зеркало из https://github.com/mozilla/gecko-dev.git
85 строки
2.8 KiB
JavaScript
85 строки
2.8 KiB
JavaScript
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
/* eslint-env mozilla/chrome-worker */
|
|
|
|
"use strict";
|
|
|
|
const FILE_ENTRY = "201: ";
|
|
|
|
onmessage = async function(msg) {
|
|
try {
|
|
let extractedPaths = [];
|
|
// Construct a jar URI from the file URI so we can use the JAR URI scheme
|
|
// handling to navigate inside the zip file.
|
|
let jarPath = "jar:" + msg.data.zipURI + "!/";
|
|
let jarResponse = await fetch(jarPath);
|
|
let dirListing = await jarResponse.text();
|
|
let lines = dirListing.split("\n");
|
|
let reader = new FileReader();
|
|
for (let line of lines) {
|
|
if (!line.startsWith(FILE_ENTRY)) {
|
|
// Not a file entry, skip.
|
|
continue;
|
|
}
|
|
let lineSplits = line.split(" ");
|
|
let fileName = lineSplits[1];
|
|
// We don't need these types of files.
|
|
if (
|
|
fileName == "verified_contents.json" ||
|
|
fileName == "icon-128x128.png"
|
|
) {
|
|
continue;
|
|
}
|
|
let filePath = jarPath + fileName;
|
|
let filePathResponse = await fetch(filePath);
|
|
let fileContents = await filePathResponse.blob();
|
|
let fileData = await new Promise(resolve => {
|
|
reader.onloadend = function() {
|
|
resolve(reader.result);
|
|
};
|
|
reader.readAsArrayBuffer(fileContents);
|
|
});
|
|
let installToDirPath = PathUtils.join(
|
|
await PathUtils.getProfileDir(),
|
|
...msg.data.relativeInstallPath
|
|
);
|
|
await IOUtils.makeDirectory(installToDirPath);
|
|
// Do not extract into directories. Extract all files to the same
|
|
// directory.
|
|
let destPath = PathUtils.join(installToDirPath, fileName);
|
|
await IOUtils.write(destPath, new Uint8Array(fileData), {
|
|
tmpPath: destPath + ".tmp",
|
|
});
|
|
// Ensure files are writable and executable. Otherwise, we may be
|
|
// unable to execute or uninstall them.
|
|
await IOUtils.setPermissions(destPath, 0o700);
|
|
if (IOUtils.removeMacXAttr) {
|
|
// If we're on MacOS Firefox will add the quarantine xattr to files it
|
|
// downloads. In this case we want to clear that xattr so we can load
|
|
// the CDM.
|
|
try {
|
|
await IOUtils.removeMacXAttr(destPath, "com.apple.quarantine");
|
|
} catch (e) {
|
|
// Failed to remove the attribute. This could be because the profile
|
|
// exists on a file system without xattr support.
|
|
//
|
|
// Don't fail the extraction here, as in this case it's likely we
|
|
// didn't set quarantine on these files in the first place.
|
|
}
|
|
}
|
|
extractedPaths.push(destPath);
|
|
}
|
|
postMessage({
|
|
result: "success",
|
|
extractedPaths,
|
|
});
|
|
} catch (e) {
|
|
postMessage({
|
|
result: "fail",
|
|
exception: e.message,
|
|
});
|
|
}
|
|
};
|