, PromiseDebugging,
     *          TextDecoder, TextEncoder, URL, URLSearchParams, XMLHttpRequest,
     *          XMLSerializer, atob, btoa, caches, crypto, fetch, indexedDB,
     *          rtcIdentityProvider
     *        - wantXrays: {Boolean} Whether the sandbox wants Xray vision with
     *          respect to same-origin objects outside the sandbox.
     *            Note that wantXrays is essentially deprecated. The preferred method
     *          of handling this now is to give the sandbox an expanded principal
     *          which inherits from the principal of the content compartment the
     *          sandbox will interact with. That lets the sandbox see the content
     *          compartment through X-ray wrappers, and gives any object passed from
     *          the sandbox to the content compartment opaque security wrappers unless
     *          export helpers are explicitly used.
     *            "Xray vision" is exactly the same Xray behavior that script always
     *          gets, by default, when working with DOM objects across origin
     *          boundaries. This is primarily visible for chrome code accessing
     *          content. However, it also occurs during cross-origin access between
     *          two content pages, since each page sees a "vanilla" view of the
     *          other. The protection is bidirectional: the caller sees the bonafide
     *          DOM objects without being confused by sneakily-redefined properties,
     *          and the target receives appropriate privacy from having its expandos
     *          inspected by untrusted callers. In situations where only
     *          unidirectional protection is needed, callers have the option to waive
     *          the X-ray behavior using wrappedJSObject or XPCNativeWrapper.unwrap().
     *            In general, when accessing same-origin content, script gets a
     *          Transparent wrapper rather than an Xray wrapper. However, sandboxes
     *          are often used when chrome wants to run script as another origin,
     *          possibly to interact with the page. In this case, same-origin Xrays
     *          are desirable, and wantXrays should be set to true.
     *            Defaults to true.
     */
    readonly attribute nsIXPCComponents_utils_Sandbox Sandbox;

    /*
     * evalInSandbox is designed to be called from JavaScript only.
     *
     * evalInSandbox evaluates the provided source string in the given sandbox.
     * It returns the result of the evaluation to the caller.
     *
     * var s = new C.u.Sandbox("http://www.mozilla.org");
     * var res = C.u.evalInSandbox("var five = 5; 2 + five", s);
     * var outerFive = s.five;
     * s.seven = res;
     * var thirtyFive = C.u.evalInSandbox("five * seven", s);
     */
    [implicit_jscontext,optional_argc]
    jsval evalInSandbox(in AString source, in jsval sandbox,
                        [optional] in jsval version,
                        [optional] in AUTF8String filename,
                        [optional] in long lineNo,
                        [optional] in bool enforceFilenameRestrictions);

    /*
     * Get the sandbox for running JS-implemented UA widgets (video controls etc.),
     * hosted inside UA-created Shadow DOM.
     */
    [implicit_jscontext]
    jsval getUAWidgetScope(in nsIPrincipal principal);

    /*
     * getSandboxMetadata is designed to be called from JavaScript only.
     *
     * getSandboxMetadata retrieves the metadata associated with
     * a sandbox object. It will return undefined if there
     * is no metadata attached to the sandbox.
     *
     * var s = C.u.Sandbox(..., { metadata: "metadata" });
     * var metadata = C.u.getSandboxMetadata(s);
     */
    [implicit_jscontext]
    jsval getSandboxMetadata(in jsval sandbox);

    /*
     * setSandboxMetadata is designed to be called from JavaScript only.
     *
     * setSandboxMetadata sets the metadata associated with
     * a sandbox object.
     *
     * Note that the metadata object will be copied before being used.
     * The copy will be performed using the structured clone algorithm.
     * Note that this algorithm does not support reflectors and
     * it will throw if it encounters them.
     */
    [implicit_jscontext]
    void setSandboxMetadata(in jsval sandbox, in jsval metadata);

