gecko-dev/testing/specialpowers/content/specialpowersAPI.js

2271 строка
73 KiB
JavaScript

/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
/* This code is loaded in every child process that is started by mochitest in
* order to be used as a replacement for UniversalXPConnect
*/
"use strict";
/* import-globals-from MozillaLogger.js */
/* globals XPCNativeWrapper */
var EXPORTED_SYMBOLS = ["SpecialPowersAPI", "bindDOMWindowUtils"];
ChromeUtils.import("resource://gre/modules/Services.jsm");
ChromeUtils.import("resource://gre/modules/XPCOMUtils.jsm");
Services.scriptloader.loadSubScript("resource://specialpowers/MozillaLogger.js", this);
ChromeUtils.defineModuleGetter(this, "setTimeout",
"resource://gre/modules/Timer.jsm");
ChromeUtils.defineModuleGetter(this, "MockFilePicker",
"resource://specialpowers/MockFilePicker.jsm");
ChromeUtils.defineModuleGetter(this, "MockColorPicker",
"resource://specialpowers/MockColorPicker.jsm");
ChromeUtils.defineModuleGetter(this, "MockPermissionPrompt",
"resource://specialpowers/MockPermissionPrompt.jsm");
ChromeUtils.defineModuleGetter(this, "PrivateBrowsingUtils",
"resource://gre/modules/PrivateBrowsingUtils.jsm");
ChromeUtils.defineModuleGetter(this, "NetUtil",
"resource://gre/modules/NetUtil.jsm");
ChromeUtils.defineModuleGetter(this, "AppConstants",
"resource://gre/modules/AppConstants.jsm");
ChromeUtils.defineModuleGetter(this, "ServiceWorkerCleanUp",
"resource://gre/modules/ServiceWorkerCleanUp.jsm");
ChromeUtils.defineModuleGetter(this, "PerTestCoverageUtils",
"resource://testing-common/PerTestCoverageUtils.jsm");
// Allow stuff from this scope to be accessed from non-privileged scopes. This
// would crash if used outside of automation.
Cu.forcePermissiveCOWs();
function SpecialPowersAPI() {
this._consoleListeners = [];
this._encounteredCrashDumpFiles = [];
this._unexpectedCrashDumpFiles = { };
this._crashDumpDir = null;
this._mfl = null;
this._prefEnvUndoStack = [];
this._pendingPrefs = [];
this._applyingPrefs = false;
this._permissionsUndoStack = [];
this._pendingPermissions = [];
this._applyingPermissions = false;
this._observingPermissions = false;
}
function bindDOMWindowUtils(aWindow) {
if (!aWindow)
return undefined;
var util = aWindow.windowUtils;
return wrapPrivileged(util);
}
function isWrappable(x) {
if (typeof x === "object")
return x !== null;
return typeof x === "function";
}
function isWrapper(x) {
return isWrappable(x) && (typeof x.SpecialPowers_wrappedObject !== "undefined");
}
function unwrapIfWrapped(x) {
return isWrapper(x) ? unwrapPrivileged(x) : x;
}
function wrapIfUnwrapped(x) {
return isWrapper(x) ? x : wrapPrivileged(x);
}
function isObjectOrArray(obj) {
if (Object(obj) !== obj)
return false;
let arrayClasses = ["Object", "Array", "Int8Array", "Uint8Array",
"Int16Array", "Uint16Array", "Int32Array",
"Uint32Array", "Float32Array", "Float64Array",
"Uint8ClampedArray"];
let className = Cu.getClassName(obj, true);
return arrayClasses.includes(className);
}
// In general, we want Xray wrappers for content DOM objects, because waiving
// Xray gives us Xray waiver wrappers that clamp the principal when we cross
// compartment boundaries. However, there are some exceptions where we want
// to use a waiver:
//
// * Xray adds some gunk to toString(), which has the potential to confuse
// consumers that aren't expecting Xray wrappers. Since toString() is a
// non-privileged method that returns only strings, we can just waive Xray
// for that case.
//
// * We implement Xrays to pure JS [[Object]] and [[Array]] instances that
// filter out tricky things like callables. This is the right thing for
// security in general, but tends to break tests that try to pass object
// literals into SpecialPowers. So we waive [[Object]] and [[Array]]
// instances before inspecting properties.
//
// * When we don't have meaningful Xray semantics, we create an Opaque
// XrayWrapper for security reasons. For test code, we generally want to see
// through that sort of thing.
function waiveXraysIfAppropriate(obj, propName) {
if (propName == "toString" || isObjectOrArray(obj) ||
/Opaque/.test(Object.prototype.toString.call(obj))) {
return XPCNativeWrapper.unwrap(obj);
}
return obj;
}
// We can't call apply() directy on Xray-wrapped functions, so we have to be
// clever.
function doApply(fun, invocant, args) {
// We implement Xrays to pure JS [[Object]] instances that filter out tricky
// things like callables. This is the right thing for security in general,
// but tends to break tests that try to pass object literals into
// SpecialPowers. So we waive [[Object]] instances when they're passed to a
// SpecialPowers-wrapped callable.
//
// Note that the transitive nature of Xray waivers means that any property
// pulled off such an object will also be waived, and so we'll get principal
// clamping for Xrayed DOM objects reached from literals, so passing things
// like {l : xoWin.location} won't work. Hopefully the rabbit hole doesn't
// go that deep.
args = args.map(x => isObjectOrArray(x) ? Cu.waiveXrays(x) : x);
return Reflect.apply(fun, invocant, args);
}
function wrapPrivileged(obj) {
// Primitives pass straight through.
if (!isWrappable(obj))
return obj;
// No double wrapping.
if (isWrapper(obj))
throw "Trying to double-wrap object!";
let dummy;
if (typeof obj === "function")
dummy = function() {};
else
dummy = Object.create(null);
return new Proxy(dummy, new SpecialPowersHandler(obj));
}
function unwrapPrivileged(x) {
// We don't wrap primitives, so sometimes we have a primitive where we'd
// expect to have a wrapper. The proxy pretends to be the type that it's
// emulating, so we can just as easily check isWrappable() on a proxy as
// we can on an unwrapped object.
if (!isWrappable(x))
return x;
// If we have a wrappable type, make sure it's wrapped.
if (!isWrapper(x))
throw "Trying to unwrap a non-wrapped object!";
var obj = x.SpecialPowers_wrappedObject;
// unwrapped.
return obj;
}
function specialPowersHasInstance(value) {
// Because we return wrapped versions of this function, when it's called its
// wrapper will unwrap the "this" as well as the function itself. So our
// "this" is the unwrapped thing we started out with.
return value instanceof this;
}
function SpecialPowersHandler(wrappedObject) {
this.wrappedObject = wrappedObject;
}
SpecialPowersHandler.prototype = {
construct(target, args) {
// The arguments may or may not be wrappers. Unwrap them if necessary.
var unwrappedArgs = Array.prototype.slice.call(args).map(unwrapIfWrapped);
// We want to invoke "obj" as a constructor, but using unwrappedArgs as
// the arguments. Make sure to wrap and re-throw exceptions!
try {
return wrapIfUnwrapped(Reflect.construct(this.wrappedObject, unwrappedArgs));
} catch (e) {
throw wrapIfUnwrapped(e);
}
},
apply(target, thisValue, args) {
// The invocant and arguments may or may not be wrappers. Unwrap
// them if necessary.
var invocant = unwrapIfWrapped(thisValue);
var unwrappedArgs = Array.prototype.slice.call(args).map(unwrapIfWrapped);
try {
return wrapIfUnwrapped(doApply(this.wrappedObject, invocant, unwrappedArgs));
} catch (e) {
// Wrap exceptions and re-throw them.
throw wrapIfUnwrapped(e);
}
},
has(target, prop) {
if (prop === "SpecialPowers_wrappedObject")
return true;
return Reflect.has(this.wrappedObject, prop);
},
get(target, prop, receiver) {
if (prop === "SpecialPowers_wrappedObject")
return this.wrappedObject;
let obj = waiveXraysIfAppropriate(this.wrappedObject, prop);
let val = Reflect.get(obj, prop);
if (val === undefined && prop == Symbol.hasInstance) {
// Special-case Symbol.hasInstance to pass the hasInstance check on to our
// target. We only do this when the target doesn't have its own
// Symbol.hasInstance already. Once we get rid of JS engine class
// instance hooks (bug 1448218) and always use Symbol.hasInstance, we can
// remove this bit (bug 1448400).
