mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
129 lines
4.9 KiB
JavaScript
129 lines
4.9 KiB
JavaScript
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
* You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
"use strict";
|
|
|
|
function debug(aMsg) {
|
|
//dump("-*- PermissionSettings.js: " + aMsg + "\n");
|
|
}
|
|
|
|
const Cc = Components.classes;
|
|
const Ci = Components.interfaces;
|
|
const Cu = Components.utils;
|
|
|
|
Cu.import("resource://gre/modules/XPCOMUtils.jsm");
|
|
Cu.import("resource://gre/modules/Services.jsm");
|
|
Cu.import("resource://gre/modules/PermissionsTable.jsm");
|
|
|
|
var cpm = Cc["@mozilla.org/childprocessmessagemanager;1"].getService(Ci.nsISyncMessageSender);
|
|
|
|
// PermissionSettings
|
|
|
|
const PERMISSIONSETTINGS_CONTRACTID = "@mozilla.org/permissionSettings;1";
|
|
const PERMISSIONSETTINGS_CID = Components.ID("{18390770-02ab-11e2-a21f-0800200c9a66}");
|
|
const nsIDOMPermissionSettings = Ci.nsIDOMPermissionSettings;
|
|
|
|
function PermissionSettings()
|
|
{
|
|
debug("Constructor");
|
|
}
|
|
|
|
XPCOMUtils.defineLazyServiceGetter(this,
|
|
"permissionManager",
|
|
"@mozilla.org/permissionmanager;1",
|
|
"nsIPermissionManager");
|
|
|
|
XPCOMUtils.defineLazyServiceGetter(this,
|
|
"secMan",
|
|
"@mozilla.org/scriptsecuritymanager;1",
|
|
"nsIScriptSecurityManager");
|
|
|
|
XPCOMUtils.defineLazyServiceGetter(this,
|
|
"appsService",
|
|
"@mozilla.org/AppsService;1",
|
|
"nsIAppsService");
|
|
|
|
PermissionSettings.prototype = {
|
|
get: function get(aPermName, aManifestURL, aOrigin, aBrowserFlag) {
|
|
debug("Get called with: " + aPermName + ", " + aManifestURL + ", " + aOrigin + ", " + aBrowserFlag);
|
|
let uri = Services.io.newURI(aOrigin, null, null);
|
|
let appID = appsService.getAppLocalIdByManifestURL(aManifestURL);
|
|
let principal = secMan.getAppCodebasePrincipal(uri, appID, aBrowserFlag);
|
|
let result = permissionManager.testExactPermissionFromPrincipal(principal, aPermName);
|
|
|
|
switch (result)
|
|
{
|
|
case Ci.nsIPermissionManager.UNKNOWN_ACTION:
|
|
return "unknown";
|
|
case Ci.nsIPermissionManager.ALLOW_ACTION:
|
|
return "allow";
|
|
case Ci.nsIPermissionManager.DENY_ACTION:
|
|
return "deny";
|
|
case Ci.nsIPermissionManager.PROMPT_ACTION:
|
|
return "prompt";
|
|
default:
|
|
dump("Unsupported PermissionSettings Action!\n");
|
|
return "unknown";
|
|
}
|
|
},
|
|
|
|
isExplicit: function isExplicit(aPermName, aManifestURL, aOrigin,
|
|
aBrowserFlag) {
|
|
debug("isExplicit: " + aPermName + ", " + aManifestURL + ", " + aOrigin);
|
|
let uri = Services.io.newURI(aOrigin, null, null);
|
|
let appID = appsService.getAppLocalIdByManifestURL(aManifestURL);
|
|
let principal = secMan.getAppCodebasePrincipal(uri, appID, aBrowserFlag);
|
|
|
|
return isExplicitInPermissionsTable(aPermName, principal.appStatus);
|
|
},
|
|
|
|
set: function set(aPermName, aPermValue, aManifestURL, aOrigin,
|
|
aBrowserFlag) {
|
|
debug("Set called with: " + aPermName + ", " + aManifestURL + ", " +
|
|
aOrigin + ", " + aPermValue + ", " + aBrowserFlag);
|
|
let action;
|
|
// Check for invalid calls so that we throw an exception rather than get
|
|
// killed by parent process
|
|
if (aPermValue === "unknown" ||
|
|
!this.isExplicit(aPermName, aManifestURL, aOrigin, aBrowserFlag)) {
|
|
let errorMsg = "PermissionSettings.js: '" + aPermName + "'" +
|
|
" is an implicit permission for '" + aManifestURL+"'";
|
|
Cu.reportError(errorMsg);
|
|
throw new Components.Exception(errorMsg);
|
|
}
|
|
|
|
cpm.sendSyncMessage("PermissionSettings:AddPermission", {
|
|
type: aPermName,
|
|
origin: aOrigin,
|
|
manifestURL: aManifestURL,
|
|
value: aPermValue,
|
|
browserFlag: aBrowserFlag
|
|
});
|
|
},
|
|
|
|
init: function init(aWindow) {
|
|
debug("init");
|
|
|
|
// Set navigator.mozPermissionSettings to null.
|
|
let perm = Services.perms.testExactPermissionFromPrincipal(aWindow.document.nodePrincipal, "permissions");
|
|
if (!Services.prefs.getBoolPref("dom.mozPermissionSettings.enabled")
|
|
|| perm != Ci.nsIPermissionManager.ALLOW_ACTION) {
|
|
return null;
|
|
}
|
|
|
|
debug("Permission to get/set permissions granted!");
|
|
},
|
|
|
|
classID : PERMISSIONSETTINGS_CID,
|
|
QueryInterface : XPCOMUtils.generateQI([nsIDOMPermissionSettings, Ci.nsIDOMGlobalPropertyInitializer]),
|
|
|
|
classInfo : XPCOMUtils.generateCI({classID: PERMISSIONSETTINGS_CID,
|
|
contractID: PERMISSIONSETTINGS_CONTRACTID,
|
|
classDescription: "PermissionSettings",
|
|
interfaces: [nsIDOMPermissionSettings],
|
|
flags: Ci.nsIClassInfo.DOM_OBJECT})
|
|
}
|
|
|
|
this.NSGetFactory = XPCOMUtils.generateNSGetFactory([PermissionSettings])
|