2014-06-25 09:12:07 +04:00
|
|
|
/* -*- indent-tabs-mode: nil; js-indent-level: 4 -*-
|
2009-08-06 00:19:01 +04:00
|
|
|
* vim: sw=4 ts=4 sts=4 et filetype=javascript
|
2012-05-21 15:12:37 +04:00
|
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2009-05-07 23:21:54 +04:00
|
|
|
|
2012-10-31 20:13:28 +04:00
|
|
|
this.EXPORTED_SYMBOLS = [
|
2009-08-06 00:19:01 +04:00
|
|
|
"NetUtil",
|
|
|
|
];
|
|
|
|
|
2009-05-08 01:00:06 +04:00
|
|
|
/**
|
2009-05-07 23:21:54 +04:00
|
|
|
* Necko utilities
|
|
|
|
*/
|
|
|
|
|
2009-09-03 00:24:49 +04:00
|
|
|
////////////////////////////////////////////////////////////////////////////////
|
|
|
|
//// Constants
|
|
|
|
|
2009-05-07 23:21:54 +04:00
|
|
|
const Ci = Components.interfaces;
|
|
|
|
const Cc = Components.classes;
|
2009-09-03 00:24:49 +04:00
|
|
|
const Cr = Components.results;
|
2010-07-24 01:59:07 +04:00
|
|
|
const Cu = Components.utils;
|
2009-09-03 00:24:49 +04:00
|
|
|
|
2009-10-16 03:16:01 +04:00
|
|
|
const PR_UINT32_MAX = 0xffffffff;
|
|
|
|
|
2015-02-11 20:37:05 +03:00
|
|
|
Components.utils.import("resource://gre/modules/XPCOMUtils.jsm");
|
|
|
|
Components.utils.import("resource://gre/modules/Services.jsm");
|
|
|
|
|
2009-09-03 00:24:49 +04:00
|
|
|
////////////////////////////////////////////////////////////////////////////////
|
|
|
|
//// NetUtil Object
|
2009-05-07 23:21:54 +04:00
|
|
|
|
2012-10-31 20:13:28 +04:00
|
|
|
this.NetUtil = {
|
2009-05-07 23:21:54 +04:00
|
|
|
/**
|
|
|
|
* Function to perform simple async copying from aSource (an input stream)
|
|
|
|
* to aSink (an output stream). The copy will happen on some background
|
|
|
|
* thread. Both streams will be closed when the copy completes.
|
|
|
|
*
|
2009-09-03 00:24:49 +04:00
|
|
|
* @param aSource
|
|
|
|
* The input stream to read from
|
|
|
|
* @param aSink
|
|
|
|
* The output stream to write to
|
|
|
|
* @param aCallback [optional]
|
|
|
|
* A function that will be called at copy completion with a single
|
|
|
|
* argument: the nsresult status code for the copy operation.
|
2009-05-07 23:21:54 +04:00
|
|
|
*
|
2009-09-03 00:24:49 +04:00
|
|
|
* @return An nsIRequest representing the copy operation (for example, this
|
2009-05-07 23:21:54 +04:00
|
|
|
* can be used to cancel the copying). The consumer can ignore the
|
|
|
|
* return value if desired.
|
|
|
|
*/
|
2014-04-09 04:27:00 +04:00
|
|
|
asyncCopy: function NetUtil_asyncCopy(aSource, aSink,
|
|
|
|
aCallback = null)
|
2009-09-03 00:24:49 +04:00
|
|
|
{
|
2009-05-07 23:21:54 +04:00
|
|
|
if (!aSource || !aSink) {
|
2009-09-03 00:24:49 +04:00
|
|
|
let exception = new Components.Exception(
|
|
|
|
"Must have a source and a sink",
|
|
|
|
Cr.NS_ERROR_INVALID_ARG,
|
|
|
|
Components.stack.caller
|
|
|
|
);
|
|
|
|
throw exception;
|
2009-05-07 23:21:54 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
// make a stream copier
|
|
|
|
var copier = Cc["@mozilla.org/network/async-stream-copier;1"].