return wrapPrivileged(specialPowersHasInstance);
}
return wrapIfUnwrapped(val);
},
set(target, prop, val, receiver) {
if (prop === "SpecialPowers_wrappedObject")
return false;
let obj = waiveXraysIfAppropriate(this.wrappedObject, prop);
return Reflect.set(obj, prop, unwrapIfWrapped(val));
},
delete(target, prop) {
if (prop === "SpecialPowers_wrappedObject")
return false;
return Reflect.deleteProperty(this.wrappedObject, prop);
},
defineProperty(target, prop, descriptor) {
throw "Can't call defineProperty on SpecialPowers wrapped object";
},
getOwnPropertyDescriptor(target, prop) {
// Handle our special API.
if (prop === "SpecialPowers_wrappedObject") {
return { value: this.wrappedObject, writeable: true,
configurable: true, enumerable: false };
}
let obj = waiveXraysIfAppropriate(this.wrappedObject, prop);
let desc = Reflect.getOwnPropertyDescriptor(obj, prop);
if (desc === undefined) {
if (prop == Symbol.hasInstance) {
// Special-case Symbol.hasInstance to pass the hasInstance check on to
// our target. We only do this when the target doesn't have its own
// Symbol.hasInstance already. Once we get rid of JS engine class
// instance hooks (bug 1448218) and always use Symbol.hasInstance, we
// can remove this bit (bug 1448400).
return { value: wrapPrivileged(specialPowersHasInstance),
writeable: true, configurable: true, enumerable: false };
}
return undefined;
}
// Transitively maintain the wrapper membrane.
function wrapIfExists(key) {
if (key in desc)
desc[key] = wrapIfUnwrapped(desc[key]);
}
wrapIfExists("value");
wrapIfExists("get");
wrapIfExists("set");
// A trapping proxy's properties must always be configurable, but sometimes
// we come across non-configurable properties. Tell a white lie.
desc.configurable = true;
return desc;
},
ownKeys(target) {
// Insert our special API. It's not enumerable, but ownKeys()
// includes non-enumerable properties.
let props = ["SpecialPowers_wrappedObject"];
// Do the normal thing.
let flt = (a) => !props.includes(a);
props = props.concat(Reflect.ownKeys(this.wrappedObject).filter(flt));
// If we've got an Xray wrapper, include the expandos as well.
if ("wrappedJSObject" in this.wrappedObject) {
props = props.concat(Reflect.ownKeys(this.wrappedObject.wrappedJSObject)
.filter(flt));
}
return props;
},
preventExtensions(target) {
throw "Can't call preventExtensions on SpecialPowers wrapped object";
},
};
// SPConsoleListener reflects nsIConsoleMessage objects into JS in a
// tidy, XPCOM-hiding way. Messages that are nsIScriptError objects
// have their properties exposed in detail. It also auto-unregisters
// itself when it receives a "sentinel" message.
function SPConsoleListener(callback) {
this.callback = callback;
}
SPConsoleListener.prototype = {
// Overload the observe method for both nsIConsoleListener and nsIObserver.
// The topic will be null for nsIConsoleListener.
observe(msg, topic) {
let m = { message: msg.message,
errorMessage: null,
sourceName: null,
sourceLine: null,
lineNumber: null,
columnNumber: null,
category: null,
windowID: null,
isScriptError: false,
isConsoleEvent: false,
isWarning: false,
isException: false,
isStrict: false };
if (msg instanceof Ci.nsIScriptError) {
m.errorMessage = msg.errorMessage;
m.sourceName = msg.sourceName;
m.sourceLine = msg.sourceLine;
m.lineNumber = msg.lineNumber;
m.columnNumber = msg.columnNumber;
m.category = msg.category;
m.windowID = msg.outerWindowID;
m.innerWindowID = msg.innerWindowID;
m.isScriptError = true;
m.isWarning = ((msg.flags & Ci.nsIScriptError.warningFlag) === 1);
m.isException = ((msg.flags & Ci.nsIScriptError.exceptionFlag) === 1);
m.isStrict = ((msg.flags & Ci.nsIScriptError.strictFlag) === 1);
} else if (topic === "console-api-log-event") {
// This is a dom/console event.
let unwrapped = msg.wrappedJSObject;
m.errorMessage = unwrapped.arguments[0];
m.sourceName = unwrapped.filename;
m.lineNumber = unwrapped.lineNumber;
m.columnNumber = unwrapped.columnNumber;
m.windowID = unwrapped.ID;
m.innerWindowID = unwrapped.innerID;
m.isConsoleEvent = true;
m.isWarning = unwrapped.level === "warning";
}
Object.freeze(m);
// Run in a separate runnable since console listeners aren't
// supposed to touch content and this one might.
Services.tm.dispatchToMainThread(() => {
this.callback.call(undefined, m);
});
if (!m.isScriptError && !m.isConsoleEvent && m.message === "SENTINEL") {
Services.obs.removeObserver(this, "console-api-log-event");
Services.console.unregisterListener(this);
}
},
QueryInterface: ChromeUtils.generateQI([Ci.nsIConsoleListener,
Ci.nsIObserver]),
};
function wrapCallback(cb) {
return function SpecialPowersCallbackWrapper() {
var args = Array.prototype.map.call(arguments, wrapIfUnwrapped);
return cb.apply(this, args);
};
}
function wrapCallbackObject(obj) {
obj = Cu.waiveXrays(obj);
var wrapper = {};
for (var i in obj) {
if (typeof obj[i] == "function")
wrapper[i] = wrapCallback(obj[i]);
else
wrapper[i] = obj[i];
}
return wrapper;
}
function setWrapped(obj, prop, val) {
if (!isWrapper(obj))
throw "You only need to use this for SpecialPowers wrapped objects";
obj = unwrapPrivileged(obj);
return Reflect.set(obj, prop, val);
}
SpecialPowersAPI.prototype = {
/*
* Privileged object wrapping API
*
* Usage:
* var wrapper = SpecialPowers.wrap(obj);
* wrapper.privilegedMethod(); wrapper.privilegedProperty;
* obj === SpecialPowers.unwrap(wrapper);
*
* These functions provide transparent access to privileged objects using
* various pieces of deep SpiderMagic. Conceptually, a wrapper is just an
* object containing a reference to the underlying object, where all method
* calls and property accesses are transparently performed with the System
* Principal. Moreover, objects obtained from the wrapper (including properties
* and method return values) are wrapped automatically. Thus, after a single
* call to SpecialPowers.wrap(), the wrapper layer is transitively maintained.
*
* Known Issues:
*
* - The wrapping function does not preserve identity, so
* SpecialPowers.wrap(foo) !== SpecialPowers.wrap(foo). See bug 718543.
*
* - The wrapper cannot see expando properties on unprivileged DOM objects.
* That is to say, the wrapper uses Xray delegation.
*
* - The wrapper sometimes guesses certain ES5 attributes for returned
* properties. This is explained in a comment in the wrapper code above,
* and shouldn't be a problem.
*/
wrap: wrapIfUnwrapped,
unwrap: unwrapIfWrapped,
isWrapper,
/*
* When content needs to pass a callback or a callback object to an API
* accessed over SpecialPowers, that API may sometimes receive arguments for
* whom it is forbidden to create a wrapper in content scopes. As such, we
* need a layer to wrap the values in SpecialPowers wrappers before they ever
* reach content.
*/
wrapCallback,
wrapCallbackObject,
/*
* Used for assigning a property to a SpecialPowers wrapper, without unwrapping
* the value that is assigned.
*/
setWrapped,
/*
* Create blank privileged objects to use as out-params for privileged functions.
*/
createBlankObject() {
return {};
},
/*
* Because SpecialPowers wrappers don't preserve identity, comparing with ==
* can be hazardous. Sometimes we can just unwrap to compare, but sometimes
* wrapping the underlying object into a content scope is forbidden. This
* function strips any wrappers if they exist and compare the underlying
* values.
*/
compare(a, b) {
return unwrapIfWrapped(a) === unwrapIfWrapped(b);
},
get MockFilePicker() {
return MockFilePicker;
},
get MockColorPicker() {
return MockColorPicker;
},
get MockPermissionPrompt() {
return MockPermissionPrompt;
},
/*
* Load a privileged script that runs same-process. This is different from
* |loadChromeScript|, which will run in the parent process in e10s mode.
