diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /browser/modules/Feeds.jsm | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'browser/modules/Feeds.jsm')
-rw-r--r-- | browser/modules/Feeds.jsm | 104 |
1 files changed, 104 insertions, 0 deletions
diff --git a/browser/modules/Feeds.jsm b/browser/modules/Feeds.jsm new file mode 100644 index 000000000..179d2b83d --- /dev/null +++ b/browser/modules/Feeds.jsm @@ -0,0 +1,104 @@ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +"use strict"; + +this.EXPORTED_SYMBOLS = [ "Feeds" ]; + +Components.utils.import("resource://gre/modules/XPCOMUtils.jsm"); +Components.utils.import("resource://gre/modules/Services.jsm"); + +XPCOMUtils.defineLazyModuleGetter(this, "BrowserUtils", + "resource://gre/modules/BrowserUtils.jsm"); +XPCOMUtils.defineLazyModuleGetter(this, "RecentWindow", + "resource:///modules/RecentWindow.jsm"); + +const { interfaces: Ci, classes: Cc } = Components; + +this.Feeds = { + init() { + let mm = Cc["@mozilla.org/globalmessagemanager;1"].getService(Ci.nsIMessageListenerManager); + mm.addMessageListener("WCCR:registerProtocolHandler", this); + mm.addMessageListener("WCCR:registerContentHandler", this); + + Services.ppmm.addMessageListener("WCCR:setAutoHandler", this); + Services.ppmm.addMessageListener("FeedConverter:addLiveBookmark", this); + }, + + receiveMessage(aMessage) { + let data = aMessage.data; + switch (aMessage.name) { + case "WCCR:registerProtocolHandler": { + let registrar = Cc["@mozilla.org/embeddor.implemented/web-content-handler-registrar;1"]. + getService(Ci.nsIWebContentHandlerRegistrar); + registrar.registerProtocolHandler(data.protocol, data.uri, data.title, + aMessage.target); + break; + } + + case "WCCR:registerContentHandler": { + let registrar = Cc["@mozilla.org/embeddor.implemented/web-content-handler-registrar;1"]. + getService(Ci.nsIWebContentHandlerRegistrar); + registrar.registerContentHandler(data.contentType, data.uri, data.title, + aMessage.target); + break; + } + + case "WCCR:setAutoHandler": { + let registrar = Cc["@mozilla.org/embeddor.implemented/web-content-handler-registrar;1"]. + getService(Ci.nsIWebContentConverterService); + registrar.setAutoHandler(data.contentType, data.handler); + break; + } + + case "FeedConverter:addLiveBookmark": { + let topWindow = RecentWindow.getMostRecentBrowserWindow(); + topWindow.PlacesCommandHook.addLiveBookmark(data.spec, data.title, data.subtitle) + .catch(Components.utils.reportError); + break; + } + } + }, + + /** + * isValidFeed: checks whether the given data represents a valid feed. + * + * @param aLink + * An object representing a feed with title, href and type. + * @param aPrincipal + * The principal of the document, used for security check. + * @param aIsFeed + * Whether this is already a known feed or not, if true only a security + * check will be performed. + */ + isValidFeed: function(aLink, aPrincipal, aIsFeed) { + if (!aLink || !aPrincipal) + return false; + + var type = aLink.type.toLowerCase().replace(/^\s+|\s*(?:;.*)?$/g, ""); + if (!aIsFeed) { + aIsFeed = (type == "application/rss+xml" || + type == "application/atom+xml"); + } + + if (aIsFeed) { + // re-create the principal as it may be a CPOW. + // once this can't be a CPOW anymore, we should just use aPrincipal instead + // of creating a new one. + let principalURI = BrowserUtils.makeURIFromCPOW(aPrincipal.URI); + let principalToCheck = + Services.scriptSecurityManager.createCodebasePrincipal(principalURI, aPrincipal.originAttributes); + try { + BrowserUtils.urlSecurityCheck(aLink.href, principalToCheck, + Ci.nsIScriptSecurityManager.DISALLOW_INHERIT_PRINCIPAL); + return type || "application/rss+xml"; + } + catch (ex) { + } + } + + return null; + }, + +}; |