|
2014-04-09 04:27:00 +04:00
|
|
|
createInstance(Ci.nsIAsyncStreamCopier2);
|
|
|
|
copier.init(aSource, aSink,
|
|
|
|
null /* Default event target */,
|
|
|
|
0 /* Default length */,
|
|
|
|
true, true /* Auto-close */);
|
2009-05-07 23:21:54 +04:00
|
|
|
|
|
|
|
var observer;
|
|
|
|
if (aCallback) {
|
|
|
|
observer = {
|
2009-08-06 00:19:01 +04:00
|
|
|
onStartRequest: function(aRequest, aContext) {},
|
|
|
|
onStopRequest: function(aRequest, aContext, aStatusCode) {
|
|
|
|
aCallback(aStatusCode);
|
|
|
|
}
|
2009-05-07 23:21:54 +04:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
observer = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
// start the copying
|
2014-04-09 04:27:00 +04:00
|
|
|
copier.QueryInterface(Ci.nsIAsyncStreamCopier).asyncCopy(observer, null);
|
2009-05-07 23:21:54 +04:00
|
|
|
return copier;
|
2009-09-03 00:24:49 +04:00
|
|
|
},
|
|
|
|
|
2009-10-16 03:16:01 +04:00
|
|
|
/**
|
2015-02-11 20:37:05 +03:00
|
|
|
* Asynchronously opens a source and fetches the response. While the fetch
|
|
|
|
* is asynchronous, I/O may happen on the main thread. When reading from
|
|
|
|
* a local file, prefer using "OS.File" methods instead.
|
2009-10-16 03:16:01 +04:00
|
|
|
*
|
2009-12-16 10:33:08 +03:00
|
|
|
* @param aSource
|
2015-02-11 20:37:05 +03:00
|
|
|
* This argument can be one of the following:
|
|
|
|
* - An options object that will be passed to NetUtil.newChannel.
|
|
|
|
* - An existing nsIChannel.
|
|
|
|
* - An existing nsIInputStream.
|
|
|
|
* Using an nsIURI, nsIFile, or string spec directly is deprecated.
|
2009-10-16 03:16:01 +04:00
|
|
|
* @param aCallback
|
|
|
|
* The callback function that will be notified upon completion. It
|
2015-02-11 20:37:05 +03:00
|
|
|
* will get these arguments:
|
2011-03-31 21:24:42 +04:00
|
|
|
* 1) An nsIInputStream containing the data from aSource, if any.
|
2009-12-16 10:33:08 +03:00
|
|
|
* 2) The status code from opening the source.
|
2011-03-31 21:24:42 +04:00
|
|
|
* 3) Reference to the nsIRequest.
|
2009-10-16 03:16:01 +04:00
|
|
|
*/
|
2015-02-11 20:37:05 +03:00
|
|
|
asyncFetch: function NetUtil_asyncFetch(aSource, aCallback)
|
2009-10-16 03:16:01 +04:00
|
|
|
{
|
2009-12-16 10:33:08 +03:00
|
|
|
if (!aSource || !aCallback) {
|
2009-10-16 03:16:01 +04:00
|
|
|
let exception = new Components.Exception(
|
2009-12-16 10:33:08 +03:00
|
|
|
"Must have a source and a callback",
|
2009-10-16 03:16:01 +04:00
|
|
|
Cr.NS_ERROR_INVALID_ARG,
|
|
|
|
Components.stack.caller
|
|
|
|
);
|
|
|
|
throw exception;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a pipe that will create our output stream that we can use once
|
|
|
|
// we have gotten all the data.
|
|
|
|
let pipe = Cc["@mozilla.org/pipe;1"].
|
|
|
|
createInstance(Ci.nsIPipe);
|
2009-10-19 00:40:49 +04:00
|
|
|
pipe.init(true, true, 0, PR_UINT32_MAX, null);
|
2009-10-16 03:16:01 +04:00
|
|
|
|
|
|
|
// Create a listener that will give data to the pipe's output stream.