*/
loadPrivilegedScript(aFunction) {
var str = "(" + aFunction.toString() + ")();";
let gGlobalObject = Cu.getGlobalForObject(this);
let sb = Cu.Sandbox(gGlobalObject);
var window = this.window.get();
var mc = new window.MessageChannel();
sb.port = mc.port1;
try {
let blob = new Blob([str], {type: "application/javascript"});
let blobUrl = URL.createObjectURL(blob);
Services.scriptloader.loadSubScript(blobUrl, sb);
} catch (e) {
throw wrapIfUnwrapped(e);
}
return mc.port2;
},
loadChromeScript(urlOrFunction, sandboxOptions) {
// Create a unique id for this chrome script
let uuidGenerator = Cc["@mozilla.org/uuid-generator;1"]
.getService(Ci.nsIUUIDGenerator);
let id = uuidGenerator.generateUUID().toString();
// Tells chrome code to evaluate this chrome script
let scriptArgs = { id, sandboxOptions };
if (typeof(urlOrFunction) == "function") {
scriptArgs.function = {
body: "(" + urlOrFunction.toString() + ")();",
name: urlOrFunction.name,
};
} else {
scriptArgs.url = urlOrFunction;
}
this._sendSyncMessage("SPLoadChromeScript",
scriptArgs);
// Returns a MessageManager like API in order to be
// able to communicate with this chrome script
let listeners = [];
let chromeScript = {
addMessageListener: (name, listener) => {
listeners.push({ name, listener });
},
promiseOneMessage: name => new Promise(resolve => {
chromeScript.addMessageListener(name, function listener(message) {
chromeScript.removeMessageListener(name, listener);
resolve(message);
});
}),
removeMessageListener: (name, listener) => {
listeners = listeners.filter(
o => (o.name != name || o.listener != listener)
);
},
sendAsyncMessage: (name, message) => {
this._sendSyncMessage("SPChromeScriptMessage",
{ id, name, message });
},
sendSyncMessage: (name, message) => {
return this._sendSyncMessage("SPChromeScriptMessage",
{ id, name, message });
},
destroy: () => {
listeners = [];
this._removeMessageListener("SPChromeScriptMessage", chromeScript);
this._removeMessageListener("SPChromeScriptAssert", chromeScript);
},
receiveMessage: (aMessage) => {
let messageId = aMessage.json.id;
let name = aMessage.json.name;
let message = aMessage.json.message;
if (this.mm) {
message = new StructuredCloneHolder(message).deserialize(this.mm.content);
}
// Ignore message from other chrome script
if (messageId != id)
return;
if (aMessage.name == "SPChromeScriptMessage") {
listeners.filter(o => (o.name == name))
.forEach(o => o.listener(message));
} else if (aMessage.name == "SPChromeScriptAssert") {
assert(aMessage.json);
}
},
};
this._addMessageListener("SPChromeScriptMessage", chromeScript);
this._addMessageListener("SPChromeScriptAssert", chromeScript);
let assert = json => {
// An assertion has been done in a mochitest chrome script
let {name, err, message, stack} = json;
// Try to fetch a test runner from the mochitest
// in order to properly log these assertions and notify
// all usefull log observers
let window = this.window.get();
let parentRunner, repr = o => o;
if (window) {
window = window.wrappedJSObject;
parentRunner = window.TestRunner;
if (window.repr) {
repr = window.repr;
}
}
// Craft a mochitest-like report string
var resultString = err ? "TEST-UNEXPECTED-FAIL" : "TEST-PASS";
var diagnostic =
message ? message :
("assertion @ " + stack.filename + ":" + stack.lineNumber);
if (err) {
diagnostic +=
" - got " + repr(err.actual) +
", expected " + repr(err.expected) +
" (operator " + err.operator + ")";
}
var msg = [resultString, name, diagnostic].join(" | ");
if (parentRunner) {
if (err) {
parentRunner.addFailedTest(name);
parentRunner.error(msg);
} else {
parentRunner.log(msg);
}
} else {
// When we are running only a single mochitest, there is no test runner
dump(msg + "\n");
}
};
return this.wrap(chromeScript);
},
importInMainProcess(importString) {
var message = this._sendSyncMessage("SPImportInMainProcess", importString)[0];
if (message.hadError) {
throw "SpecialPowers.importInMainProcess failed with error " + message.errorMessage;
}
},
get Services() {
return wrapPrivileged(Services);
},
/*
* A getter for the privileged Components object we have.
*/
getFullComponents() {
return Components;
},
/*
* Convenient shortcuts to the standard Components abbreviations.
*/
get Cc() { return wrapPrivileged(this.getFullComponents().classes); },
get Ci() { return wrapPrivileged(this.getFullComponents().interfaces); },
get Cu() { return wrapPrivileged(this.getFullComponents().utils); },
get Cr() { return wrapPrivileged(this.getFullComponents().results); },
getDOMWindowUtils(aWindow) {
if (aWindow == this.window.get() && this.DOMWindowUtils != null)
return this.DOMWindowUtils;
return bindDOMWindowUtils(aWindow);
},
/*
* A method to get a DOMParser that can't parse XUL.
*/
getNoXULDOMParser() {
// If we create it with a system subject principal (so it gets a
// nullprincipal), it won't be able to parse XUL by default.
return wrapPrivileged(new DOMParser());
},
get InspectorUtils() { return wrapPrivileged(InspectorUtils); },
get PromiseDebugging() { return wrapPrivileged(PromiseDebugging); },
waitForCrashes(aExpectingProcessCrash) {
return new Promise((resolve, reject) => {
if (!aExpectingProcessCrash) {
resolve();
}
var crashIds = this._encounteredCrashDumpFiles.filter((filename) => {
return ((filename.length === 40) && filename.endsWith(".dmp"));
}).map((id) => {
return id.slice(0, -4); // Strip the .dmp extension to get the ID
});
let self = this;
function messageListener(msg) {
self._removeMessageListener("SPProcessCrashManagerWait", messageListener);
resolve();
}
this._addMessageListener("SPProcessCrashManagerWait", messageListener);
this._sendAsyncMessage("SPProcessCrashManagerWait", {
crashIds,
});
});
},
removeExpectedCrashDumpFiles(aExpectingProcessCrash) {
var success = true;
if (aExpectingProcessCrash) {
var message = {
op: "delete-crash-dump-files",
filenames: this._encounteredCrashDumpFiles,
};
if (!this._sendSyncMessage("SPProcessCrashService", message)[0]) {
success = false;
}
}
this._encounteredCrashDumpFiles.length = 0;
return success;
},
findUnexpectedCrashDumpFiles() {
var self = this;
var message = {
op: "find-crash-dump-files",
crashDumpFilesToIgnore: this._unexpectedCrashDumpFiles,
};
var crashDumpFiles = this._sendSyncMessage("SPProcessCrashService", message)[0];
crashDumpFiles.forEach(function(aFilename) {
self._unexpectedCrashDumpFiles[aFilename] = true;
});
return crashDumpFiles;
},
removePendingCrashDumpFiles() {
var message = {
op: "delete-pending-crash-dump-files",
};
var removed = this._sendSyncMessage("SPProcessCrashService", message)[0];
return removed;
},
_setTimeout(callback) {
// for mochitest-browser
if (typeof window != "undefined")
setTimeout(callback, 0);
// for mochitest-plain
else
this.mm.content.setTimeout(callback, 0);
},
_delayCallbackTwice(callback) {
let delayedCallback = () => {
let delayAgain = (aCallback) => {
// Using this._setTimeout doesn't work here
// It causes failures in mochtests that use
// multiple pushPrefEnv calls
// For chrome/browser-chrome mochitests
if (typeof window != "undefined")
setTimeout(aCallback, 0);
// For mochitest-plain
else
this.mm.content.setTimeout(aCallback, 0);
};
delayAgain(delayAgain.bind(this, callback));
};
return delayedCallback;
},
/* apply permissions to the system and when the test case is finished (SimpleTest.finish())
we will revert the permission back to the original.
inPermissions is an array of objects where each object has a type, action, context, ex:
[{'type': 'SystemXHR', 'allow': 1, 'context': document},
{'type': 'SystemXHR', 'allow': Ci.nsIPermissionManager.PROMPT_ACTION, 'context': document}]
Allow can be a boolean value of true/false or ALLOW_ACTION/DENY_ACTION/PROMPT_ACTION/UNKNOWN_ACTION
*/
pushPermissions(inPermissions, callback) {
inPermissions = Cu.waiveXrays(inPermissions);
var pendingPermissions = [];
var cleanupPermissions = [];
for (var p in inPermissions) {
var permission = inPermissions[p];
var originalValue = Ci.nsIPermissionManager.UNKNOWN_ACTION;
var context = Cu.unwaiveXrays(permission.context); // Sometimes |context| is a DOM object on which we expect
// to be able to access .nodePrincipal, so we need to unwaive.