    /*
     * import is designed to be called from JavaScript only.
     *
     * Synchronously loads and evaluates the js file located at
     * 'registryLocation' with a new, fully privileged global object.
     *
     * If 'targetObj' is specified and equal to null, returns the
     * module's global object. Otherwise (if 'targetObj' is not
     * specified, or 'targetObj' is != null) looks for a property
     * 'EXPORTED_SYMBOLS' on the new global object. 'EXPORTED_SYMBOLS'
     * is expected to be an array of strings identifying properties on
     * the global object.  These properties will be installed as
     * properties on 'targetObj', or, if 'targetObj' is not specified,
     * on the caller's global object. If 'EXPORTED_SYMBOLS' is not
     * found, an error is thrown.
     *
     * @param resourceURI A resource:// URI string to load the module from.
     * @param targetObj  the object to install the exported properties on.
     *        If this parameter is a primitive value, this method throws
     *        an exception.
     * @returns the module code's global object.
     *
     * The implementation maintains a hash of registryLocation->global obj.
     * Subsequent invocations of importModule with 'registryLocation'
     * pointing to the same file will not cause the module to be re-evaluated,
     * but the symbols in EXPORTED_SYMBOLS will be exported into the
     * specified target object and the global object returned as above.
     */
    [implicit_jscontext,optional_argc]
    jsval import(in AUTF8String aResourceURI, [optional] in jsval targetObj);

    /**
     * Returns true if the JSM is loaded into the system global previously via
     * the import method above, or corresponding ESM is loaded. Returns false
     * otherwise.
     *
     * @param resourceURI A resource:// URI string representing the location of
     *        the js file to be checked if it is already loaded or not.
     * @returns boolean, true if the js file has been loaded via import. false
     *          otherwise
     */
    boolean isModuleLoaded(in AUTF8String aResourceURI);


    /**
     * Returns true if the JSM is loaded into the system global previously via
     * the import method above. Returns false otherwise.
     */
    boolean isJSModuleLoaded(in AUTF8String aResourceURI);

    /**
     * Returns true if the ESM is loaded into the system global previously via
     * the ChromeUtils.importESModule method etc. Returns false otherwise.
     */
    boolean isESModuleLoaded(in AUTF8String aResourceURI);

    /*
     * Unloads the JS module at 'registryLocation'. Existing references to the
     * module will continue to work but any subsequent import of the module will
     * reload it and give new reference. If the JS module hasn't yet been
     * imported then this method will do nothing.
     *
     * @param resourceURI A resource:// URI string to unload the module from.
     */
    void unload(in AUTF8String registryLocation);

    /*
     * Imports global properties (like DOM constructors) into the scope, defining
     * them on the caller's global. aPropertyList should be an array of property
     * names.
     *
     * See xpc::GlobalProperties::Parse for the current list of supported
     * properties.
     */
    [implicit_jscontext]
    void importGlobalProperties(in jsval aPropertyList);

    /*
     * To be called from JS only.
     *
     * Return a weak reference for the given JS object.
     */
    [implicit_jscontext]
    xpcIJSWeakReference getWeakReference(in jsval obj);

    /*
     * To be called from JS only.
     *
     * Force an immediate garbage collection cycle.
     */
    [implicit_jscontext]
    void forceGC();

    /*
     * To be called from JS only.
     *
     * Force an immediate cycle collection cycle.
     */
    void forceCC([optional] in nsICycleCollectorListener aListener);

    /*
     * To be called from JS only.  C++ callers should use the
     * nsCycleCollector_createLogger() function instead.
     *
     * Create an instance of the built-in cycle collector logger object.
     */
    nsICycleCollectorListener createCCLogger();

    /*
     * To be called from JS only.
     *
     * If any incremental CC is in progress, finish it. For testing.
     */
    void finishCC();

    /*
     * To be called from JS only.
     *
     * Do some cycle collector work, with the given work budget.
     * The cost of calling Traverse() on a single object is set as 1.
     * For testing.
     */
    void ccSlice(in long long budget);

    /*
     * To be called from JS only.
     *
     * Return the longest cycle collector slice time since the last
     * time clearMaxCCTime() was called.
     */
    long getMaxCCSliceTimeSinceClear();

    /*
     * To be called from JS only.
     *
     * Reset the internal max slice time value used for
     * getMaxCCSliceTimeSinceClear().
     */
    void clearMaxCCTime();

    /*
     * To be called from JS only.
     *
     * Force an immediate shrinking garbage collection cycle.
     */
    [implicit_jscontext]
    void forceShrinkingGC();

    /*
     * Schedule a garbage collection cycle for a point in the future when no JS
     * is running. Call the provided function once this has occurred.
     */
    void schedulePreciseGC(in nsIScheduledGCCallback callback);

    /*
     * Schedule a shrinking garbage collection cycle for a point in the future
     * when no JS is running. Call the provided function once this has occured.
     */
    void schedulePreciseShrinkingGC(in nsIScheduledGCCallback callback);

    /*
     * In a debug build, unlink any ghost windows. This is only for debugging
     * leaks, and can cause bad things to happen if called.
     */
    void unlinkGhostWindows();

