mirror of
https://github.com/Feodor2/Mypal68.git
synced 2025-06-19 07:15:36 -04:00
1187 lines
36 KiB
JavaScript
1187 lines
36 KiB
JavaScript
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
// Services = object with smart getters for common XPCOM services
|
|
var { AppConstants } = ChromeUtils.import(
|
|
"resource://gre/modules/AppConstants.jsm"
|
|
);
|
|
var { Services } = ChromeUtils.import("resource://gre/modules/Services.jsm");
|
|
var { XPCOMUtils } = ChromeUtils.import(
|
|
"resource://gre/modules/XPCOMUtils.jsm"
|
|
);
|
|
|
|
XPCOMUtils.defineLazyModuleGetters(this, {
|
|
BrowserWindowTracker: "resource:///modules/BrowserWindowTracker.jsm",
|
|
ContextualIdentityService:
|
|
"resource://gre/modules/ContextualIdentityService.jsm",
|
|
ExtensionSettingsStore: "resource://gre/modules/ExtensionSettingsStore.jsm",
|
|
PrivateBrowsingUtils: "resource://gre/modules/PrivateBrowsingUtils.jsm",
|
|
ShellService: "resource:///modules/ShellService.jsm",
|
|
});
|
|
|
|
XPCOMUtils.defineLazyServiceGetter(
|
|
this,
|
|
"aboutNewTabService",
|
|
"@mozilla.org/browser/aboutnewtab-service;1",
|
|
"nsIAboutNewTabService"
|
|
);
|
|
|
|
XPCOMUtils.defineLazyGetter(this, "ReferrerInfo", () =>
|
|
Components.Constructor(
|
|
"@mozilla.org/referrer-info;1",
|
|
"nsIReferrerInfo",
|
|
"init"
|
|
)
|
|
);
|
|
|
|
Object.defineProperty(this, "BROWSER_NEW_TAB_URL", {
|
|
enumerable: true,
|
|
get() {
|
|
if (PrivateBrowsingUtils.isWindowPrivate(window)) {
|
|
if (
|
|
!PrivateBrowsingUtils.permanentPrivateBrowsing &&
|
|
!aboutNewTabService.overridden
|
|
) {
|
|
return "about:privatebrowsing";
|
|
}
|
|
// If an extension controls the setting and does not have private
|
|
// browsing permission, use the default setting.
|
|
let extensionControlled = Services.prefs.getBoolPref(
|
|
"browser.newtab.extensionControlled",
|
|
false
|
|
);
|
|
let privateAllowed = Services.prefs.getBoolPref(
|
|
"browser.newtab.privateAllowed",
|
|
false
|
|
);
|
|
// There is a potential on upgrade that the prefs are not set yet, so we double check
|
|
// for moz-extension.
|
|
if (
|
|
!privateAllowed &&
|
|
(extensionControlled ||
|
|
aboutNewTabService.newTabURL.startsWith("moz-extension://"))
|
|
) {
|
|
return "about:privatebrowsing";
|
|
}
|
|
}
|
|
return aboutNewTabService.newTabURL;
|
|
},
|
|
});
|
|
|
|
var TAB_DROP_TYPE = "application/x-moz-tabbrowser-tab";
|
|
|
|
var gBidiUI = false;
|
|
|
|
/**
|
|
* Determines whether the given url is considered a special URL for new tabs.
|
|
*/
|
|
function isBlankPageURL(aURL) {
|
|
return (
|
|
aURL == "about:blank" ||
|
|
aURL == "about:home" ||
|
|
aURL == "about:welcome" ||
|
|
aURL == BROWSER_NEW_TAB_URL
|
|
);
|
|
}
|
|
|
|
function getTopWin(skipPopups) {
|
|
// If this is called in a browser window, use that window regardless of
|
|
// whether it's the frontmost window, since commands can be executed in
|
|
// background windows (bug 626148).
|
|
if (
|
|
top.document.documentElement.getAttribute("windowtype") ==
|
|
"navigator:browser" &&
|
|
(!skipPopups || top.toolbar.visible)
|
|
) {
|
|
return top;
|
|
}
|
|
|
|
return BrowserWindowTracker.getTopWindow({
|
|
private: PrivateBrowsingUtils.isWindowPrivate(window),
|
|
allowPopups: !skipPopups,
|
|
});
|
|
}
|
|
|
|
function doGetProtocolFlags(aURI) {
|
|
let handler = Services.io.getProtocolHandler(aURI.scheme);
|
|
// see DoGetProtocolFlags in nsIProtocolHandler.idl
|
|
return handler instanceof Ci.nsIProtocolHandlerWithDynamicFlags
|
|
? handler
|
|
.QueryInterface(Ci.nsIProtocolHandlerWithDynamicFlags)
|
|
.getFlagsForURI(aURI)
|
|
: handler.protocolFlags;
|
|
}
|
|
|
|
/**
|
|
* openUILink handles clicks on UI elements that cause URLs to load.