if (this.testPermission(permission.type, Ci.nsIPermissionManager.ALLOW_ACTION, context)) {
originalValue = Ci.nsIPermissionManager.ALLOW_ACTION;
} else if (this.testPermission(permission.type, Ci.nsIPermissionManager.DENY_ACTION, context)) {
originalValue = Ci.nsIPermissionManager.DENY_ACTION;
} else if (this.testPermission(permission.type, Ci.nsIPermissionManager.PROMPT_ACTION, context)) {
originalValue = Ci.nsIPermissionManager.PROMPT_ACTION;
} else if (this.testPermission(permission.type, Ci.nsICookiePermission.ACCESS_SESSION, context)) {
originalValue = Ci.nsICookiePermission.ACCESS_SESSION;
} else if (this.testPermission(permission.type, Ci.nsICookiePermission.ACCESS_ALLOW_FIRST_PARTY_ONLY, context)) {
originalValue = Ci.nsICookiePermission.ACCESS_ALLOW_FIRST_PARTY_ONLY;
} else if (this.testPermission(permission.type, Ci.nsICookiePermission.ACCESS_LIMIT_THIRD_PARTY, context)) {
originalValue = Ci.nsICookiePermission.ACCESS_LIMIT_THIRD_PARTY;
}
let principal = this._getPrincipalFromArg(context);
if (principal.isSystemPrincipal) {
continue;
}
let perm;
if (typeof permission.allow !== "boolean") {
perm = permission.allow;
} else {
perm = permission.allow ? Ci.nsIPermissionManager.ALLOW_ACTION
: Ci.nsIPermissionManager.DENY_ACTION;
}
if (permission.remove)
perm = Ci.nsIPermissionManager.UNKNOWN_ACTION;
if (originalValue == perm) {
continue;
}
var todo = {"op": "add",
"type": permission.type,
"permission": perm,
"value": perm,
"principal": principal,
"expireType": (typeof permission.expireType === "number") ?
permission.expireType : 0, // default: EXPIRE_NEVER
"expireTime": (typeof permission.expireTime === "number") ?
permission.expireTime : 0};
var cleanupTodo = Object.assign({}, todo);
if (permission.remove)
todo.op = "remove";
pendingPermissions.push(todo);
/* Push original permissions value or clear into cleanup array */
if (originalValue == Ci.nsIPermissionManager.UNKNOWN_ACTION) {
cleanupTodo.op = "remove";
} else {
cleanupTodo.value = originalValue;
cleanupTodo.permission = originalValue;
}
cleanupPermissions.push(cleanupTodo);
}
if (pendingPermissions.length > 0) {
// The callback needs to be delayed twice. One delay is because the pref
// service doesn't guarantee the order it calls its observers in, so it
// may notify the observer holding the callback before the other
// observers have been notified and given a chance to make the changes
// that the callback checks for. The second delay is because pref
// observers often defer making their changes by posting an event to the
// event loop.
if (!this._observingPermissions) {
this._observingPermissions = true;
// If specialpowers is in main-process, then we can add a observer
// to get all 'perm-changed' signals. Otherwise, it can't receive
// all signals, so we register a observer in specialpowersobserver(in
// main-process) and get signals from it.
if (this.isMainProcess()) {
this.permissionObserverProxy._specialPowersAPI = this;
Services.obs.addObserver(this.permissionObserverProxy, "perm-changed");
} else {
this.registerObservers("perm-changed");
// bind() is used to set 'this' to SpecialPowersAPI itself.
this._addMessageListener("specialpowers-perm-changed", this.permChangedProxy.bind(this));
}
}
this._permissionsUndoStack.push(cleanupPermissions);
this._pendingPermissions.push([pendingPermissions,
this._delayCallbackTwice(callback)]);
this._applyPermissions();
} else {
this._setTimeout(callback);
}
},
/*
* This function should be used when specialpowers is in content process but
* it want to get the notification from chrome space.
*
* This function will call Services.obs.addObserver in SpecialPowersObserver
* (that is in chrome process) and forward the data received to SpecialPowers
* via messageManager.
* You can use this._addMessageListener("specialpowers-YOUR_TOPIC") to fire
* the callback.
*
* To get the expected data, you should modify
* SpecialPowersObserver.prototype._registerObservers.observe. Or the message
* you received from messageManager will only contain 'aData' from Service.obs.
*
* NOTICE: there is no implementation of _addMessageListener in
* ChromePowers.js
*/
registerObservers(topic) {
var msg = {
"op": "add",
"observerTopic": topic,
};
this._sendSyncMessage("SPObserverService", msg);
},
permChangedProxy(aMessage) {
let permission = aMessage.json.permission;
let aData = aMessage.json.aData;
this._permissionObserver.observe(permission, aData);
},
permissionObserverProxy: {
// 'this' in permChangedObserverProxy is the permChangedObserverProxy
// object itself. The '_specialPowersAPI' will be set to the 'SpecialPowersAPI'
// object to call the member function in SpecialPowersAPI.
_specialPowersAPI: null,
observe(aSubject, aTopic, aData) {
if (aTopic == "perm-changed") {
var permission = aSubject.QueryInterface(Ci.nsIPermission);
this._specialPowersAPI._permissionObserver.observe(permission, aData);
}
},
},
popPermissions(callback) {
if (this._permissionsUndoStack.length > 0) {
// See pushPermissions comment regarding delay.
let cb = callback ? this._delayCallbackTwice(callback) : null;
/* Each pop from the stack will yield an object {op/type/permission/value/url/appid/isInIsolatedMozBrowserElement} or null */
this._pendingPermissions.push([this._permissionsUndoStack.pop(), cb]);
this._applyPermissions();
} else {
if (this._observingPermissions) {
this._observingPermissions = false;
this._removeMessageListener("specialpowers-perm-changed", this.permChangedProxy.bind(this));
}
this._setTimeout(callback);
}
},
flushPermissions(callback) {
while (this._permissionsUndoStack.length > 1)
this.popPermissions(null);
this.popPermissions(callback);
},
setTestPluginEnabledState(newEnabledState, pluginName) {
return this._sendSyncMessage("SPSetTestPluginEnabledState",
{ newEnabledState, pluginName })[0];
},
_permissionObserver: {
_self: null,
_lastPermission: {},
_callBack: null,
_nextCallback: null,
_obsDataMap: {
"deleted": "remove",
"added": "add",
},
observe(permission, aData) {
if (this._self._applyingPermissions) {
if (permission.type == this._lastPermission.type) {
this._self._setTimeout(this._callback);
this._self._setTimeout(this._nextCallback);
this._callback = null;
this._nextCallback = null;
}
} else {
var found = false;
for (var i = 0; !found && i < this._self._permissionsUndoStack.length; i++) {
var undos = this._self._permissionsUndoStack[i];
for (var j = 0; j < undos.length; j++) {
var undo = undos[j];
if (undo.op == this._obsDataMap[aData] &&
undo.principal.originAttributes.appId == permission.principal.originAttributes.appId &&
undo.type == permission.type) {
// Remove this undo item if it has been done by others(not
// specialpowers itself.)
undos.splice(j, 1);
found = true;
break;
}
}
if (!undos.length) {
// Remove the empty row in permissionsUndoStack
this._self._permissionsUndoStack.splice(i, 1);
}
}
}
},
},
/*
Iterate through one atomic set of permissions actions and perform allow/deny as appropriate.
All actions performed must modify the relevant permission.
*/
_applyPermissions() {
if (this._applyingPermissions || this._pendingPermissions.length <= 0) {
return;
}
/* Set lock and get prefs from the _pendingPrefs queue */
this._applyingPermissions = true;
var transaction = this._pendingPermissions.shift();
var pendingActions = transaction[0];
var callback = transaction[1];
var lastPermission = pendingActions[pendingActions.length - 1];
var self = this;
this._permissionObserver._self = self;
this._permissionObserver._lastPermission = lastPermission;
this._permissionObserver._callback = callback;
this._permissionObserver._nextCallback = function() {
self._applyingPermissions = false;
// Now apply any permissions that may have been queued while we were applying
self._applyPermissions();
};
for (var idx in pendingActions) {
var perm = pendingActions[idx];
this._sendSyncMessage("SPPermissionManager", perm)[0];
}
},
/**
* Helper to resolve a promise by calling the resolve function and call an
* optional callback.
*/
_resolveAndCallOptionalCallback(resolveFn, callback = null) {
resolveFn();
if (callback) {
callback();
}
},
/**
* Take in a list of pref changes to make, then invokes |callback| and resolves
* the returned Promise once those changes have taken effect. When the test
* finishes, these changes are reverted.
*
* |inPrefs| must be an object with up to two properties: "set" and "clear".
* pushPrefEnv will set prefs as indicated in |inPrefs.set| and will unset
* the prefs indicated in |inPrefs.clear|.
*
* For example, you might pass |inPrefs| as:
*
* inPrefs = {'set': [['foo.bar', 2], ['magic.pref', 'baz']],
* 'clear': [['clear.this'], ['also.this']] };
*
* Notice that |set| and |clear| are both an array of arrays. In |set|, each
* of the inner arrays must have the form [pref_name, value] or [pref_name,
* value, iid]. (The latter form is used for prefs with "complex" values.)