|
|
|
|
let listener = Cc["@mozilla.org/network/simple-stream-listener;1"].
|
|
|
|
createInstance(Ci.nsISimpleStreamListener);
|
|
|
|
listener.init(pipe.outputStream, {
|
|
|
|
onStartRequest: function(aRequest, aContext) {},
|
|
|
|
onStopRequest: function(aRequest, aContext, aStatusCode) {
|
2009-10-19 00:40:49 +04:00
|
|
|
pipe.outputStream.close();
|
2010-07-24 01:59:07 +04:00
|
|
|
aCallback(pipe.inputStream, aStatusCode, aRequest);
|
2009-10-16 03:16:01 +04:00
|
|
|
}
|
|
|
|
});
|
|
|
|
|
2011-03-31 21:24:42 +04:00
|
|
|
// Input streams are handled slightly differently from everything else.
|
|
|
|
if (aSource instanceof Ci.nsIInputStream) {
|
|
|
|
let pump = Cc["@mozilla.org/network/input-stream-pump;1"].
|
|
|
|
createInstance(Ci.nsIInputStreamPump);
|
|
|
|
pump.init(aSource, -1, -1, 0, 0, true);
|
|
|
|
pump.asyncRead(listener, null);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2009-12-16 10:33:08 +03:00
|
|
|
let channel = aSource;
|
|
|
|
if (!(channel instanceof Ci.nsIChannel)) {
|
|
|
|
channel = this.newChannel(aSource);
|
|
|
|
}
|
|
|
|
|
2013-03-18 15:29:31 +04:00
|
|
|
try {
|
2016-04-14 20:49:01 +03:00
|
|
|
// Open the channel using asyncOpen2() if the loadinfo contains one
|
|
|
|
// of the security mode flags, otherwise fall back to use asyncOpen().
|
|
|
|
if (channel.loadInfo &&
|
|
|
|
channel.loadInfo.securityMode != 0) {
|
|
|
|
channel.asyncOpen2(listener);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
// Log deprecation warning to console to make sure all channels
|
|
|
|
// are created providing the correct security flags in the loadinfo.
|
|
|
|
// See nsILoadInfo for all available security flags and also the API
|
|
|
|
// of NetUtil.newChannel() for details above.
|
2016-05-02 13:02:48 +03:00
|
|
|
Cu.reportError("NetUtil.jsm: asyncFetch() requires the channel to have " +
|
2016-04-14 20:49:01 +03:00
|
|
|
"one of the security flags set in the loadinfo (see nsILoadInfo). " +
|
|
|
|
"Please create channel using NetUtil.newChannel()");
|
|
|
|
channel.asyncOpen(listener, null);
|
|
|
|
}
|
2013-03-18 15:29:31 +04:00
|
|
|
}
|
|
|
|
catch (e) {
|
|
|
|
let exception = new Components.Exception(
|
|
|
|
"Failed to open input source '" + channel.originalURI.spec + "'",
|
|
|
|
e.result,
|
|
|
|
Components.stack.caller,
|
|
|
|
aSource,
|
|
|
|
e
|
|
|
|
);
|
|
|
|
throw exception;
|
|
|
|
}
|
2009-10-16 03:16:01 +04:00
|
|
|
},
|
|
|
|
|
2009-09-03 00:24:49 +04:00
|
|
|
/**
|
2009-12-16 10:33:03 +03:00
|
|
|
* Constructs a new URI for the given spec, character set, and base URI, or
|
|
|
|
* an nsIFile.
|
2009-09-03 00:24:49 +04:00
|
|
|
*
|
2009-12-16 10:33:03 +03:00
|
|
|
* @param aTarget
|
|
|
|
* The string spec for the desired URI or an nsIFile.
|
2009-09-03 00:24:49 +04:00
|
|
|
* @param aOriginCharset [optional]
|
2009-12-16 10:33:03 +03:00
|
|
|
* The character set for the URI. Only used if aTarget is not an
|
|
|
|
* nsIFile.