|
|
*
|
|
* As the third argument, you may pass an object with the same properties as
|
|
* accepted by openUILinkIn, plus "ignoreButton" and "ignoreAlt".
|
|
*
|
|
* @param url {string}
|
|
* @param event {Event | Object} Event or JSON object representing an Event
|
|
* @param {Boolean | Object} aIgnoreButton
|
|
* @param {Boolean} aIgnoreButton
|
|
* @param {Boolean} aIgnoreAlt
|
|
* @param {Boolean} aAllowThirdPartyFixup
|
|
* @param {Object} aPostData
|
|
* @param {Object} aReferrerInfo
|
|
*/
|
|
function openUILink(
|
|
url,
|
|
event,
|
|
aIgnoreButton,
|
|
aIgnoreAlt,
|
|
aAllowThirdPartyFixup,
|
|
aPostData,
|
|
aReferrerInfo
|
|
) {
|
|
event = getRootEvent(event);
|
|
let params;
|
|
|
|
if (aIgnoreButton && typeof aIgnoreButton == "object") {
|
|
params = aIgnoreButton;
|
|
|
|
// don't forward "ignoreButton" and "ignoreAlt" to openUILinkIn
|
|
aIgnoreButton = params.ignoreButton;
|
|
aIgnoreAlt = params.ignoreAlt;
|
|
delete params.ignoreButton;
|
|
delete params.ignoreAlt;
|
|
} else {
|
|
params = {
|
|
allowThirdPartyFixup: aAllowThirdPartyFixup,
|
|
postData: aPostData,
|
|
referrerInfo: aReferrerInfo,
|
|
initiatingDoc: event ? event.target.ownerDocument : null,
|
|
};
|
|
}
|
|
|
|
if (!params.triggeringPrincipal) {
|
|
throw new Error(
|
|
"Required argument triggeringPrincipal missing within openUILink"
|
|
);
|
|
}
|
|
|
|
let where = whereToOpenLink(event, aIgnoreButton, aIgnoreAlt);
|
|
openUILinkIn(url, where, params);
|
|
}
|
|
|
|
// Utility function to check command events for potential middle-click events
|
|
// from checkForMiddleClick and unwrap them.
|
|
function getRootEvent(aEvent) {
|
|
// Part of the fix for Bug 1523813.
|
|
// Middle-click events arrive here wrapped in different numbers (1-2) of
|
|
// command events, depending on the button originally clicked.
|
|
if (!aEvent) {
|
|
return aEvent;
|
|
}
|
|
let tempEvent = aEvent;
|
|
while (tempEvent.sourceEvent) {
|
|
if (tempEvent.sourceEvent.button == 1) {
|
|
aEvent = tempEvent.sourceEvent;
|
|
break;
|
|
}
|
|
tempEvent = tempEvent.sourceEvent;
|
|
}
|
|
return aEvent;
|
|
}
|
|
|
|
/**
|
|
* whereToOpenLink() looks at an event to decide where to open a link.
|
|
*
|
|
* The event may be a mouse event (click, double-click, middle-click) or keypress event (enter).
|
|
*
|
|
* On Windows, the modifiers are:
|
|
* Ctrl new tab, selected
|
|
* Shift new window
|
|
* Ctrl+Shift new tab, in background
|
|
* Alt save
|
|
*
|
|
* Middle-clicking is the same as Ctrl+clicking (it opens a new tab).
|
|
*
|
|
* Exceptions:
|
|
* - Alt is ignored for menu items selected using the keyboard so you don't accidentally save stuff.
|
|
* (Currently, the Alt isn't sent here at all for menu items, but that will change in bug 126189.)
|
|
* - Alt is hard to use in context menus, because pressing Alt closes the menu.
|
|
* - Alt can't be used on the bookmarks toolbar because Alt is used for "treat this as something draggable".
|
|
* - The button is ignored for the middle-click-paste-URL feature, since it's always a middle-click.