*
* In |clear|, each inner array should have the form [pref_name].
*
* If you set the same pref more than once (or both set and clear a pref),
* the behavior of this method is undefined.
*
* (Implementation note: _prefEnvUndoStack is a stack of values to revert to,
* not values which have been set!)
*
* TODO: complex values for original cleanup?
*
*/
pushPrefEnv(inPrefs, callback = null) {
var prefs = Services.prefs;
var pref_string = [];
pref_string[prefs.PREF_INT] = "INT";
pref_string[prefs.PREF_BOOL] = "BOOL";
pref_string[prefs.PREF_STRING] = "CHAR";
var pendingActions = [];
var cleanupActions = [];
for (var action in inPrefs) { /* set|clear */
for (var idx in inPrefs[action]) {
var aPref = inPrefs[action][idx];
var prefName = aPref[0];
var prefValue = null;
var prefIid = null;
var prefType = prefs.PREF_INVALID;
var originalValue = null;
if (aPref.length == 3) {
prefValue = aPref[1];
prefIid = aPref[2];
} else if (aPref.length == 2) {
prefValue = aPref[1];
}
/* If pref is not found or invalid it doesn't exist. */
if (prefs.getPrefType(prefName) != prefs.PREF_INVALID) {
prefType = pref_string[prefs.getPrefType(prefName)];
if ((prefs.prefHasUserValue(prefName) && action == "clear") ||
(action == "set"))
originalValue = this._getPref(prefName, prefType, {});
} else if (action == "set") {
/* prefName doesn't exist, so 'clear' is pointless */
if (aPref.length == 3) {
prefType = "COMPLEX";
} else if (aPref.length == 2) {
if (typeof(prefValue) == "boolean")
prefType = "BOOL";
else if (typeof(prefValue) == "number")
prefType = "INT";
else if (typeof(prefValue) == "string")
prefType = "CHAR";
}
}
/* PREF_INVALID: A non existing pref which we are clearing or invalid values for a set */
if (prefType == prefs.PREF_INVALID)
continue;
/* We are not going to set a pref if the value is the same */
if (originalValue == prefValue)
continue;
pendingActions.push({"action": action, "type": prefType, "name": prefName, "value": prefValue, "Iid": prefIid});
/* Push original preference value or clear into cleanup array */
var cleanupTodo = {"action": action, "type": prefType, "name": prefName, "value": originalValue, "Iid": prefIid};
if (originalValue == null) {
cleanupTodo.action = "clear";
} else {
cleanupTodo.action = "set";
}
cleanupActions.push(cleanupTodo);
}
}
return new Promise(resolve => {
let done = this._resolveAndCallOptionalCallback.bind(this, resolve, callback);
if (pendingActions.length > 0) {
// The callback needs to be delayed twice. One delay is because the pref
// service doesn't guarantee the order it calls its observers in, so it
// may notify the observer holding the callback before the other
// observers have been notified and given a chance to make the changes
// that the callback checks for. The second delay is because pref
// observers often defer making their changes by posting an event to the
// event loop.
this._prefEnvUndoStack.push(cleanupActions);
this._pendingPrefs.push([pendingActions,
this._delayCallbackTwice(done)]);
this._applyPrefs();
} else {
this._setTimeout(done);
}
});
},
popPrefEnv(callback = null) {
return new Promise(resolve => {
let done = this._resolveAndCallOptionalCallback.bind(this, resolve, callback);
if (this._prefEnvUndoStack.length > 0) {
// See pushPrefEnv comment regarding delay.
let cb = this._delayCallbackTwice(done);
/* Each pop will have a valid block of preferences */
this._pendingPrefs.push([this._prefEnvUndoStack.pop(), cb]);
this._applyPrefs();
} else {
this._setTimeout(done);
}
});
},
flushPrefEnv(callback = null) {
while (this._prefEnvUndoStack.length > 1)
this.popPrefEnv(null);
return new Promise(resolve => {
let done = this._resolveAndCallOptionalCallback.bind(this, resolve, callback);
this.popPrefEnv(done);
});
},
_isPrefActionNeeded(prefAction) {
if (prefAction.action === "clear") {
return Services.prefs.prefHasUserValue(prefAction.name);
} else if (prefAction.action === "set") {
try {
let currentValue = this._getPref(prefAction.name, prefAction.type, {});
return currentValue != prefAction.value;
} catch (e) {
// If the preference is not defined yet, setting the value will have an effect.
return true;
}
}
// Only "clear" and "set" actions are supported.
return false;
},
/*
Iterate through one atomic set of pref actions and perform sets/clears as appropriate.
All actions performed must modify the relevant pref.
*/
_applyPrefs() {
if (this._applyingPrefs || this._pendingPrefs.length <= 0) {
return;
}
/* Set lock and get prefs from the _pendingPrefs queue */
this._applyingPrefs = true;
var transaction = this._pendingPrefs.shift();
var pendingActions = transaction[0];
var callback = transaction[1];
// Filter out all the pending actions that will not have any effect.
pendingActions = pendingActions.filter(action => {
return this._isPrefActionNeeded(action);
});
var self = this;
let onPrefActionsApplied = function() {
self._setTimeout(callback);
self._setTimeout(function() {
self._applyingPrefs = false;
// Now apply any prefs that may have been queued while we were applying
self._applyPrefs();
});
};
// If no valid action remains, call onPrefActionsApplied directly and bail out.
if (pendingActions.length === 0) {
onPrefActionsApplied();
return;
}
var lastPref = pendingActions[pendingActions.length - 1];
var pb = Services.prefs;
pb.addObserver(lastPref.name, function prefObs(subject, topic, data) {
pb.removeObserver(lastPref.name, prefObs);
onPrefActionsApplied();
});
for (var idx in pendingActions) {
var pref = pendingActions[idx];
if (pref.action == "set") {
this._setPref(pref.name, pref.type, pref.value, pref.Iid);
} else if (pref.action == "clear") {
this.clearUserPref(pref.name);
}
}
},
_proxiedObservers: {
"specialpowers-http-notify-request": function(aMessage) {
let uri = aMessage.json.uri;
Services.obs.notifyObservers(null, "specialpowers-http-notify-request", uri);
},
},
_addObserverProxy(notification) {
if (notification in this._proxiedObservers) {
this._addMessageListener(notification, this._proxiedObservers[notification]);
}
},
_removeObserverProxy(notification) {
if (notification in this._proxiedObservers) {
this._removeMessageListener(notification, this._proxiedObservers[notification]);
}
},
addObserver(obs, notification, weak) {
this._addObserverProxy(notification);
obs = Cu.waiveXrays(obs);
if (typeof obs == "object" && obs.observe.name != "SpecialPowersCallbackWrapper")
obs.observe = wrapCallback(obs.observe);
Services.obs.addObserver(obs, notification, weak);
},
removeObserver(obs, notification) {
this._removeObserverProxy(notification);
Services.obs.removeObserver(Cu.waiveXrays(obs), notification);
},
notifyObservers(subject, topic, data) {
Services.obs.notifyObservers(subject, topic, data);
},
/**
* An async observer is useful if you're listening for a
* notification that normally is only used by C++ code or chrome
* code (so it runs in the SystemGroup), but we need to know about
* it for a test (which runs as web content). If we used
* addObserver, we would assert when trying to enter web content
* from a runnabled labeled by the SystemGroup. An async observer
* avoids this problem.
*/
_asyncObservers: new WeakMap(),
addAsyncObserver(obs, notification, weak) {
obs = Cu.waiveXrays(obs);
if (typeof obs == "object" && obs.observe.name != "SpecialPowersCallbackWrapper") {
obs.observe = wrapCallback(obs.observe);
}
let asyncObs = (...args) => {
Services.tm.dispatchToMainThread(() => {
if (typeof obs == "function") {
obs(...args);
} else {
obs.observe.call(undefined, ...args);
}
});
};
this._asyncObservers.set(obs, asyncObs);
Services.obs.addObserver(asyncObs, notification, weak);
},
removeAsyncObserver(obs, notification) {
let asyncObs = this._asyncObservers.get(Cu.waiveXrays(obs));
Services.obs.removeObserver(asyncObs, notification);
},
can_QI(obj) {
return obj.QueryInterface !== undefined;
},
do_QueryInterface(obj, iface) {
return obj.QueryInterface(Ci[iface]);
},
call_Instanceof(obj1, obj2) {
obj1 = unwrapIfWrapped(obj1);
obj2 = unwrapIfWrapped(obj2);
return obj1 instanceof obj2;
},
// Returns a privileged getter from an object. GetOwnPropertyDescriptor does
// not work here because xray wrappers don't properly implement it.
