/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- * * ***** BEGIN LICENSE BLOCK ***** * Version: MPL 1.1/GPL 2.0/LGPL 2.1 * * The contents of this file are subject to the Mozilla Public License Version * 1.1 (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * http://www.mozilla.org/MPL/ * * Software distributed under the License is distributed on an "AS IS" basis, * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License * for the specific language governing rights and limitations under the * License. * * The Original Code is Mozilla Communicator client code, released * March 31, 1998. * * The Initial Developer of the Original Code is * Netscape Communications Corporation. * Portions created by the Initial Developer are Copyright (C) 1998 * the Initial Developer. All Rights Reserved. * * Contributor(s): * * Alternatively, the contents of this file may be used under the terms of * either of the GNU General Public License Version 2 or later (the "GPL"), * or the GNU Lesser General Public License Version 2.1 or later (the "LGPL"), * in which case the provisions of the GPL or the LGPL are applicable instead * of those above. If you wish to allow use of your version of this file only * under the terms of either the GPL or the LGPL, and not to allow others to * use your version of this file under the terms of the MPL, indicate your * decision by deleting the provisions above and replace them with the notice * and other provisions required by the GPL or the LGPL. If you do not delete * the provisions above, a recipient may use your version of this file under * the terms of any one of the MPL, the GPL or the LGPL. * * ***** END LICENSE BLOCK ***** */ /* * This file is part of the Java-vendor-neutral implementation of LiveConnect * * It contains the public XP-COM based interface for java to javascript communication. * This interface allows java and javascript to exchange security contexts to allow * access to restricted resources on either side. * */ #ifndef nsISecurityContext_h___ #define nsISecurityContext_h___ #include "nsISupports.h" #define NS_ISECURITYCONTEXT_IID \ { /* {209B1120-4C41-11d2-A1CB-00805F8F694D} */ \ 0x209b1120, \ 0x4c41, \ 0x11d2, \ { 0xa1, 0xcb, 0x0, 0x80, 0x5f, 0x8f, 0x69, 0x4d } \ } class nsISecurityContext : public nsISupports { public: NS_DECLARE_STATIC_IID_ACCESSOR(NS_ISECURITYCONTEXT_IID) /** * Get the security context to be used in LiveConnect. * This is used for JavaScript <--> Java. * * @param target -- Possible target. * @param action -- Possible action on the target. * @return -- NS_OK if the target and action is permitted on the security context. * -- NS_FALSE otherwise. */ NS_IMETHOD Implies(const char* target, const char* action, PRBool *bAllowedAccess) = 0; /** * Get the origin associated with the context. * * @param buf -- Result buffer (managed by the caller.) * @param len -- Buffer length. * @return -- NS_OK if the codebase string was obtained. * -- NS_FALSE otherwise. */ NS_IMETHOD GetOrigin(char* buf, int len) = 0; /** * Get the certificate associated with the context. * * @param buf -- Result buffer (managed by the caller.) * @param len -- Buffer length. * @return -- NS_OK if the codebase string was obtained. * -- NS_FALSE otherwise. */ NS_IMETHOD GetCertificateID(char* buf, int len) = 0; }; NS_DEFINE_STATIC_IID_ACCESSOR(nsISecurityContext, NS_ISECURITYCONTEXT_IID) // Supported targets in Netscape Navigator 4.0 (Communicator): #define nsSecurityTarget_UniversalThreadAccess "UniversalThreadAccess" // allows manipulation of threads not belonging to the applet #define nsSecurityTarget_UniversalExecAccess "UniversalExecAccess" // allows executing sub-processes #define nsSecurityTarget_UniversalExitAccess "UniversalExitAccess" // allows terminating the browser session #define nsSecurityTarget_UniversalLinkAccess "UniversalLinkAccess" // allows linking to dymanically loaded libraries (DLLs) #define nsSecurityTarget_UniversalPropertyWrite "UniversalPropertyWrite" // allows reading and writing of all system properties (vs. restrictions on applets) #define nsSecurityTarget_UniversalPropertyRead "UniversalPropertyRead" // allows reading of all system properties (vs. restrictions on applets) #define nsSecurityTarget_UniversalFileRead "UniversalFileRead" // allows reading any file in the local filesystem #define nsSecurityTarget_UniversalFileWrite "UniversalFileWrite" // allows writing any file in the local filesystem #define nsSecurityTarget_UniversalFileDelete "UniversalFileDelete" // allows deleting of any file in the local filesystem #define nsSecurityTarget_UniversalFdRead "UniversalFdRead" // allows reading from any arbitrary file descriptor #define nsSecurityTarget_UniversalFdWrite "UniversalFdWrite" // allows writing to any arbitrary file descriptor #define nsSecurityTarget_UniversalListen "UniversalListen" // allows establishing the server-side of a network connection #define nsSecurityTarget_UniversalAccept "UniversalAccept" // allows waiting on a network connection #define nsSecurityTarget_UniversalConnect "UniversalConnect" // allows establishing the client-side of a network connection #define nsSecurityTarget_UniversalMulticast "UniversalMulticast" // allows establishing IP multicast a network connection #define nsSecurityTarget_UniversalTopLevelWindow "UniversalTopLevelWindow" // allows top-level windows to be created by the applet writer. #define nsSecurityTarget_UniversalPackageAccess "UniversalPackageAccess" // allows access to java packages #define nsSecurityTarget_UniversalPackageDefinition "UniversalPackageDefinition" // allows access to define packages #define nsSecurityTarget_UniversalSetFactory "UniversalSetFactory" // allows access to set a networking-related object factory #define nsSecurityTarget_UniversalMemberAccess "UniversalMemberAccess" // allows access to members of a class #define nsSecurityTarget_UniversalPrintJobAccess "UniversalPrintJobAccess" // allows access to initiate a print job request #define nsSecurityTarget_UniversalSystemClipboardAccess "UniversalSystemClipboardAccess" // allows access to System Clipboard #define nsSecurityTarget_UniversalAwtEventQueueAccess "UniversalAwtEventQueueAccess" // allows access to Awt's EventQueue #define nsSecurityTarget_UniversalSecurityProvider "UniversalSecurityProvider" // allows access to certain operations to a given provider, for example, only a given provider (e.g. Netscape) is able to retrieve the Netscape provider properties #define nsSecurityTarget_UniversalBrowserRead "UniversalBrowserRead" // allows access to browser data #define nsSecurityTarget_UniversalBrowserWrite "UniversalBrowserWrite" // allows modification of browser data #define nsSecurityTarget_UniversalSendMail "UniversalSendMail" // allows sending mail #define nsSecurityTarget_SuperUser "SuperUser" // enables all privileges #define nsSecurityTarget_30Capabilities "30Capabilities" // enables all privileges that are available in Navigator 3.0. #define nsSecurityTarget_UniversalFileAccess "UniversalFileAccess" // enables read, write and delete of any file in the local filesystem #define nsSecurityTarget_TerminalEmulator "TerminalEmulator" // enables socket connections, property read and to link dynamic libraries. #endif // nsISecurityContext_h___