You've already forked lazarus-ccr
* Begin of version 2 of the geckoport package
In this new version the gecko-interfaces are generated directly from the idl-files of the gecko-sdk using the idlparser utility. The generated include files are kept as closely to the original as possible. For now by defaule Gecko 9 is used, as Gecko 10 has a bug which makes it impossible to embed it on Linux systems. git-svn-id: https://svn.code.sf.net/p/lazarus-ccr/svn@2349 8e941d3f-bd1b-0410-a28a-d453659cc2b4
This commit is contained in:
50
components/geckoport/version2/gecko10/nsiprincipal.inc
Normal file
50
components/geckoport/version2/gecko10/nsiprincipal.inc
Normal file
@@ -0,0 +1,50 @@
|
||||
type
|
||||
|
||||
nsIPrincipal = interface(nsISerializable)
|
||||
['{B406A2DB-E547-4C95-B8E2-AD09ECB54CE0}']
|
||||
procedure getPreferences(out prefBranch: PAnsiChar; out id: PAnsiChar; out asubjectName: PAnsiChar; out grantedList: PAnsiChar; out deniedList: PAnsiChar; out isTrusted: longbool); safecall;
|
||||
function equals(other: nsIPrincipal) : longbool; safecall;
|
||||
function equalsIgnoringDomain(other: nsIPrincipal) : longbool; safecall;
|
||||
function GethashValue(): idlulong; safecall;
|
||||
property hashValue : idlulong read GethashValue;
|
||||
function getJSPrincipals(cx: JSContext) : JSPrincipals; safecall;
|
||||
function GetsecurityPolicy(): voidPtr; safecall;
|
||||
procedure SetsecurityPolicy(asecurityPolicy: voidPtr); safecall;
|
||||
property securityPolicy : voidPtr read GetsecurityPolicy write SetsecurityPolicy;
|
||||
function canEnableCapability(capability: PAnsiChar) : idlshort; safecall;
|
||||
procedure setCanEnableCapability(capability: PAnsiChar; canEnable: idlshort); safecall;
|
||||
function isCapabilityEnabled(capability: PAnsiChar; annotation: voidPtr) : longbool; safecall;
|
||||
procedure enableCapability(capability: PAnsiChar; var annotation: voidPtr); safecall;
|
||||
procedure revertCapability(capability: PAnsiChar; var annotation: voidPtr); safecall;
|
||||
procedure disableCapability(capability: PAnsiChar; var annotation: voidPtr); safecall;
|
||||
function GetURI(): nsIURI; safecall;
|
||||
property URI : nsIURI read GetURI;
|
||||
function Getdomain(): nsIURI; safecall;
|
||||
procedure Setdomain(adomain: nsIURI); safecall;
|
||||
property domain : nsIURI read Getdomain write Setdomain;
|
||||
function Getorigin(): PAnsiChar; safecall;
|
||||
property origin : PAnsiChar read Getorigin;
|
||||
function GethasCertificate(): longbool; safecall;
|
||||
property hasCertificate : longbool read GethasCertificate;
|
||||
function Getfingerprint(): AUTF8String; safecall;
|
||||
property fingerprint : AUTF8String read Getfingerprint;
|
||||
function GetprettyName(): AUTF8String; safecall;
|
||||
property prettyName : AUTF8String read GetprettyName;
|
||||
function subsumes(other: nsIPrincipal) : longbool; safecall;
|
||||
procedure checkMayLoad(anuri: nsIURI; report: longbool); safecall;
|
||||
function GetsubjectName(): AUTF8String; safecall;
|
||||
property subjectName : AUTF8String read GetsubjectName;
|
||||
function Getcertificate(): nsISupports; safecall;
|
||||
property certificate : nsISupports read Getcertificate;
|
||||
function Getcsp(): nsIContentSecurityPolicy; safecall;
|
||||
procedure Setcsp(acsp: nsIContentSecurityPolicy); safecall;
|
||||
property csp : nsIContentSecurityPolicy read Getcsp write Setcsp;
|
||||
|
||||
end;
|
||||
|
||||
const
|
||||
nsIPrincipal_ENABLE_DENIED=1;
|
||||
nsIPrincipal_ENABLE_UNKNOWN=2;
|
||||
nsIPrincipal_ENABLE_WITH_USER_PERMISSION=3;
|
||||
nsIPrincipal_ENABLE_GRANTED=4;
|
||||
|
Reference in New Issue
Block a user