2014-09-26 09:54:34 +04:00
|
|
|
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
|
|
|
|
this.EXPORTED_SYMBOLS = ["PermissionsUtils"];
|
|
|
|
|
|
|
|
const {classes: Cc, interfaces: Ci, utils: Cu, results: Cr} = Components;
|
|
|
|
|
|
|
|
Cu.import("resource://gre/modules/Services.jsm");
|
2015-06-16 22:33:26 +03:00
|
|
|
Cu.import("resource://gre/modules/BrowserUtils.jsm")
|
2014-09-26 09:54:34 +04:00
|
|
|
|
|
|
|
|
|
|
|
let gImportedPrefBranches = new Set();
|
|
|
|
|
|
|
|
function importPrefBranch(aPrefBranch, aPermission, aAction) {
|
|
|
|
let list = Services.prefs.getChildList(aPrefBranch, {});
|
|
|
|
|
|
|
|
for (let pref of list) {
|
2015-06-16 22:33:26 +03:00
|
|
|
let origins = "";
|
2014-09-26 09:54:34 +04:00
|
|
|
try {
|
2015-06-16 22:33:26 +03:00
|
|
|
origins = Services.prefs.getCharPref(pref);
|
2014-09-26 09:54:34 +04:00
|
|
|
} catch (e) {}
|
|
|
|
|
2015-06-16 22:33:26 +03:00
|
|
|
if (!origins)
|
2014-09-26 09:54:34 +04:00
|
|
|
continue;
|
|
|
|
|
2015-06-16 22:33:26 +03:00
|
|
|
origins = origins.split(",");
|
2014-09-26 09:54:34 +04:00
|
|
|
|
2015-06-16 22:33:26 +03:00
|
|
|
for (let origin of origins) {
|
|
|
|
let principals = [];
|
2014-09-26 09:54:34 +04:00
|
|
|
try {
|
2015-06-16 22:33:26 +03:00
|
|
|
principals = [ BrowserUtils.principalFromOrigin(origin) ];
|
2014-09-26 09:54:34 +04:00
|
|
|
} catch (e) {
|
2015-06-16 22:33:26 +03:00
|
|
|
// This preference used to contain a list of hosts. For back-compat
|
|
|
|
// reasons, we convert these hosts into http:// and https:// permissions
|
|
|
|
// on default ports.
|
2014-09-26 09:54:34 +04:00
|
|
|
try {
|
2015-06-16 22:33:26 +03:00
|
|
|
let httpURI = Services.io.newURI("http://" + origin, null, null);
|
|
|
|
let httpsURI = Services.io.newURI("https://" + origin, null, null);
|
|
|
|
|
|
|
|
principals = [
|
|
|
|
Services.scriptSecurityManager.getNoAppCodebasePrincipal(httpURI),
|
|
|
|
Services.scriptSecurityManager.getNoAppCodebasePrincipal(httpsURI)
|
|
|
|
];
|
2014-09-26 09:54:34 +04:00
|
|
|
} catch (e2) {}
|
|
|
|
}
|
|
|
|
|
2015-06-16 22:33:26 +03:00
|
|
|
for (let principal of principals) {
|
|
|
|
try {
|
|
|
|
Services.perms.addFromPrincipal(principal, aPermission, aAction);
|
|
|
|
} catch (e) {}
|
|
|
|
}
|
2014-09-26 09:54:34 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
Services.prefs.setCharPref(pref, "");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
this.PermissionsUtils = {
|
|
|
|
/**
|
|
|
|
* Import permissions from perferences to the Permissions Manager. After being
|
|
|
|
* imported, all processed permissions will be set to an empty string.
|
|
|
|
* Perferences are only processed once during the application's
|
|
|
|
* lifetime - it's safe to call this multiple times without worrying about
|
|
|
|
* doing unnecessary work, as the preferences branch will only be processed
|
|
|
|
* the first time.
|
|
|
|
*
|
|
|
|
* @param aPrefBranch Preferences branch to import from. The preferences
|
|
|
|
* under this branch can specify whitelist (ALLOW_ACTION)
|
|
|
|
* or blacklist (DENY_ACTION) additions using perference
|
|
|
|
* names of the form:
|
|
|
|
* * <BRANCH>.whitelist.add.<ID>
|
|
|
|
* * <BRANCH>.blacklist.add.<ID>
|
|
|
|
* Where <ID> can be any valid preference name.
|
|
|
|
* The value is expected to be a comma separated list of
|
|
|
|
* host named. eg:
|
|
|
|
* * something.example.com
|
|
|
|
* * foo.exmaple.com,bar.example.com
|
|
|
|
*
|
|
|
|
* @param aPermission Permission name to be passsed to the Permissions
|
|
|
|
* Manager.
|
|
|
|
*/
|
|
|
|
importFromPrefs: function(aPrefBranch, aPermission) {
|
|
|
|
if (!aPrefBranch.endsWith("."))
|
|
|
|
aPrefBranch += ".";
|
|
|
|
|
|
|
|
// Ensure we only import this pref branch once.
|
|
|
|
if (gImportedPrefBranches.has(aPrefBranch))
|
|
|
|
return;
|
|
|
|
|
|
|
|
importPrefBranch(aPrefBranch + "whitelist.add", aPermission,
|
|
|
|
Services.perms.ALLOW_ACTION);
|
|
|
|
importPrefBranch(aPrefBranch + "blacklist.add", aPermission,
|
|
|
|
Services.perms.DENY_ACTION);
|
|
|
|
|
|
|
|
gImportedPrefBranches.add(aPrefBranch);
|
|
|
|
}
|
|
|
|
};
|