summaryrefslogtreecommitdiff
path: root/system/security/content/nsIContentSecurityPolicy.idl
diff options
context:
space:
mode:
authorMatt A. Tobin <email@mattatobin.com>2022-10-06 12:07:40 -0500
committerMatt A. Tobin <email@mattatobin.com>2022-10-06 12:07:40 -0500
commit6cdd0210fb14e8a1ed256e934f05f758afc4a6ab (patch)
treeae810fb774a340b2a3d4a0f8b6b9a68e6423e596 /system/security/content/nsIContentSecurityPolicy.idl
parente4ed223f80260aa735a77bc4cfff25b76f3e7a94 (diff)
parent14f8e3e2e95e86a995627add57bf71de7c7edcaa (diff)
downloadaura-central-TRUNK.tar.gz
Merge branch 'EXTERNAL' into TRUNKHEADTRUNK
Diffstat (limited to 'system/security/content/nsIContentSecurityPolicy.idl')
-rw-r--r--system/security/content/nsIContentSecurityPolicy.idl11
1 files changed, 7 insertions, 4 deletions
diff --git a/system/security/content/nsIContentSecurityPolicy.idl b/system/security/content/nsIContentSecurityPolicy.idl
index da4297f33..e76c39c44 100644
--- a/system/security/content/nsIContentSecurityPolicy.idl
+++ b/system/security/content/nsIContentSecurityPolicy.idl
@@ -252,9 +252,6 @@ interface nsIContentSecurityPolicy : nsISerializable
/**
* Checks if a specific directive permits loading of a URI.
*
- * NOTE: Calls to this may trigger violation reports when queried, so the
- * return value should not be cached.
- *
* @param aURI
* The URI about to be loaded or used.
* @param aDir
@@ -266,11 +263,17 @@ interface nsIContentSecurityPolicy : nsISerializable
* "false" allows CSP to fall back to default-src. This function
* behaves the same for both values of canUseDefault when querying
* directives that don't fall-back.
+ * @param aSendViolationReports
+ * If `true` and the uri is not allowed then trigger violation reports.
+ * This should be `false` for caching or preloads.
* @return
* Whether or not the provided URI is allowed by CSP under the given
* directive. (block the pending operation if false).
*/
- boolean permits(in nsIURI aURI, in CSPDirective aDir, in boolean aSpecific);
+ boolean permits(in nsIURI aURI,
+ in CSPDirective aDir,
+ in boolean aSpecific,
+ in boolean aSendViolationReports);
/**
* Delegate method called by the service when sub-elements of the protected