|
2009-09-03 00:24:49 +04:00
|
|
|
* @param aBaseURI [optional]
|
2009-12-16 10:33:03 +03:00
|
|
|
* The base URI for the spec. Only used if aTarget is not an
|
|
|
|
* nsIFile.
|
2009-09-03 00:24:49 +04:00
|
|
|
*
|
|
|
|
* @return an nsIURI object.
|
|
|
|
*/
|
2009-12-16 10:33:03 +03:00
|
|
|
newURI: function NetUtil_newURI(aTarget, aOriginCharset, aBaseURI)
|
2009-09-03 00:24:49 +04:00
|
|
|
{
|
2009-12-16 10:33:03 +03:00
|
|
|
if (!aTarget) {
|
2009-09-03 00:24:49 +04:00
|
|
|
let exception = new Components.Exception(
|
2009-12-16 10:33:03 +03:00
|
|
|
"Must have a non-null string spec or nsIFile object",
|
2009-09-03 00:24:49 +04:00
|
|
|
Cr.NS_ERROR_INVALID_ARG,
|
|
|
|
Components.stack.caller
|
|
|
|
);
|
|
|
|
throw exception;
|
|
|
|
}
|
|
|
|
|
2009-12-16 10:33:03 +03:00
|
|
|
if (aTarget instanceof Ci.nsIFile) {
|
|
|
|
return this.ioService.newFileURI(aTarget);
|
|
|
|
}
|
|
|
|
|
|
|
|
return this.ioService.newURI(aTarget, aOriginCharset, aBaseURI);
|
2009-10-03 09:11:20 +04:00
|
|
|
},
|
|
|
|
|
2009-12-16 10:33:06 +03:00
|
|
|
/**
|
2015-02-11 20:37:05 +03:00
|
|
|
* Constructs a new channel for the given source.
|
|
|
|
*
|
|
|
|
* Keep in mind that URIs coming from a webpage should *never* use the
|
|
|
|
* systemPrincipal as the loadingPrincipal.
|
2009-12-16 10:33:06 +03:00
|
|
|
*
|
|
|
|
* @param aWhatToLoad
|
2015-02-11 20:37:05 +03:00
|
|
|
* This argument used to be a string spec for the desired URI, an
|
|
|
|
* nsIURI, or an nsIFile. Now it should be an options object with
|
|
|
|
* the following properties:
|
|
|
|
* {
|
|
|
|
* uri:
|
2016-03-14 23:23:54 +03:00
|
|
|
* The full URI spec string, nsIURI or nsIFile to create the
|
|
|
|
* channel for.
|
|
|
|
* Note that this cannot be an nsIFile if you have to specify a
|
2015-02-11 20:37:05 +03:00
|
|
|
* non-default charset or base URI. Call NetUtil.newURI first if
|
|
|
|
* you need to construct an URI using those options.
|
|
|
|
* loadingNode:
|
|
|
|
* loadingPrincipal:
|
2016-09-20 09:34:40 +03:00
|
|
|
* triggeringPrincipal:
|
|
|
|
* securityFlags:
|
|
|
|
* contentPolicyType:
|
|
|
|
* These will be used as values for the nsILoadInfo object on the
|
|
|
|
* created channel. For details, see nsILoadInfo in nsILoadInfo.idl
|
2015-02-11 20:37:05 +03:00
|
|
|
* loadUsingSystemPrincipal:
|
|
|
|
* Set this to true to use the system principal as
|
|
|
|
* loadingPrincipal. This must be omitted if loadingPrincipal or
|
|
|
|
* loadingNode are present.
|
|
|
|
* This should be used with care as it skips security checks.
|
|
|
|
* }
|
2016-03-19 03:11:42 +03:00
|
|
|
* @param aOriginCharset [deprecated]
|
|
|
|
* The character set for the URI. Only used if aWhatToLoad is a
|
|
|
|
* string, which is a deprecated API. Must be undefined otherwise.
|
|
|
|
* Use NetUtil.newURI if you need to use this option.