//
// This terribleness is used by dom/base/test/test_object.html because
// <object> and <embed> tags will spawn plugins if their prototype is touched,
// so we need to get and cache the getter of |hasRunningPlugin| if we want to
// call it without paradoxically spawning the plugin.
do_lookupGetter(obj, name) {
return Object.prototype.__lookupGetter__.call(obj, name);
},
// Mimic the get*Pref API
getBoolPref(prefName, defaultValue) {
return this._getPref(prefName, "BOOL", { defaultValue });
},
getIntPref(prefName, defaultValue) {
return this._getPref(prefName, "INT", { defaultValue });
},
getCharPref(prefName, defaultValue) {
return this._getPref(prefName, "CHAR", { defaultValue });
},
getComplexValue(prefName, iid) {
return this._getPref(prefName, "COMPLEX", { iid });
},
// Mimic the set*Pref API
setBoolPref(prefName, value) {
return this._setPref(prefName, "BOOL", value);
},
setIntPref(prefName, value) {
return this._setPref(prefName, "INT", value);
},
setCharPref(prefName, value) {
return this._setPref(prefName, "CHAR", value);
},
setComplexValue(prefName, iid, value) {
return this._setPref(prefName, "COMPLEX", value, iid);
},
// Mimic the clearUserPref API
clearUserPref(prefName) {
let msg = {
op: "clear",
prefName,
prefType: "",
};
this._sendSyncMessage("SPPrefService", msg);
},
// Private pref functions to communicate to chrome
_getPref(prefName, prefType, { defaultValue, iid }) {
let msg = {
op: "get",
prefName,
prefType,
iid, // Only used with complex prefs
defaultValue, // Optional default value
};
let val = this._sendSyncMessage("SPPrefService", msg);
if (val == null || val[0] == null) {
throw "Error getting pref '" + prefName + "'";
}
return val[0];
},
_setPref(prefName, prefType, prefValue, iid) {
let msg = {
op: "set",
prefName,
prefType,
iid, // Only used with complex prefs
prefValue,
};
return this._sendSyncMessage("SPPrefService", msg)[0];
},
_getDocShell(window) {
return window.docShell;
},
_getMUDV(window) {
return this._getDocShell(window).contentViewer;
},
// XXX: these APIs really ought to be removed, they're not e10s-safe.
// (also they're pretty Firefox-specific)
_getTopChromeWindow(window) {
return window.docShell.rootTreeItem.domWindow
.QueryInterface(Ci.nsIDOMChromeWindow);
},
_getAutoCompletePopup(window) {
return this._getTopChromeWindow(window).document
.getElementById("PopupAutoComplete");
},
addAutoCompletePopupEventListener(window, eventname, listener) {
this._getAutoCompletePopup(window).addEventListener(eventname,
listener);
},
removeAutoCompletePopupEventListener(window, eventname, listener) {
this._getAutoCompletePopup(window).removeEventListener(eventname,
listener);
},
get formHistory() {
let tmp = {};
ChromeUtils.import("resource://gre/modules/FormHistory.jsm", tmp);
return wrapPrivileged(tmp.FormHistory);
},
getFormFillController(window) {
return Cc["@mozilla.org/satchel/form-fill-controller;1"]
.getService(Ci.nsIFormFillController);
},
attachFormFillControllerTo(window) {
this.getFormFillController()
.attachToBrowser(this._getDocShell(window),
this._getAutoCompletePopup(window));
},
detachFormFillControllerFrom(window) {
this.getFormFillController().detachFromBrowser(this._getDocShell(window));
},
isBackButtonEnabled(window) {
return !this._getTopChromeWindow(window).document
.getElementById("Browser:Back")
.hasAttribute("disabled");
},
// XXX end of problematic APIs
addChromeEventListener(type, listener, capture, allowUntrusted) {
this.mm.addEventListener(type, listener, capture, allowUntrusted);
},
removeChromeEventListener(type, listener, capture) {
this.mm.removeEventListener(type, listener, capture);
},
// Note: each call to registerConsoleListener MUST be paired with a
// call to postConsoleSentinel; when the callback receives the
// sentinel it will unregister itself (_after_ calling the
// callback). SimpleTest.expectConsoleMessages does this for you.
// If you register more than one console listener, a call to
// postConsoleSentinel will zap all of them.
registerConsoleListener(callback) {
let listener = new SPConsoleListener(callback);
Services.console.registerListener(listener);
// listen for dom/console events as well
Services.obs.addObserver(listener, "console-api-log-event");
},
postConsoleSentinel() {
Services.console.logStringMessage("SENTINEL");
},
resetConsole() {
Services.console.reset();
},
getFullZoom(window) {
return this._getMUDV(window).fullZoom;
},
getDeviceFullZoom(window) {
return this._getMUDV(window).deviceFullZoom;
},
setFullZoom(window, zoom) {
this._getMUDV(window).fullZoom = zoom;
},
getTextZoom(window) {
return this._getMUDV(window).textZoom;
},
setTextZoom(window, zoom) {
this._getMUDV(window).textZoom = zoom;
},
getOverrideDPPX(window) {
return this._getMUDV(window).overrideDPPX;
},
setOverrideDPPX(window, dppx) {
this._getMUDV(window).overrideDPPX = dppx;
},
emulateMedium(window, mediaType) {
this._getMUDV(window).emulateMedium(mediaType);
},
stopEmulatingMedium(window) {
this._getMUDV(window).stopEmulatingMedium();
},
snapshotWindowWithOptions(win, rect, bgcolor, options) {
var el = this.window.get().document.createElementNS("http://www.w3.org/1999/xhtml", "canvas");
if (rect === undefined) {
rect = { top: win.scrollY, left: win.scrollX,
width: win.innerWidth, height: win.innerHeight };
}
if (bgcolor === undefined) {
bgcolor = "rgb(255,255,255)";
}
if (options === undefined) {
options = { };
}
el.width = rect.width;
el.height = rect.height;
var ctx = el.getContext("2d");
var flags = 0;
for (var option in options) {
flags |= options[option] && ctx[option];
}
ctx.drawWindow(win,
rect.left, rect.top, rect.width, rect.height,
bgcolor,
flags);
return el;
},
snapshotWindow(win, withCaret, rect, bgcolor) {
return this.snapshotWindowWithOptions(win, rect, bgcolor,
{ DRAWWINDOW_DRAW_CARET: withCaret });
},
snapshotRect(win, rect, bgcolor) {
return this.snapshotWindowWithOptions(win, rect, bgcolor);
},
gc() {
this.DOMWindowUtils.garbageCollect();
},
forceGC() {
Cu.forceGC();
},
forceShrinkingGC() {
Cu.forceShrinkingGC();
},
forceCC() {
Cu.forceCC();
},
finishCC() {
Cu.finishCC();
},
ccSlice(budget) {
Cu.ccSlice(budget);
},
// Due to various dependencies between JS objects and C++ objects, an ordinary
// forceGC doesn't necessarily clear all unused objects, thus the GC and CC
// needs to run several times and when no other JS is running.
// The current number of iterations has been determined according to massive
// cross platform testing.
exactGC(callback) {
let count = 0;
function genGCCallback(cb) {
return function() {
Cu.forceCC();
if (++count < 2) {
Cu.schedulePreciseGC(genGCCallback(cb));
} else if (cb) {
cb();
}
};
}
Cu.schedulePreciseGC(genGCCallback(callback));
},
nondeterministicGetWeakMapKeys(m) {
return ChromeUtils.nondeterministicGetWeakMapKeys(m);
},
getMemoryReports() {
try {
Cc["@mozilla.org/memory-reporter-manager;1"]
.getService(Ci.nsIMemoryReporterManager)
.getReports(() => {}, null, () => {}, null, false);
} catch (e) { }
},
setGCZeal(zeal) {
Cu.setGCZeal(zeal);
},
isMainProcess() {
try {
return Services.appinfo.processType == Ci.nsIXULRuntime.PROCESS_TYPE_DEFAULT;
} catch (e) { }
return true;
},
_xpcomabi: null,
get XPCOMABI() {
if (this._xpcomabi != null)
return this._xpcomabi;
var xulRuntime = Services.appinfo.QueryInterface(Ci.nsIXULRuntime);
this._xpcomabi = xulRuntime.XPCOMABI;
return this._xpcomabi;
},
// The optional aWin parameter allows the caller to specify a given window in
// whose scope the runnable should be dispatched. If aFun throws, the
// exception will be reported to aWin.
executeSoon(aFun, aWin) {
// Create the runnable in the scope of aWin to avoid running into COWs.
