gecko/toolkit/modules/RemoteAddonsParent.jsm

130 lines
4.4 KiB
JavaScript

// -*- Mode: javascript; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*-
// This Source Code Form is subject to the terms of the Mozilla Public
// License, v. 2.0. If a copy of the MPL was not distributed with this
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
this.EXPORTED_SYMBOLS = ["RemoteAddonsParent"];
const Ci = Components.interfaces;
const Cc = Components.classes;
const Cu = Components.utils;
Cu.import("resource://gre/modules/XPCOMUtils.jsm");
Cu.import('resource://gre/modules/Services.jsm');
/**
* This code listens for nsIContentPolicy hooks firing in child
* processes. It then fires all hooks in the parent process and
* returns the result to the child.
*/
let ContentPolicyParent = {
/**
* Some builtin policies will have already run in the child, and
* there's no reason to run them in the parent. This is a list of
* those policies. We assume that all child processes have the same
* set of built-in policies.
*/
_policiesToIgnore: [],
init: function() {
let ppmm = Cc["@mozilla.org/parentprocessmessagemanager;1"]
.getService(Ci.nsIMessageBroadcaster);
ppmm.addMessageListener("Addons:ContentPolicy:IgnorePolicies", this);
ppmm.addMessageListener("Addons:ContentPolicy:Run", this);
Services.obs.addObserver(this, "xpcom-category-entry-added", true);
Services.obs.addObserver(this, "xpcom-category-entry-removed", true);
},
observe: function(aSubject, aTopic, aData) {
switch (aTopic) {
case "xpcom-category-entry-added":
case "xpcom-category-entry-removed":
if (aData == "content-policy")
this.updatePolicies();
break;
}
},
/**
* There's no need for the child process to inform us about the
* shouldLoad hook if we don't have any policies in the parent to
* run. This code iterates over the parent's policies, looking for
* ones that should not be ignored. Based on that, it tells the
* children whether it needs to be informed about the shouldLoad
* hook.
*/
updatePolicies: function() {
let needHook = false;
let services = Cc["@mozilla.org/categorymanager;1"].getService(Ci.nsICategoryManager)
.enumerateCategory("content-policy");
while (services.hasMoreElements()) {
let item = services.getNext();
let name = item.QueryInterface(Components.interfaces.nsISupportsCString).toString();
if (this._policiesToIgnore.indexOf(name) == -1) {
needHook = true;
break;
}
}
let ppmm = Cc["@mozilla.org/parentprocessmessagemanager;1"]
.getService(Ci.nsIMessageBroadcaster);
ppmm.broadcastAsyncMessage("Addons:ContentPolicy:NeedHook", { needed: needHook });
},
receiveMessage: function (aMessage) {
switch (aMessage.name) {
case "Addons:ContentPolicy:IgnorePolicies":
this._policiesToIgnore = aMessage.data.policies;
this.updatePolicies();
break;
case "Addons:ContentPolicy:Run":
return this.shouldLoad(aMessage.data, aMessage.objects);
break;
}
},
shouldLoad: function(aData, aObjects) {
let services = Cc["@mozilla.org/categorymanager;1"].getService(Ci.nsICategoryManager)
.enumerateCategory("content-policy");
while (services.hasMoreElements()) {
let item = services.getNext();
let name = item.QueryInterface(Components.interfaces.nsISupportsCString).toString();
if (this._policiesToIgnore.indexOf(name) != -1)
continue;
let policy = Cc[name].getService(Ci.nsIContentPolicy);
try {
let result = policy.shouldLoad(aData.contentType,
aObjects.contentLocation,
aObjects.requestOrigin,
aObjects.node,
aData.mimeTypeGuess,
null);
if (result != Ci.nsIContentPolicy.ACCEPT && result != 0)
return result;
} catch (e) {}
}
return Ci.nsIContentPolicy.ACCEPT;
},
QueryInterface: XPCOMUtils.generateQI([Ci.nsIObserver, Ci.nsISupportsWeakReference]),
};
let RemoteAddonsParent = {
initialized: false,
init: function() {
if (this.initialized)
return;
this.initialized = true;
ContentPolicyParent.init();
},
};