    /*
     * In an NS_FREE_PERMANENT_DATA build, intentionally leak a C++ object. This
     * is needed to test leak checking.
     */
    void intentionallyLeak();

    [implicit_jscontext]
    jsval getJSTestingFunctions();

    /**
     * Returns an object containing `filename` and `lineNumber` properties
     * describing the source location of the given function.
     */
    [implicit_jscontext]
    jsval getFunctionSourceLocation(in jsval func);

    /*
     * To be called from JS only.
     *
     * Call 'func', using the provided stack as the async stack responsible
     * for the call, and propagate its return value or the exception it throws.
     * The function is called with no arguments, and 'this' is 'undefined'.
     *
     * The code in the function will see the given stack frame as the
     * asyncCaller of its own stack frame, instead of the current caller.
     */
    [implicit_jscontext]
    jsval callFunctionWithAsyncStack(in jsval func, in nsIStackFrame stack,
                                     in AString asyncCause);

    /*
     * To be called from JS only.
     *
     * Returns the global object with which the given object is associated.
     *
     * @param obj The JavaScript object whose global is to be gotten.
     * @return the corresponding global.
     */
    [implicit_jscontext]
    jsval getGlobalForObject(in jsval obj);

    /*
     * To be called from JS only.
     *
     * Returns the true if the object is a (scripted) proxy.
     * NOTE: Security wrappers are unwrapped first before the check.
     */
    [implicit_jscontext]
    boolean isProxy(in jsval vobject);

    /*
     * To be called from JS only.
     *
     * Instead of simply wrapping a function into another compartment,
     * this helper function creates a native function in the target
     * compartment and forwards the call to the original function.
     * That call will be different than a regular JS function call in
     * that, the |this| is left unbound, and all the non-native JS
     * object arguments will be cloned using the structured clone
     * algorithm.
     * The return value is the new forwarder function, wrapped into
     * the caller's compartment.
     * The 3rd argument is an optional options object:
     * - defineAs: the name of the property that will
     *             be set on the target scope, with
     *             the forwarder function as the value.
     */
    [implicit_jscontext]
    jsval exportFunction(in jsval vfunction, in jsval vscope, [optional] in jsval voptions);

    /*
     * To be called from JS only.
     *
     * Returns an object created in |vobj|'s compartment.
     * If defineAs property on the options object is a non-null ID,
     * the new object will be added to vobj as a property. Also, the
     * returned new object is always automatically waived (see waiveXrays).
     */
    [implicit_jscontext]
    jsval createObjectIn(in jsval vobj, [optional] in jsval voptions);

    /*
     * To be called from JS only.
     *
     * Ensures that all functions come from vobj's scope (and aren't cross
     * compartment wrappers).
     */
    [implicit_jscontext]
    void makeObjectPropsNormal(in jsval vobj);

    /**
     * Determines whether this object is backed by a DeadObjectProxy.
     *
     * Dead-wrapper objects hold no other objects alive (they have no outgoing
     * reference edges) and will throw if you touch them (e.g. by
     * reading/writing a property).
     */
    bool isDeadWrapper(in jsval obj);

    /**
     * Determines whether this value is a remote object proxy, such as
     * RemoteWindowProxy or RemoteLocationProxy, for an out-of-process frame.
     *
     * Remote object proxies do not grant chrome callers the same exemptions
     * to the same-origin-policy that in-process wrappers typically do, so
     * this can be used to determine whether access to cross-origin proxies is
     * safe:
     *
     *   if (!Cu.isRemoteProxy(frame.contentWindow)) {
     *     frame.contentWindow.doCrossOriginThing();
     *   }
     */
    bool isRemoteProxy(in jsval val);

    /*
     * To be called from JS only. This is for Gecko internal use only, and may
     * disappear at any moment.
     *
     * Forces a recomputation of all wrappers in and out of the compartment
     * containing |vobj|. If |vobj| is not an object, all wrappers system-wide
     * are recomputed.
     */
    [implicit_jscontext]
    void recomputeWrappers([optional] in jsval vobj);

    /*
     * To be called from JS only. This is for Gecko internal use only, and may
     * disappear at any moment.
     *
     * Enables Xray vision for same-compartment access for the compartment
     * indicated by |vscope|. All outgoing wrappers are recomputed.
     *
     * This must not be called on chrome (system-principal) scopes.
     */
    [implicit_jscontext]
    void setWantXrays(in jsval vscope);

