зеркало из https://github.com/mozilla/gecko-dev.git
169 строки
5.5 KiB
JavaScript
169 строки
5.5 KiB
JavaScript
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
Components.utils.import("resource://gre/modules/XPCOMUtils.jsm");
|
|
Components.utils.import("resource://gre/modules/osfile.jsm");
|
|
|
|
const Cc = Components.classes;
|
|
const Ci = Components.interfaces;
|
|
|
|
// This component is used for handling dragover and drop of urls.
|
|
//
|
|
// It checks to see whether a drop of a url is allowed. For instance, a url
|
|
// cannot be dropped if it is not a valid uri or the source of the drag cannot
|
|
// access the uri. This prevents, for example, a source document from tricking
|
|
// the user into dragging a chrome url.
|
|
|
|
function ContentAreaDropListener() { };
|
|
|
|
ContentAreaDropListener.prototype =
|
|
{
|
|
classID: Components.ID("{1f34bc80-1bc7-11d6-a384-d705dd0746fc}"),
|
|
QueryInterface: XPCOMUtils.generateQI([Ci.nsIDroppedLinkHandler, Ci.nsISupports]),
|
|
|
|
_getDropURL : function (dt)
|
|
{
|
|
let types = dt.types;
|
|
for (let t = 0; t < types.length; t++) {
|
|
let type = types[t];
|
|
switch (type) {
|
|
case "text/uri-list":
|
|
var url = dt.getData("URL").replace(/^\s+|\s+$/g, "");
|
|
return [url, url];
|
|
case "text/plain":
|
|
case "text/x-moz-text-internal":
|
|
var url = dt.getData(type).replace(/^\s+|\s+$/g, "");
|
|
return [url, url];
|
|
case "text/x-moz-url":
|
|
return dt.getData(type).split("\n");
|
|
}
|
|
}
|
|
|
|
// For shortcuts, we want to check for the file type last, so that the
|
|
// url pointed to in one of the url types is found first before the file
|
|
// type, which points to the actual file.
|
|
let files = dt.files;
|
|
if (files && files.length) {
|
|
return [OS.Path.toFileURI(files[0].mozFullPath), files[0].name];
|
|
}
|
|
|
|
return [ ];
|
|
},
|
|
|
|
_validateURI: function(dataTransfer, uriString, disallowInherit)
|
|
{
|
|
if (!uriString)
|
|
return "";
|
|
|
|
// Strip leading and trailing whitespace, then try to create a
|
|
// URI from the dropped string. If that succeeds, we're
|
|
// dropping a URI and we need to do a security check to make
|
|
// sure the source document can load the dropped URI.
|
|
uriString = uriString.replace(/^\s*|\s*$/g, '');
|
|
|
|
let uri;
|
|
let ioService = Cc["@mozilla.org/network/io-service;1"]
|
|
.getService(Components.interfaces.nsIIOService);
|
|
try {
|
|
// Check that the uri is valid first and return an empty string if not.
|
|
// It may just be plain text and should be ignored here
|
|
uri = ioService.newURI(uriString, null, null);
|
|
} catch (ex) { }
|
|
if (!uri)
|
|
return uriString;
|
|
|
|
// uriString is a valid URI, so do the security check.
|
|
let secMan = Cc["@mozilla.org/scriptsecuritymanager;1"].
|
|
getService(Ci.nsIScriptSecurityManager);
|
|
let sourceNode = dataTransfer.mozSourceNode;
|
|
let flags = secMan.STANDARD;
|
|
if (disallowInherit)
|
|
flags |= secMan.DISALLOW_INHERIT_PRINCIPAL;
|
|
|
|
// Use file:/// as the default uri so that drops of file URIs are always allowed
|
|
let principal = sourceNode ? sourceNode.nodePrincipal
|
|
: secMan.createCodebasePrincipal(ioService.newURI("file:///", null, null), {});
|
|
|
|
secMan.checkLoadURIStrWithPrincipal(principal, uriString, flags);
|
|
|
|
return uriString;
|
|
},
|
|
|
|
canDropLink: function(aEvent, aAllowSameDocument)
|
|
{
|
|
if (this._eventTargetIsDisabled(aEvent))
|
|
return false;
|
|
|
|
let dataTransfer = aEvent.dataTransfer;
|
|
let types = dataTransfer.types;
|
|
if (!types.contains("application/x-moz-file") &&
|
|
!types.contains("text/x-moz-url") &&
|
|
!types.contains("text/uri-list") &&
|
|
!types.contains("text/x-moz-text-internal") &&
|
|
!types.contains("text/plain"))
|
|
return false;
|
|
|
|
if (aAllowSameDocument)
|
|
return true;
|
|
|
|
let sourceNode = dataTransfer.mozSourceNode;
|
|
if (!sourceNode)
|
|
return true;
|
|
|
|
// don't allow a drop of a node from the same document onto this one
|
|
let sourceDocument = sourceNode.ownerDocument;
|
|
let eventDocument = aEvent.originalTarget.ownerDocument;
|
|
if (sourceDocument == eventDocument)
|
|
return false;
|
|
|
|
// also check for nodes in other child or sibling frames by checking
|
|
// if both have the same top window.
|
|
if (sourceDocument && eventDocument) {
|
|
let sourceRoot = sourceDocument.defaultView.top;
|
|
if (sourceRoot && sourceRoot == eventDocument.defaultView.top)
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
},
|
|
|
|
dropLink: function(aEvent, aName, aDisallowInherit)
|
|
{
|
|
aName.value = "";
|
|
if (this._eventTargetIsDisabled(aEvent))
|
|
return "";
|
|
|
|
let dataTransfer = aEvent.dataTransfer;
|
|
let [url, name] = this._getDropURL(dataTransfer);
|
|
|
|
try {
|
|
url = this._validateURI(dataTransfer, url, aDisallowInherit);
|
|
} catch (ex) {
|
|
aEvent.stopPropagation();
|
|
aEvent.preventDefault();
|
|
throw ex;
|
|
}
|
|
|
|
if (name)
|
|
aName.value = name;
|
|
|
|
return url;
|
|
},
|
|
|
|
_eventTargetIsDisabled: function(aEvent)
|
|
{
|
|
let ownerDoc = aEvent.originalTarget.ownerDocument;
|
|
if (!ownerDoc || !ownerDoc.defaultView)
|
|
return false;
|
|
|
|
return ownerDoc.defaultView
|
|
.QueryInterface(Components.interfaces.nsIInterfaceRequestor)
|
|
.getInterface(Components.interfaces.nsIDOMWindowUtils)
|
|
.isNodeDisabledForEvents(aEvent.originalTarget);
|
|
}
|
|
};
|
|
|
|
var components = [ContentAreaDropListener];
|
|
this.NSGetFactory = XPCOMUtils.generateNSGetFactory(components);
|