summaryrefslogtreecommitdiffstats
path: root/toolkit/modules/PermissionsUtils.jsm
diff options
context:
space:
mode:
authorMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
committerMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
commit5f8de423f190bbb79a62f804151bc24824fa32d8 (patch)
tree10027f336435511475e392454359edea8e25895d /toolkit/modules/PermissionsUtils.jsm
parent49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff)
downloadUXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip
Add m-esr52 at 52.6.0
Diffstat (limited to 'toolkit/modules/PermissionsUtils.jsm')
-rw-r--r--toolkit/modules/PermissionsUtils.jsm99
1 files changed, 99 insertions, 0 deletions
diff --git a/toolkit/modules/PermissionsUtils.jsm b/toolkit/modules/PermissionsUtils.jsm
new file mode 100644
index 000000000..dfed76f0c
--- /dev/null
+++ b/toolkit/modules/PermissionsUtils.jsm
@@ -0,0 +1,99 @@
+// This Source Code Form is subject to the terms of the Mozilla Public
+// License, v. 2.0. If a copy of the MPL was not distributed with this
+// file, You can obtain one at http://mozilla.org/MPL/2.0/.
+
+this.EXPORTED_SYMBOLS = ["PermissionsUtils"];
+
+const {classes: Cc, interfaces: Ci, utils: Cu, results: Cr} = Components;
+
+Cu.import("resource://gre/modules/Services.jsm");
+Cu.import("resource://gre/modules/BrowserUtils.jsm")
+
+
+var gImportedPrefBranches = new Set();
+
+function importPrefBranch(aPrefBranch, aPermission, aAction) {
+ let list = Services.prefs.getChildList(aPrefBranch, {});
+
+ for (let pref of list) {
+ let origins = "";
+ try {
+ origins = Services.prefs.getCharPref(pref);
+ } catch (e) {}
+
+ if (!origins)
+ continue;
+
+ origins = origins.split(",");
+
+ for (let origin of origins) {
+ let principals = [];
+ try {
+ principals = [ Services.scriptSecurityManager.createCodebasePrincipalFromOrigin(origin) ];
+ } catch (e) {
+ // This preference used to contain a list of hosts. For back-compat
+ // reasons, we convert these hosts into http:// and https:// permissions
+ // on default ports.
+ try {
+ let httpURI = Services.io.newURI("http://" + origin, null, null);
+ let httpsURI = Services.io.newURI("https://" + origin, null, null);
+
+ principals = [
+ Services.scriptSecurityManager.createCodebasePrincipal(httpURI, {}),
+ Services.scriptSecurityManager.createCodebasePrincipal(httpsURI, {})
+ ];
+ } catch (e2) {}
+ }
+
+ for (let principal of principals) {
+ try {
+ Services.perms.addFromPrincipal(principal, aPermission, aAction);
+ } catch (e) {}
+ }
+ }
+
+ Services.prefs.setCharPref(pref, "");
+ }
+}
+
+
+this.PermissionsUtils = {
+ /**
+ * Import permissions from perferences to the Permissions Manager. After being
+ * imported, all processed permissions will be set to an empty string.
+ * Perferences are only processed once during the application's
+ * lifetime - it's safe to call this multiple times without worrying about
+ * doing unnecessary work, as the preferences branch will only be processed
+ * the first time.
+ *
+ * @param aPrefBranch Preferences branch to import from. The preferences
+ * under this branch can specify whitelist (ALLOW_ACTION)
+ * or blacklist (DENY_ACTION) additions using perference
+ * names of the form:
+ * * <BRANCH>.whitelist.add.<ID>
+ * * <BRANCH>.blacklist.add.<ID>
+ * Where <ID> can be any valid preference name.
+ * The value is expected to be a comma separated list of
+ * host named. eg:
+ * * something.example.com
+ * * foo.exmaple.com,bar.example.com
+ *
+ * @param aPermission Permission name to be passsed to the Permissions
+ * Manager.
+ */
+ importFromPrefs: function(aPrefBranch, aPermission) {
+ if (!aPrefBranch.endsWith("."))
+ aPrefBranch += ".";
+
+ // Ensure we only import this pref branch once.
+ if (gImportedPrefBranches.has(aPrefBranch))
+ return;
+
+ importPrefBranch(aPrefBranch + "whitelist.add", aPermission,
+ Services.perms.ALLOW_ACTION);
+ importPrefBranch(aPrefBranch + "blacklist.add", aPermission,
+ Services.perms.DENY_ACTION);
+
+ gImportedPrefBranches.add(aPrefBranch);
+ }
+};