|
|
|
|
* @param aBaseURI [deprecated]
|
|
|
|
* The base URI for the spec. Only used if aWhatToLoad is a string,
|
|
|
|
* which is a deprecated API. Must be undefined otherwise. Use
|
|
|
|
* NetUtil.newURI if you need to use this option.
|
2009-12-16 10:33:06 +03:00
|
|
|
* @return an nsIChannel object.
|
|
|
|
*/
|
2016-03-19 03:11:42 +03:00
|
|
|
newChannel: function NetUtil_newChannel(aWhatToLoad, aOriginCharset, aBaseURI)
|
2009-12-16 10:33:06 +03:00
|
|
|
{
|
2016-03-19 03:11:42 +03:00
|
|
|
// Check for the deprecated API first.
|
|
|
|
if (typeof aWhatToLoad == "string" ||
|
|
|
|
(aWhatToLoad instanceof Ci.nsIFile) ||
|
|
|
|
(aWhatToLoad instanceof Ci.nsIURI)) {
|
|
|
|
|
|
|
|
let uri = (aWhatToLoad instanceof Ci.nsIURI)
|
|
|
|
? aWhatToLoad
|
|
|
|
: this.newURI(aWhatToLoad, aOriginCharset, aBaseURI);
|
|
|
|
|
|
|
|
// log deprecation warning for developers.
|
|
|
|
Services.console.logStringMessage(
|
|
|
|
"Warning: NetUtil.newChannel(uri) deprecated, please provide argument 'aWhatToLoad'");
|
|
|
|
|
|
|
|
// Provide default loadinfo arguments and call the new API.
|
|
|
|
let systemPrincipal =
|
|
|
|
Services.scriptSecurityManager.getSystemPrincipal();
|
|
|
|
|
|
|
|
return this.ioService.newChannelFromURI2(
|
|
|
|
uri,
|
|
|
|
null, // loadingNode
|
|
|
|
systemPrincipal, // loadingPrincipal
|
|
|
|
null, // triggeringPrincipal
|
|
|
|
Ci.nsILoadInfo.SEC_ALLOW_CROSS_ORIGIN_DATA_IS_NULL,
|
|
|
|
Ci.nsIContentPolicy.TYPE_OTHER);
|
|
|
|
}
|
|
|
|
|
|
|
|
// We are using the updated API, that requires only the options object.
|
|
|
|
if (typeof aWhatToLoad != "object" ||
|
|
|
|
aOriginCharset !== undefined ||
|
|
|
|
aBaseURI !== undefined) {
|
2015-02-11 20:37:05 +03:00
|
|
|
throw new Components.Exception(
|
|
|
|
"newChannel requires a single object argument",
|
2009-12-16 10:33:06 +03:00
|
|
|
Cr.NS_ERROR_INVALID_ARG,
|
|
|
|
Components.stack.caller
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2015-02-11 20:37:05 +03:00
|
|
|
let { uri,
|
|
|
|
loadingNode,
|
|
|
|
loadingPrincipal,
|
|
|
|
loadUsingSystemPrincipal,
|
|
|
|
triggeringPrincipal,
|
|
|
|
securityFlags,
|
|
|
|
contentPolicyType } = aWhatToLoad;
|
|
|
|
|
|
|
|
if (!uri) {
|
|
|
|
throw new Components.Exception(
|
|
|
|
"newChannel requires the 'uri' property on the options object.",
|
|
|
|
Cr.NS_ERROR_INVALID_ARG,
|
|
|
|
Components.stack.caller
|
|
|
|
);
|
2009-12-16 10:33:06 +03:00
|
|
|
}
|
|
|
|
|
2016-03-14 23:23:54 +03:00
|
|
|
if (typeof uri == "string" || uri instanceof Ci.nsIFile) {
|
2015-02-11 20:37:05 +03:00
|
|
|
uri = this.newURI(uri);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!loadingNode && !loadingPrincipal && !loadUsingSystemPrincipal) {
|
|
|
|
throw new Components.Exception(
|
|
|
|
"newChannel requires at least one of the 'loadingNode'," +
|
|
|
|
