This file is indexed.

/usr/share/idl/thunderbird/nsIParentalControlsService.idl is in thunderbird-dev 1:52.8.0-1~deb8u1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */


#include "nsISupports.idl"

interface nsIURI;
interface nsIFile;
interface nsIInterfaceRequestor;
interface nsIArray;

[scriptable, uuid(2e97e5dd-467b-4aea-a1bb-6773c0f2beb0)]
interface nsIParentalControlsService : nsISupports
{
  /**
   * Action types that can be blocked for users.
   */
  const short DOWNLOAD = 1; // Downloading files
  const short INSTALL_EXTENSION = 2; // Installing extensions
  const short INSTALL_APP = 3; // Installing webapps
  const short BROWSE = 4; // Opening specific urls
  const short SHARE = 5; // Sharing
  const short BOOKMARK = 6; // Creating bookmarks
  const short ADD_CONTACT = 7; // Add contacts to the system database
  const short SET_IMAGE = 8; // Setting images as wall paper
  const short MODIFY_ACCOUNTS = 9; // Modifying system accounts
  const short REMOTE_DEBUGGING = 10; // Remote debugging
  const short IMPORT_SETTINGS = 11; // Importing settings from other apps
  const short PRIVATE_BROWSING = 12; // Disallow usage of private browsing
  const short DATA_CHOICES = 13; // Choose whether or not to send usage information
  const short CLEAR_HISTORY = 14; // Clear browsing history
  const short MASTER_PASSWORD = 15; // Setting master password for logins
  const short GUEST_BROWSING = 16; // Disallow usage of guest browsing
  const short ADVANCED_SETTINGS = 17; // Advanced settings
  const short CAMERA_MICROPHONE = 18; // Camera and microphone (WebRTC)
  const short BLOCK_LIST = 19; // Block websites that include sensitive content
  const short TELEMETRY = 20; // Submit telemetry data
  const short HEALTH_REPORT = 21; // Submit FHR data
  const short DEFAULT_THEME = 22; // Use default theme or a special parental controls theme

  /**
   * @returns true if the current user account has parental controls
   * restrictions enabled.
   */
  readonly attribute boolean parentalControlsEnabled;

  /**
   * @returns true if the current user account parental controls
   * restrictions include the blocking of all file downloads.
   */ 
  readonly attribute boolean blockFileDownloadsEnabled;

  /**
   * Check if the user can do the prescibed action for this uri.
   *
   * @param aAction             Action being performed
   * @param aUri                The uri requesting this action
   * @param aWindow             The window generating this event.
   */
   boolean isAllowed(in short aAction, [optional] in nsIURI aUri);

  /**
   * Request that blocked URI(s) be allowed through parental
   * control filters. Returns true if the URI was successfully
   * overriden. Note, may block while native UI is shown.
   *
   * @param aTarget(s)          URI to be overridden. In the case of
   *                            multiple URI, the first URI in the array
   *                            should be the root URI of the site.
   * @param window              Window that generates the event.
   */
  boolean requestURIOverride(in nsIURI aTarget, [optional] in nsIInterfaceRequestor aWindowContext);
  boolean requestURIOverrides(in nsIArray aTargets, [optional] in nsIInterfaceRequestor aWindowContext);

  /**
   * @returns true if the current user account has parental controls
   * logging enabled. If true, applications should log relevent events
   * using 'log'.
   */ 
  readonly attribute boolean loggingEnabled;

  /**
   * Log entry types. Additional types can be defined and implemented
   * as needed. Other possible event types might include email events,
   * media related events, and IM events. 
   */
  const short ePCLog_URIVisit = 1;    /* Web content */
  const short ePCLog_FileDownload = 2;  /* File downloads */

  /**
   * Log an application specific parental controls
   * event.
   *
   * @param aEntryType       Constant defining the type of event.
   * @param aFlag            A flag indicating if the subject content
   *                         was blocked.
   * @param aSource          The URI source of the subject content.
   * @param aTarget          The location the content was saved to if
   *                         no blocking occurred.
   */
  void log(in short aEntryType, in boolean aFlag, in nsIURI aSource, [optional] in nsIFile aTarget);
};