gecko/toolkit/components/utils/simpleServices.js

258 lines
7.9 KiB
JavaScript

/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
/*
* Dumping ground for simple services for which the isolation of a full global
* is overkill. Be careful about namespace pollution, and be mindful about
* importing lots of JSMs in global scope, since this file will almost certainly
* be loaded from enough callsites that any such imports will always end up getting
* eagerly loaded at startup.
*/
"use strict";
const Cc = Components.classes;
const Cu = Components.utils;
const Ci = Components.interfaces;
const Cr = Components.results;
Cu.import("resource://gre/modules/XPCOMUtils.jsm");
XPCOMUtils.defineLazyModuleGetter(this, "NetUtil",
"resource://gre/modules/NetUtil.jsm");
XPCOMUtils.defineLazyModuleGetter(this, "Services",
"resource://gre/modules/Services.jsm");
function RemoteTagServiceService()
{
}
RemoteTagServiceService.prototype = {
classID: Components.ID("{dfd07380-6083-11e4-9803-0800200c9a66}"),
QueryInterface: XPCOMUtils.generateQI([Ci.nsIRemoteTagService, Ci.nsISupportsWeakReference]),
/**
* CPOWs can have user data attached to them. This data originates
* in the local process from this function, getRemoteObjectTag. It's
* sent along with the CPOW to the remote process, where it can be
* fetched with Components.utils.getCrossProcessWrapperTag.
*/
getRemoteObjectTag: function(target) {
if (target instanceof Ci.nsIDocShellTreeItem) {
return "ContentDocShellTreeItem";
}
if (target instanceof Ci.nsIDOMDocument) {
return "ContentDocument";
}
return "generic";
}
};
function AddonPolicyService()
{
this.wrappedJSObject = this;
this.mayLoadURICallbacks = new Map();
this.localizeCallbacks = new Map();
}
AddonPolicyService.prototype = {
classID: Components.ID("{89560ed3-72e3-498d-a0e8-ffe50334d7c5}"),
QueryInterface: XPCOMUtils.generateQI([Ci.nsIAddonPolicyService]),
/*
* Invokes a callback (if any) associated with the addon to determine whether
* unprivileged code running within the addon is allowed to perform loads from
* the given URI.
*
* @see nsIAddonPolicyService.addonMayLoadURI
*/
addonMayLoadURI(aAddonId, aURI) {
let cb = this.mayLoadURICallbacks.get(aAddonId);
return cb ? cb(aURI) : false;
},
/*
* Invokes a callback (if any) associated with the addon to loclaize a
* resource belonging to that add-on.
*/
localizeAddonString(aAddonId, aString) {
let cb = this.localizeCallbacks.get(aAddonId);
return cb ? cb(aString) : aString;
},
/*
* Invokes a callback (if any) to determine if an extension URI should be
* web-accessible.
*
* @see nsIAddonPolicyService.extensionURILoadableByAnyone
*/
extensionURILoadableByAnyone(aURI) {
if (aURI.scheme != "moz-extension") {
throw new TypeError("non-extension URI passed");
}
let cb = this.extensionURILoadCallback;
return cb ? cb(aURI) : false;
},
/*
* Maps an extension URI to an addon ID.
*
* @see nsIAddonPolicyService.extensionURIToAddonId
*/
extensionURIToAddonId(aURI) {
if (aURI.scheme != "moz-extension") {
throw new TypeError("non-extension URI passed");
}
let cb = this.extensionURIToAddonIdCallback;
if (!cb) {
throw new Error("no callback set to map extension URIs to addon Ids");
}
return cb(aURI);
},
/*
* Sets the callbacks used in addonMayLoadURI above. Not accessible over
* XPCOM - callers should use .wrappedJSObject on the service to call it
* directly.
*/
setAddonLoadURICallback(aAddonId, aCallback) {
if (aCallback) {
this.mayLoadURICallbacks.set(aAddonId, aCallback);
} else {
this.mayLoadURICallbacks.delete(aAddonId);
}
},
/*
* Sets the callbacks used by the stream converter service to localize
* add-on resources.