" 'loadingPrincipal', or 'loadUsingSystemPrincipal'" +
|
|
|
|
" properties on the options object.",
|
|
|
|
Cr.NS_ERROR_INVALID_ARG,
|
|
|
|
Components.stack.caller
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (loadUsingSystemPrincipal === true) {
|
|
|
|
if (loadingNode || loadingPrincipal) {
|
|
|
|
throw new Components.Exception(
|
|
|
|
"newChannel does not accept 'loadUsingSystemPrincipal'" +
|
|
|
|
" if the 'loadingNode' or 'loadingPrincipal' properties" +
|
|
|
|
" are present on the options object.",
|
|
|
|
Cr.NS_ERROR_INVALID_ARG,
|
|
|
|
Components.stack.caller
|
|
|
|
);
|
|
|
|
}
|
|
|
|
loadingPrincipal = Services.scriptSecurityManager
|
|
|
|
.getSystemPrincipal();
|
|
|
|
} else if (loadUsingSystemPrincipal !== undefined) {
|
|
|
|
throw new Components.Exception(
|
|
|
|
"newChannel requires the 'loadUsingSystemPrincipal'" +
|
|
|
|
" property on the options object to be 'true' or 'undefined'.",
|
|
|
|
Cr.NS_ERROR_INVALID_ARG,
|
|
|
|
Components.stack.caller
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (securityFlags === undefined) {
|
2015-11-18 04:35:30 +03:00
|
|
|
securityFlags = loadUsingSystemPrincipal
|
|
|
|
? Ci.nsILoadInfo.SEC_ALLOW_CROSS_ORIGIN_DATA_IS_NULL
|
|
|
|
: Ci.nsILoadInfo.SEC_NORMAL;
|
2015-02-11 20:37:05 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (contentPolicyType === undefined) {
|
|
|
|
if (!loadUsingSystemPrincipal) {
|
|
|
|
throw new Components.Exception(
|
|
|
|
"newChannel requires the 'contentPolicyType' property on" +
|
|
|
|
" the options object unless loading from system principal.",
|
|
|
|
Cr.NS_ERROR_INVALID_ARG,
|
|
|
|
Components.stack.caller
|
|
|
|
);
|
|
|
|
}
|
|
|
|
contentPolicyType = Ci.nsIContentPolicy.TYPE_OTHER;
|
|
|
|
}
|
|
|
|
|
|
|
|
return this.ioService.newChannelFromURI2(uri,
|
|
|
|
loadingNode || null,
|
|
|
|
loadingPrincipal || null,
|
|
|
|
triggeringPrincipal || null,
|
|
|
|
securityFlags,
|
|
|
|
contentPolicyType);
|
2009-12-16 10:33:06 +03:00
|
|
|
},
|
|
|
|
|
2010-08-27 23:42:51 +04:00
|
|
|
/**
|
|
|
|
* Reads aCount bytes from aInputStream into a string.
|
|
|
|
*
|
|
|
|
* @param aInputStream
|
|
|
|
* The input stream to read from.
|
|
|
|
* @param aCount
|
|
|
|
* The number of bytes to read from the stream.
|
2011-11-25 06:23:41 +04:00
|
|
|
* @param aOptions [optional]
|
|
|
|
* charset
|
|
|
|
* The character encoding of stream data.
|
|
|
|
* replacement
|
|
|
|
* The character to replace unknown byte sequences.
|
|
|
|
* If unset, it causes an exceptions to be thrown.
|
2010-08-27 23:42:51 +04:00
|
|
|
*
|
|
|
|
* @return the bytes from the input stream in string form.
|
|
|
|
*
|
|
|
|
* @throws NS_ERROR_INVALID_ARG if aInputStream is not an nsIInputStream.
|
|
|
|
* @throws NS_BASE_STREAM_WOULD_BLOCK if reading from aInputStream would
|
|
|
|
* block the calling thread (non-blocking mode only).