    /*
     * Dispatches a runnable to the current/main thread. If |scope| is passed,
     * the runnable will be dispatch in the compartment of |scope|, which
     * affects which error reporter gets called.
     */
    [implicit_jscontext]
    void dispatch(in jsval runnable, [optional] in jsval scope);

    // Returns true if we're running in automation and certain security
    // restrictions can be eased.
    readonly attribute boolean isInAutomation;

    // Called by automated tests to exit immediately after we are done getting
    // test results.
    void exitIfInAutomation();

    void crashIfNotInAutomation();

    [implicit_jscontext]
    void setGCZeal(in long zeal);

    [implicit_jscontext]
    void nukeSandbox(in jsval obj);

    /*
     * API to dynamically block script for a given global. This takes effect
     * immediately, unlike other APIs that only affect newly-created globals.
     *
     * The machinery here maintains a counter, and allows script only if each
     * call to blockScriptForGlobal() has been matched with a call to
     * unblockScriptForGlobal(). The caller _must_ make sure never to call
     * unblock() more times than it calls block(), since that could potentially
     * interfere with another consumer's script blocking.
     */

    [implicit_jscontext]
    void blockScriptForGlobal(in jsval global);

    [implicit_jscontext]
    void unblockScriptForGlobal(in jsval global);

    /**
     * Check whether the given object is an opaque wrapper (PermissiveXrayOpaque).
     */
    bool isOpaqueWrapper(in jsval obj);

    /**
     * Check whether the given object is an XrayWrapper.
     */
    bool isXrayWrapper(in jsval obj);

    /**
     * Waive Xray on a given value. Identity op for primitives.
     */
    [implicit_jscontext]
    jsval waiveXrays(in jsval aVal);

    /**
     * Strip off Xray waivers on a given value. Identity op for primitives.
     */
    [implicit_jscontext]
    jsval unwaiveXrays(in jsval aVal);

    /**
     * Gets the name of the JSClass of the object.
     *
     * if |aUnwrap| is true, all wrappers are unwrapped first. Unless you're
     * specifically trying to detect whether the object is a proxy, this is
     * probably what you want.
     */
    [implicit_jscontext]
    string getClassName(in jsval aObj, in bool aUnwrap);

    /**
     * Get a DOM classinfo for the given classname.  Only some class
     * names are supported.
     */
    nsIClassInfo getDOMClassInfo(in AString aClassName);

    /**
     * Gets the incument global for the execution of this function. For internal
     * and testing use only.
     *
     * If |callback| is passed, it is invoked with the incumbent global as its
     * sole argument. This allows the incumbent global to be measured in callback
     * environments with no scripted frames on the stack.
     */
    [implicit_jscontext]
    jsval getIncumbentGlobal([optional] in jsval callback);

    /**
     * Returns a name for the given function or object which is useful for
     * debugging. It will be very similar to the name displayed in call
     * stacks.

     * Objects which contain a single enumerable property which is a function
     * will generate a name based on that function. Any other non-function
     * objects will return "nonfunction".
     */
    [implicit_jscontext]
    ACString getDebugName(in jsval obj);

    /**
      * Retrieve the last time, in microseconds since epoch, that a given
      * watchdog-related event occured.
      *
      * Valid categories:
      *   "ContextStateChange"      - Context switching between active and inactive states
      *   "WatchdogWakeup"          - Watchdog waking up from sleeping
      *   "WatchdogHibernateStart"  - Watchdog begins hibernating
      *   "WatchdogHibernateStop"   - Watchdog stops hibernating
      */
    PRTime getWatchdogTimestamp(in AString aCategory);

    [implicit_jscontext]
    jsval getJSEngineTelemetryValue();

    /*
     * Clone an object into a scope.
     * The 3rd argument is an optional options object:
     * - cloneFunctions: boolean. If true, functions in the value are
     *   wrapped in a function forwarder that appears to be a native function in
     *   the content scope. Defaults to false.
     * - wrapReflectors: boolean. If true, DOM objects are passed through the
     *   clone directly with cross-compartment wrappers. Otherwise, the clone
     *   fails when such an object is encountered. Defaults to false.
     */
    [implicit_jscontext]
    jsval cloneInto(in jsval value, in jsval scope, [optional] in jsval options);

    /*
     * When C++-Implemented code does security checks, it can generally query
     * the subject principal (i.e. the principal of the most-recently-executed
     * script) in order to determine the responsible party. However, when an API
     * is implemented in JS, this doesn't work - the most-recently-executed
     * script is always the System-Principaled API implementation. So we need
     * another mechanism.
     *
     * Hence the notion of the "WebIDL Caller". If the current Entry Script on
     * the Script Settings Stack represents the invocation of JS-implemented
     * WebIDL, this API returns the principal of the caller at the time
     * of invocation. Otherwise (i.e. outside of JS-implemented WebIDL), this
     * function throws. If it throws, you probably shouldn't be using it.
     */
    nsIPrincipal getWebIDLCallerPrincipal();