var runnable = {};
if (aWin)
runnable = Cu.createObjectIn(aWin);
runnable.run = aFun;
Cu.dispatch(runnable, aWin);
},
_os: null,
get OS() {
if (this._os != null)
return this._os;
this._os = Services.appinfo.OS;
return this._os;
},
addSystemEventListener(target, type, listener, useCapture) {
Services.els.addSystemEventListener(target, type, listener, useCapture);
},
removeSystemEventListener(target, type, listener, useCapture) {
Services.els.removeSystemEventListener(target, type, listener, useCapture);
},
// helper method to check if the event is consumed by either default group's
// event listener or system group's event listener.
defaultPreventedInAnyGroup(event) {
// FYI: Event.defaultPrevented returns false in content context if the
// event is consumed only by system group's event listeners.
return event.defaultPrevented;
},
getDOMRequestService() {
var serv = Services.DOMRequest;
var res = {};
var props = ["createRequest", "createCursor", "fireError", "fireSuccess",
"fireDone", "fireDetailedError"];
for (var i in props) {
let prop = props[i];
res[prop] = function() { return serv[prop].apply(serv, arguments); };
}
return res;
},
setLogFile(path) {
this._mfl = new MozillaFileLogger(path);
},
log(data) {
this._mfl.log(data);
},
closeLogFile() {
this._mfl.close();
},
addCategoryEntry(category, entry, value, persists, replace) {
Services.catMan
.addCategoryEntry(category, entry, value, persists, replace);
},
deleteCategoryEntry(category, entry, persists) {
Services.catMan
.deleteCategoryEntry(category, entry, persists);
},
openDialog(win, args) {
return win.openDialog.apply(win, args);
},
// This is a blocking call which creates and spins a native event loop
spinEventLoop(win) {
// simply do a sync XHR back to our windows location.
var syncXHR = new win.XMLHttpRequest();
syncXHR.open("GET", win.location, false);
syncXHR.send();
},
// :jdm gets credit for this. ex: getPrivilegedProps(window, 'location.href');
getPrivilegedProps(obj, props) {
var parts = props.split(".");
for (var i = 0; i < parts.length; i++) {
var p = parts[i];
if (obj[p] != undefined) {
obj = obj[p];
} else {
return null;
}
}
return obj;
},
getFocusedElementForWindow(targetWindow, aDeep) {
var outParam = {};
Services.focus.getFocusedElementForWindow(targetWindow, aDeep, outParam);
return outParam.value;
},
get focusManager() {
return Services.focus;
},
activeWindow() {
return Services.focus.activeWindow;
},
focusedWindow() {
return Services.focus.focusedWindow;
},
focus(aWindow) {
// This is called inside TestRunner._makeIframe without aWindow, because of assertions in oop mochitests
// With aWindow, it is called in SimpleTest.waitForFocus to allow popup window opener focus switching
if (aWindow)
aWindow.focus();
var mm = this.mm;
if (aWindow) {
let windowMM = aWindow.docShell.messageManager;
if (windowMM) {
mm = windowMM;
}
/*
* Otherwise (e.g. XUL chrome windows from mochitest-chrome which won't
* have a message manager) just stick with "global".
*/
}
mm.sendAsyncMessage("SpecialPowers.Focus", {});
},
getClipboardData(flavor, whichClipboard) {
if (whichClipboard === undefined)
whichClipboard = Services.clipboard.kGlobalClipboard;
var xferable = Cc["@mozilla.org/widget/transferable;1"].
createInstance(Ci.nsITransferable);
// in e10s b-c tests |content.window| is a CPOW whereas |window| works fine.
// for some non-e10s mochi tests, |window| is null whereas |content.window|
// works fine. So we take whatever is non-null!
xferable.init(this._getDocShell(typeof(window) == "undefined" ? this.mm.content.window : window)
.QueryInterface(Ci.nsILoadContext));
xferable.addDataFlavor(flavor);
Services.clipboard.getData(xferable, whichClipboard);
var data = {};
try {
xferable.getTransferData(flavor, data);
} catch (e) {}
data = data.value || null;
if (data == null)
return "";
return data.QueryInterface(Ci.nsISupportsString).data;
},
clipboardCopyString(str) {
Cc["@mozilla.org/widget/clipboardhelper;1"].
getService(Ci.nsIClipboardHelper).
copyString(str);
},
supportsSelectionClipboard() {
return Services.clipboard.supportsSelectionClipboard();
},
swapFactoryRegistration(cid, contractID, newFactory, oldFactory) {
newFactory = Cu.waiveXrays(newFactory);
oldFactory = Cu.waiveXrays(oldFactory);
var componentRegistrar = Components.manager.QueryInterface(Ci.nsIComponentRegistrar);
var unregisterFactory = newFactory;
var registerFactory = oldFactory;
if (cid == null) {
if (contractID != null) {
cid = componentRegistrar.contractIDToCID(contractID);
oldFactory = Components.manager.getClassObject(Cc[contractID],
Ci.nsIFactory);
} else {
return {"error": "trying to register a new contract ID: Missing contractID"};
}
unregisterFactory = oldFactory;
registerFactory = newFactory;
}
componentRegistrar.unregisterFactory(cid,
unregisterFactory);
// Restore the original factory.
componentRegistrar.registerFactory(cid,
"",
contractID,
registerFactory);
return {"cid": cid, "originalFactory": oldFactory};
},
_getElement(aWindow, id) {
return ((typeof(id) == "string") ?
aWindow.document.getElementById(id) : id);
},
dispatchEvent(aWindow, target, event) {
var el = this._getElement(aWindow, target);
return el.dispatchEvent(event);
},
get isDebugBuild() {
delete SpecialPowersAPI.prototype.isDebugBuild;
var debug = Cc["@mozilla.org/xpcom/debug;1"].getService(Ci.nsIDebug2);
return SpecialPowersAPI.prototype.isDebugBuild = debug.isDebugBuild;
},
assertionCount() {
var debugsvc = Cc["@mozilla.org/xpcom/debug;1"].getService(Ci.nsIDebug2);
return debugsvc.assertionCount;
},
/**
* Get the message manager associated with an <iframe mozbrowser>.
*/
getBrowserFrameMessageManager(aFrameElement) {
return this.wrap(aFrameElement.frameLoader.messageManager);
},
_getPrincipalFromArg(arg) {
let principal;
let secMan = Services.scriptSecurityManager;
if (typeof(arg) == "string") {
// It's an URL.
let uri = Services.io.newURI(arg);
principal = secMan.createCodebasePrincipal(uri, {});
} else if (arg.nodePrincipal) {
// It's a document.
// In some tests the arg is a wrapped DOM element, so we unwrap it first.
principal = unwrapIfWrapped(arg).nodePrincipal;
} else {
let uri = Services.io.newURI(arg.url);
let attrs = arg.originAttributes || {};
principal = secMan.createCodebasePrincipal(uri, attrs);
}
return principal;
},
addPermission(type, allow, arg, expireType, expireTime) {
let principal = this._getPrincipalFromArg(arg);
if (principal.isSystemPrincipal) {
return; // nothing to do
}
let permission;
if (typeof allow !== "boolean") {
permission = allow;
} else {
permission = allow ? Ci.nsIPermissionManager.ALLOW_ACTION
: Ci.nsIPermissionManager.DENY_ACTION;
}
var msg = {
"op": "add",
"type": type,
"permission": permission,
"principal": principal,
"expireType": (typeof expireType === "number") ? expireType : 0,
"expireTime": (typeof expireTime === "number") ? expireTime : 0,
};
this._sendSyncMessage("SPPermissionManager", msg);
},
removePermission(type, arg) {
let principal = this._getPrincipalFromArg(arg);
if (principal.isSystemPrincipal) {
return; // nothing to do
}
var msg = {
"op": "remove",
"type": type,
"principal": principal,
};
this._sendSyncMessage("SPPermissionManager", msg);
},
hasPermission(type, arg) {
let principal = this._getPrincipalFromArg(arg);
if (principal.isSystemPrincipal) {
return true; // system principals have all permissions
}
var msg = {
"op": "has",
"type": type,
"principal": principal,
};
return this._sendSyncMessage("SPPermissionManager", msg)[0];
},
testPermission(type, value, arg) {
let principal = this._getPrincipalFromArg(arg);
if (principal.isSystemPrincipal) {
return true; // system principals have all permissions
}
var msg = {
"op": "test",
"type": type,
"value": value,
"principal": principal,
};
return this._sendSyncMessage("SPPermissionManager", msg)[0];
},
isContentWindowPrivate(win) {
return PrivateBrowsingUtils.isContentWindowPrivate(win);
},
notifyObserversInParentProcess(subject, topic, data) {
if (subject) {
throw new Error("Can't send subject to another process!");
}
if (this.isMainProcess()) {
this.notifyObservers(subject, topic, data);
return;
}
var msg = {
"op": "notify",
"observerTopic": topic,
"observerData": data,
};
this._sendSyncMessage("SPObserverService", msg);
},
removeAllServiceWorkerData() {
return wrapIfUnwrapped(ServiceWorkerCleanUp.removeAll());
},
removeServiceWorkerDataForExampleDomain() {
return wrapIfUnwrapped(ServiceWorkerCleanUp.removeFromHost("example.com"));
},
cleanUpSTSData(origin, flags) {
return this._sendSyncMessage("SPCleanUpSTSData", {origin, flags: flags || 0});
},
requestDumpCoverageCounters(cb) {
// We want to avoid a roundtrip between child and parent.
