Mozilla/mozilla/modules/oji/src/nsCSecurityContext.cpp
Jerry.Kirk%Nexwarecorp.com 883a9cae70 Remove #includes of libmocha.h and libevent.h which according to Shaver
don't need to be there. I noticed this problem under Neutrino because
these header files also use "uint" which was undefined.
b=23041 r=jst@citec.fr


git-svn-id: svn://10.0.0.236/trunk@56746 18797224-902f-48f8-a5cc-f745e15eee43
2000-01-04 20:40:09 +00:00

110 lines
3.2 KiB
C++

/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*-
*
* The contents of this file are subject to the Netscape Public
* License Version 1.1 (the "License"); you may not use this file
* except in compliance with the License. You may obtain a copy of
* the License at http://www.mozilla.org/NPL/
*
* Software distributed under the License is distributed on an "AS
* IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
* implied. See the License for the specific language governing
* rights and limitations under the License.
*
* The Original Code is mozilla.org code.
*
* The Initial Developer of the Original Code is Netscape
* Communications Corporation. Portions created by Netscape are
* Copyright (C) 1998 Netscape Communications Corporation. All
* Rights Reserved.
*
* Contributor(s):
*/
/*
*
* It contains the implementation providing nsISecurityCOntext XP-COM interface.
* This file snapshots a JS frame before entering into java.
*
*/
#include <stdlib.h>
#include <string.h>
#include "prtypes.h"
#include "jscntxt.h"
#include "jsdbgapi.h"
#include "nsCSecurityContext.h"
#include "jvmmgr.h"
static NS_DEFINE_IID(kISecurityContextIID, NS_ISECURITYCONTEXT_IID);
static NS_DEFINE_IID(kISupportsIID, NS_ISUPPORTS_IID);
////////////////////////////////////////////////////////////////////////////
// from nsISupports
// Thes macro expands to the aggregated query interface scheme.
NS_IMPL_ADDREF(nsCSecurityContext);
NS_IMPL_RELEASE(nsCSecurityContext);
NS_METHOD
nsCSecurityContext::QueryInterface(const nsIID& aIID, void** aInstancePtr)
{
if (NULL == aInstancePtr) {
return NS_ERROR_NULL_POINTER;
}
*aInstancePtr = NULL;
if (aIID.Equals(kISecurityContextIID) ||
aIID.Equals(kISupportsIID)) {
*aInstancePtr = (nsISecurityContext*) this;
AddRef();
return NS_OK;
}
return NS_NOINTERFACE;
}
////////////////////////////////////////////////////////////////////////////
// from nsISecurityContext:
NS_METHOD
nsCSecurityContext::Implies(const char* target, const char* action, PRBool *bAllowedAccess)
{
//NOTE: Test purpose only. Turn this on if you do not want security stack walking code.
//*bAllowedAccess = PR_TRUE;
//if(1)
//return NS_OK;
if(m_pJStoJavaFrame == NULL)
{
*bAllowedAccess = PR_FALSE;
return NS_OK;
}
JSStackFrame** startFrame = JVM_GetStartJSFrameFromParallelStack();
*startFrame = m_pJStoJavaFrame; // This updates the TLS start frame for a brief period
// until the following code runs.
/*
** TODO: Get a new API from Tom.
** bAllowedAccess = LM_CanAccessTargetStr(m_pJSCX, target);
*/
*startFrame = NULL;
return NS_OK;
}
////////////////////////////////////////////////////////////////////////////
// from nsCSecurityContext:
extern PRUintn tlsIndex3_g;
nsCSecurityContext::nsCSecurityContext(JSContext* cx)
: m_pJStoJavaFrame(NULL), m_pJSCX(NULL)
{
NS_INIT_REFCNT();
JSStackFrame *fp = NULL;
m_pJStoJavaFrame = JS_FrameIterator(cx, &fp);
m_pJSCX = cx;
}
nsCSecurityContext::~nsCSecurityContext()
{
}