|
|
|
|
* @throws NS_ERROR_FAILURE if there are not enough bytes available to read
|
|
|
|
* aCount amount of data.
|
2011-11-25 06:23:41 +04:00
|
|
|
* @throws NS_ERROR_ILLEGAL_INPUT if aInputStream has invalid sequences
|
2010-08-27 23:42:51 +04:00
|
|
|
*/
|
|
|
|
readInputStreamToString: function NetUtil_readInputStreamToString(aInputStream,
|
2011-11-25 06:23:41 +04:00
|
|
|
aCount,
|
|
|
|
aOptions)
|
2010-08-27 23:42:51 +04:00
|
|
|
{
|
|
|
|
if (!(aInputStream instanceof Ci.nsIInputStream)) {
|
|
|
|
let exception = new Components.Exception(
|
|
|
|
"First argument should be an nsIInputStream",
|
|
|
|
Cr.NS_ERROR_INVALID_ARG,
|
|
|
|
Components.stack.caller
|
|
|
|
);
|
|
|
|
throw exception;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!aCount) {
|
|
|
|
let exception = new Components.Exception(
|
|
|
|
"Non-zero amount of bytes must be specified",
|
|
|
|
Cr.NS_ERROR_INVALID_ARG,
|
|
|
|
Components.stack.caller
|
|
|
|
);
|
|
|
|
throw exception;
|
|
|
|
}
|
|
|
|
|
2011-11-25 06:23:41 +04:00
|
|
|
if (aOptions && "charset" in aOptions) {
|
|
|
|
let cis = Cc["@mozilla.org/intl/converter-input-stream;1"].
|
|
|
|
createInstance(Ci.nsIConverterInputStream);
|
|
|
|
try {
|
2015-02-11 20:37:05 +03:00
|
|
|
// When replacement is set, the character that is unknown sequence
|
2011-11-25 06:23:41 +04:00
|
|
|
// replaces with aOptions.replacement character.
|
|
|
|
if (!("replacement" in aOptions)) {
|
|
|
|
// aOptions.replacement isn't set.
|
|
|
|
// If input stream has unknown sequences for aOptions.charset,
|
|
|
|
// throw NS_ERROR_ILLEGAL_INPUT.
|
|
|
|
aOptions.replacement = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
cis.init(aInputStream, aOptions.charset, aCount,
|
|
|
|
aOptions.replacement);
|
|
|
|
let str = {};
|
|
|
|
cis.readString(-1, str);
|
|
|
|
cis.close();
|
|
|
|
return str.value;
|
|
|
|
}
|
|
|
|
catch (e) {
|
|
|
|
// Adjust the stack so it throws at the caller's location.
|
|
|
|
throw new Components.Exception(e.message, e.result,
|
|
|
|
Components.stack.caller, e.data);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-08-27 23:42:51 +04:00
|
|
|
let sis = Cc["@mozilla.org/scriptableinputstream;1"].
|
|
|
|
createInstance(Ci.nsIScriptableInputStream);
|
|
|
|
sis.init(aInputStream);
|
|
|
|
try {
|
|
|
|
return sis.readBytes(aCount);
|
|
|
|
}
|
|
|
|
catch (e) {
|
|
|
|
// Adjust the stack so it throws at the caller's location.
|
|
|
|
throw new Components.Exception(e.message, e.result,
|
|
|
|
Components.stack.caller, e.data);
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
2009-10-03 09:11:20 +04:00
|
|
|
/**
|
|
|
|
* Returns a reference to nsIIOService.
|
|
|
|
*
|
|
|
|
* @return a reference to nsIIOService.
|
|
|
|
*/
|
|
|
|
get ioService()
|
|
|
|
{
|
|
|
|
delete this.ioService;
|
|
|
|
return this.ioService = Cc["@mozilla.org/network/io-service;1"].
|
|
|
|
getService(Ci.nsIIOService);
|
2009-09-03 00:24:49 +04:00
|
|
|
},
|
2009-05-07 23:21:54 +04:00
|
|
|
};
|