    /*
     * Gets the principal of a script object, after unwrapping any cross-
     * compartment wrappers.
     */
    [implicit_jscontext]
    nsIPrincipal getObjectPrincipal(in jsval obj);

    /*
     * Gets the URI or identifier string associated with an object's
     * realm (the same one used by the memory reporter machinery).
     *
     * Unwraps cross-compartment wrappers first.
     *
     * The string formats and values may change at any time. Do not depend on
     * this from addon code.
     */
    [implicit_jscontext]
    ACString getRealmLocation(in jsval obj);

    /*
     * Return a fractional number of milliseconds from process
     * startup, measured with a monotonic clock.
     */
    double now();

    /*
     * Reads the given file and returns its contents. If called during early
     * startup, the file will be pre-read on a background thread during profile
     * startup so its contents will be available the next time they're read.
     *
     * The file must be a text file encoded in UTF-8. Otherwise the result is
     * undefined.
     */
    AUTF8String readUTF8File(in nsIFile file);

    /*
     * Reads the given local file URL and returns its contents. This has the
     * same semantics of readUTF8File.
     * Only supports file URLs or URLs that point into one of the omnijars.
     */
    AUTF8String readUTF8URI(in nsIURI url);

    /* Create a spellchecker object. */
    nsIEditorSpellCheck createSpellChecker();

    /* Create a commandline object.
     *
     * @return a new `nsICommandLine` instance.
     *
     * @param args
     *   The arguments of the command line, not including the app/program itself.
     * @param workingDir
     *   An optional working directory for the command line.
     * @param state
     *   The command line's state, one of `nsICommandLine.STATE_INITIAL_LAUNCH`,
     *   `nsICommandLine.STATE_REMOTE_AUTO`, or
     *   `nsICommandLine.STATE_REMOTE_EXPLICIT`.
     */
    nsISupports createCommandLine(in Array<ACString> args,
                                  in nsIFile workingDir,
                                  in unsigned long state);

    /* Create a command params object. */
    nsICommandParams createCommandParams();

    /* Create a loadcontext object. */
    nsILoadContext createLoadContext();

    /* Create a private loadcontext object. */
    nsILoadContext createPrivateLoadContext();

    /* Create a persistent property object. */
    nsIPersistentProperties createPersistentProperties();

    /* Create a document encoder object. */
    nsIDocumentEncoder createDocumentEncoder(in string contentType);

    /* Create an HTML copy encoder object. */
    nsIDocumentEncoder createHTMLCopyEncoder();

    // These attributes are for startup testing purposes. They are not expected
    // to be used for production code.

    // Array of the URI of JSM and ESM loaded, converting ESM URI into JSM URI.
    readonly attribute Array<ACString> loadedModules;

    // Array of the URI of JSM loaded.
    readonly attribute Array<ACString> loadedJSModules;

    // Array of the URI of ESM loaded.
    readonly attribute Array<ACString> loadedESModules;


    // This function will only return useful values if the
    // "browser.startup.record" preference was true at the time the JS file
    // was loaded.
    ACString getModuleImportStack(in AUTF8String aLocation);
};

/**
* Interface for the 'Components' object.
*/

[scriptable, builtinclass, uuid(aa28aaf6-70ce-4b03-9514-afe43c7dfda8)]
interface nsIXPCComponents : nsISupports
{
    readonly attribute nsIXPCComponents_Interfaces      interfaces;
    readonly attribute nsIXPCComponents_Results         results;

    boolean isSuccessCode(in nsresult result);

    readonly attribute nsIXPCComponents_Classes         classes;
    // Will return null if there is no JS stack right now.
    readonly attribute nsIStackFrame                    stack;
    readonly attribute nsIComponentManager              manager;
    readonly attribute nsIXPCComponents_Utils           utils;

    readonly attribute nsIXPCComponents_ID              ID;
    readonly attribute nsIXPCComponents_Exception       Exception;
    readonly attribute nsIXPCComponents_Constructor     Constructor;

    [implicit_jscontext]
    // A javascript component can set |returnCode| to specify an nsresult to
    // be returned without throwing an exception.
    attribute jsval                                     returnCode;
};