if (!PerTestCoverageUtils.enabled) {
return Promise.resolve();
}
return new Promise(resolve => {
let messageListener = _ => {
this._removeMessageListener("SPRequestDumpCoverageCounters", messageListener);
resolve();
};
this._addMessageListener("SPRequestDumpCoverageCounters", messageListener);
this._sendAsyncMessage("SPRequestDumpCoverageCounters", {});
});
},
requestResetCoverageCounters(cb) {
// We want to avoid a roundtrip between child and parent.
if (!PerTestCoverageUtils.enabled) {
return Promise.resolve();
}
return new Promise(resolve => {
let messageListener = _ => {
this._removeMessageListener("SPRequestResetCoverageCounters", messageListener);
resolve();
};
this._addMessageListener("SPRequestResetCoverageCounters", messageListener);
this._sendAsyncMessage("SPRequestResetCoverageCounters", {});
});
},
_nextExtensionID: 0,
_extensionListeners: null,
loadExtension(ext, handler) {
if (this._extensionListeners == null) {
this._extensionListeners = new Set();
this._addMessageListener("SPExtensionMessage", msg => {
for (let listener of this._extensionListeners) {
try {
listener(msg);
} catch (e) {
Cu.reportError(e);
}
}
});
}
// Note, this is not the addon is as used by the AddonManager etc,
// this is just an identifier used for specialpowers messaging
// between this content process and the chrome process.
let id = this._nextExtensionID++;
let resolveStartup, resolveUnload, rejectStartup;
let startupPromise = new Promise((resolve, reject) => {
resolveStartup = resolve;
rejectStartup = reject;
});
let unloadPromise = new Promise(resolve => { resolveUnload = resolve; });
startupPromise.catch(() => {
this._extensionListeners.delete(listener);
});
handler = Cu.waiveXrays(handler);
ext = Cu.waiveXrays(ext);
let sp = this;
let state = "uninitialized";
let extension = {
get state() { return state; },
startup() {
state = "pending";
sp._sendAsyncMessage("SPStartupExtension", {id});
return startupPromise;
},
unload() {
state = "unloading";
sp._sendAsyncMessage("SPUnloadExtension", {id});
return unloadPromise;
},
sendMessage(...args) {
sp._sendAsyncMessage("SPExtensionMessage", {id, args});
},
};
this._sendAsyncMessage("SPLoadExtension", {ext, id});
let listener = (msg) => {
if (msg.data.id == id) {
if (msg.data.type == "extensionStarted") {
state = "running";
resolveStartup();
} else if (msg.data.type == "extensionSetId") {
extension.id = msg.data.args[0];
extension.uuid = msg.data.args[1];
} else if (msg.data.type == "extensionFailed") {
state = "failed";
rejectStartup("startup failed");
} else if (msg.data.type == "extensionUnloaded") {
this._extensionListeners.delete(listener);
state = "unloaded";
resolveUnload();
} else if (msg.data.type in handler) {
handler[msg.data.type](...Cu.cloneInto(msg.data.args, this.window));
} else {
dump(`Unexpected: ${msg.data.type}\n`);
}
}
};
this._extensionListeners.add(listener);
return extension;
},
invalidateExtensionStorageCache() {
this.notifyObserversInParentProcess(null, "extension-invalidate-storage-cache", "");
},
allowMedia(window, enable) {
this._getDocShell(window).allowMedia = enable;
},
createChromeCache(name, url) {
let principal = this._getPrincipalFromArg(url);
return wrapIfUnwrapped(new this.mm.content.CacheStorage(name, principal));
},
loadChannelAndReturnStatus(url, loadUsingSystemPrincipal) {
const BinaryInputStream =
Components.Constructor("@mozilla.org/binaryinputstream;1",
"nsIBinaryInputStream",
"setInputStream");
return new Promise(function(resolve) {
let listener = {
httpStatus: 0,
onStartRequest(request, context) {
request.QueryInterface(Ci.nsIHttpChannel);
this.httpStatus = request.responseStatus;
},
onDataAvailable(request, context, stream, offset, count) {
new BinaryInputStream(stream).readByteArray(count);
},
onStopRequest(request, context, status) {
/* testing here that the redirect was not followed. If it was followed
we would see a http status of 200 and status of NS_OK */
let httpStatus = this.httpStatus;
resolve({status, httpStatus});
},
};
let uri = NetUtil.newURI(url);
let channel = NetUtil.newChannel({uri, loadUsingSystemPrincipal});
channel.loadFlags |= Ci.nsIChannel.LOAD_DOCUMENT_URI;
channel.QueryInterface(Ci.nsIHttpChannelInternal);
channel.documentURI = uri;
channel.asyncOpen2(listener);
});
},
_pu: null,
get ParserUtils() {
if (this._pu != null)
return this._pu;
let pu = Cc["@mozilla.org/parserutils;1"].getService(Ci.nsIParserUtils);
// We need to create and return our own wrapper.
this._pu = {
sanitize(src, flags) {
return pu.sanitize(src, flags);
},
convertToPlainText(src, flags, wrapCol) {
return pu.convertToPlainText(src, flags, wrapCol);
},
parseFragment(fragment, flags, isXML, baseURL, element) {
let baseURI = baseURL ? NetUtil.newURI(baseURL) : null;
return pu.parseFragment(unwrapIfWrapped(fragment),
flags, isXML, baseURI,
unwrapIfWrapped(element));
},
};
return this._pu;
},
createDOMWalker(node, showAnonymousContent) {
node = unwrapIfWrapped(node);
let walker = Cc["@mozilla.org/inspector/deep-tree-walker;1"].
createInstance(Ci.inIDeepTreeWalker);
walker.showAnonymousContent = showAnonymousContent;
walker.init(node.ownerDocument, NodeFilter.SHOW_ALL);
walker.currentNode = node;
return {
get firstChild() {
return wrapIfUnwrapped(walker.firstChild());
},
get lastChild() {
return wrapIfUnwrapped(walker.lastChild());
},
};
},
observeMutationEvents(mo, node, nativeAnonymousChildList, subtree) {
unwrapIfWrapped(mo).observe(unwrapIfWrapped(node),
{nativeAnonymousChildList, subtree});
},
doCommand(window, cmd) {
return this._getDocShell(window).doCommand(cmd);
},
setCommandNode(window, node) {
return this._getDocShell(window).contentViewer
.QueryInterface(Ci.nsIContentViewerEdit)
.setCommandNode(node);
},
/* Bug 1339006 Runnables of nsIURIClassifier.classify may be labeled by
* SystemGroup, but some test cases may run as web content. That would assert
* when trying to enter web content from a runnable labeled by the
* SystemGroup. To avoid that, we run classify from SpecialPowers which is
* chrome-privileged and allowed to run inside SystemGroup
*/
doUrlClassify(principal, eventTarget, tpEnabled, callback) {
let classifierService =
Cc["@mozilla.org/url-classifier/dbservice;1"].getService(Ci.nsIURIClassifier);
let wrapCallback = (...args) => {
Services.tm.dispatchToMainThread(() => {
if (typeof callback == "function") {
callback(...args);
} else {
callback.onClassifyComplete.call(undefined, ...args);
}
});
};
return classifierService.classify(unwrapIfWrapped(principal), eventTarget,
tpEnabled, wrapCallback);
},
// TODO: Bug 1353701 - Supports custom event target for labelling.
doUrlClassifyLocal(uri, tables, callback) {
let classifierService =
Cc["@mozilla.org/url-classifier/dbservice;1"].getService(Ci.nsIURIClassifier);
let wrapCallback = (...args) => {
Services.tm.dispatchToMainThread(() => {
if (typeof callback == "function") {
callback(...args);
} else {
callback.onClassifyComplete.call(undefined, ...args);
}
});
};
return classifierService.asyncClassifyLocalWithTables(unwrapIfWrapped(uri),
tables, [], [],
wrapCallback);
},
EARLY_BETA_OR_EARLIER: AppConstants.EARLY_BETA_OR_EARLIER,
};
this.SpecialPowersAPI = SpecialPowersAPI;
this.bindDOMWindowUtils = bindDOMWindowUtils;