*/
setAddonLocalizeCallback(aAddonId, aCallback) {
if (aCallback) {
this.localizeCallbacks.set(aAddonId, aCallback);
} else {
this.localizeCallbacks.delete(aAddonId);
}
},
/*
* Sets the callback used in extensionURILoadableByAnyone above. Not
* accessible over XPCOM - callers should use .wrappedJSObject on the
* service to call it directly.
*/
setExtensionURILoadCallback(aCallback) {
var old = this.extensionURILoadCallback;
this.extensionURILoadCallback = aCallback;
return old;
},
/*
* Sets the callback used in extensionURIToAddonId above. Not accessible over
* XPCOM - callers should use .wrappedJSObject on the service to call it
* directly.
*/
setExtensionURIToAddonIdCallback(aCallback) {
var old = this.extensionURIToAddonIdCallback;
this.extensionURIToAddonIdCallback = aCallback;
return old;
}
};
/*
* This class provides a stream filter for locale messages in CSS files served
* by the moz-extension: protocol handler.
*
* See SubstituteChannel in netwerk/protocol/res/ExtensionProtocolHandler.cpp
* for usage.
*/
function AddonLocalizationConverter()
{
this.aps = Cc["@mozilla.org/addons/policy-service;1"].getService(Ci.nsIAddonPolicyService)
.wrappedJSObject;
}
AddonLocalizationConverter.prototype = {
classID: Components.ID("{ded150e3-c92e-4077-a396-0dba9953e39f}"),
QueryInterface: XPCOMUtils.generateQI([Ci.nsIStreamConverter]),
FROM_TYPE: "application/vnd.mozilla.webext.unlocalized",
TO_TYPE: "text/css",
checkTypes(aFromType, aToType) {
if (aFromType != this.FROM_TYPE) {
throw Components.Exception("Invalid aFromType value", Cr.NS_ERROR_INVALID_ARG,
Components.stack.caller.caller);
}
if (aToType != this.TO_TYPE) {
throw Components.Exception("Invalid aToType value", Cr.NS_ERROR_INVALID_ARG,
Components.stack.caller.caller);
}
},
// aContext must be a nsIURI object for a valid moz-extension: URL.
getAddonId(aContext) {
// In this case, we want the add-on ID even if the URL is web accessible,
// so check the root rather than the exact path.
let uri = Services.io.newURI("/", null, aContext);
let id = this.aps.extensionURIToAddonId(uri);
if (id == undefined) {
throw new Components.Exception("Invalid context", Cr.NS_ERROR_INVALID_ARG);
}
return id;
},
convertToStream(aAddonId, aString) {
let stream = Cc["@mozilla.org/io/string-input-stream;1"]
.createInstance(Ci.nsIStringInputStream);
stream.data = this.aps.localizeAddonString(aAddonId, aString);
return stream;
},
convert(aStream, aFromType, aToType, aContext) {
this.checkTypes(aFromType, aToType);
let addonId = this.getAddonId(aContext);
let string = NetUtil.readInputStreamToString(aStream, aStream.available());
return this.convertToStream(addonId, string);
},
asyncConvertData(aFromType, aToType, aListener, aContext) {
this.checkTypes(aFromType, aToType);
this.addonId = this.getAddonId(aContext);
this.listener = aListener;
},
onStartRequest(aRequest, aContext) {
this.parts = [];
},
onDataAvailable(aRequest, aContext, aInputStream, aOffset, aCount) {
this.parts.push(NetUtil.readInputStreamToString(aInputStream, aCount));
},
onStopRequest(aRequest, aContext, aStatusCode) {
try {
this.listener.onStartRequest(aRequest, null);
if (Components.isSuccessCode(aStatusCode)) {
let string = this.parts.join("");
let stream = this.convertToStream(this.addonId, string);
this.listener.onDataAvailable(aRequest, null, stream, 0, stream.data.length);
}
} catch (e) {
aStatusCode = e.result || Cr.NS_ERROR_FAILURE;
}
this.listener.onStopRequest(aRequest, null, aStatusCode);
},
};
this.NSGetFactory = XPCOMUtils.generateNSGetFactory([RemoteTagServiceService, AddonPolicyService,
AddonLocalizationConverter]);