|
|
*
|
|
* @param e {Event|Object} Event or JSON Object
|
|
* @param ignoreButton {Boolean}
|
|
* @param ignoreAlt {Boolean}
|
|
* @returns {"current" | "tabshifted" | "tab" | "save" | "window"}
|
|
*/
|
|
function whereToOpenLink(e, ignoreButton, ignoreAlt) {
|
|
// This method must treat a null event like a left click without modifier keys (i.e.
|
|
// e = { shiftKey:false, ctrlKey:false, metaKey:false, altKey:false, button:0 })
|
|
// for compatibility purposes.
|
|
if (!e) {
|
|
return "current";
|
|
}
|
|
|
|
e = getRootEvent(e);
|
|
|
|
var shift = e.shiftKey;
|
|
var ctrl = e.ctrlKey;
|
|
var meta = e.metaKey;
|
|
var alt = e.altKey && !ignoreAlt;
|
|
|
|
// ignoreButton allows "middle-click paste" to use function without always opening in a new window.
|
|
var middle = !ignoreButton && e.button == 1;
|
|
var middleUsesTabs = Services.prefs.getBoolPref(
|
|
"browser.tabs.opentabfor.middleclick",
|
|
true
|
|
);
|
|
|
|
// Don't do anything special with right-mouse clicks. They're probably clicks on context menu items.
|
|
|
|
var metaKey = AppConstants.platform == "macosx" ? meta : ctrl;
|
|
if (metaKey || (middle && middleUsesTabs)) {
|
|
return shift ? "tabshifted" : "tab";
|
|
}
|
|
|
|
if (alt && Services.prefs.getBoolPref("browser.altClickSave", false)) {
|
|
return "save";
|
|
}
|
|
|
|
if (shift || (middle && !middleUsesTabs)) {
|
|
return "window";
|
|
}
|
|
|
|
return "current";
|
|
}
|
|
|
|
/* openTrustedLinkIn will attempt to open the given URI using the SystemPrincipal
|
|
* as the trigeringPrincipal, unless a more specific Principal is provided.
|
|
*
|
|
* See openUILinkIn for a discussion of parameters
|
|
*/
|
|
function openTrustedLinkIn(url, where, aParams) {
|
|
var params = aParams;
|
|
|
|
if (!params) {
|
|
params = {};
|
|
}
|
|
|
|
if (!params.triggeringPrincipal) {
|
|
params.triggeringPrincipal = Services.scriptSecurityManager.getSystemPrincipal();
|
|
}
|
|
|
|
openUILinkIn(url, where, params);
|
|
}
|
|
|
|
/* openWebLinkIn will attempt to open the given URI using the NullPrincipal
|
|
* as the triggeringPrincipal, unless a more specific Principal is provided.
|
|
*
|
|
* See openUILinkIn for a discussion of parameters
|
|
*/
|
|
function openWebLinkIn(url, where, params) {
|
|
if (!params) {
|
|
params = {};
|
|
}
|
|
|
|
if (!params.triggeringPrincipal) {
|
|
params.triggeringPrincipal = Services.scriptSecurityManager.createNullPrincipal(
|
|
{}
|
|
);
|
|
}
|
|
if (params.triggeringPrincipal.isSystemPrincipal) {
|
|
throw new Error(
|
|
"System principal should never be passed into openWebLinkIn()"
|
|
);
|
|
}
|
|
|
|
openUILinkIn(url, where, params);
|
|
}
|
|
|
|
/* openUILinkIn opens a URL in a place specified by the parameter |where|.
|
|
*
|
|
* |where| can be:
|
|
* "current" current tab (if there aren't any browser windows, then in a new window instead)
|
|
* "tab" new tab (if there aren't any browser windows, then in a new window instead)
|
|
* "tabshifted" same as "tab" but in background if default is to select new tabs, and vice versa
|
|
* "window" new window
|
|
* "save" save to disk (with no filename hint!)
|
|
*
|
|
* DEPRECATION WARNING:
|
|
* USE -> openTrustedLinkIn(url, where, aParams) if the source is always
|
|
* a user event on a user- or product-specified URL (as
|
|
* opposed to URLs provided by a webpage)
|
|
* USE -> openWebLinkIn(url, where, aParams) if the URI should be loaded
|
|
* with a specific triggeringPrincipal, for instance, if
|
|
* the url was supplied by web content.
|
|
* DEPRECATED -> openUILinkIn(url, where, AllowThirdPartyFixup, aPostData, ...)
|
|
*
|
|
*
|
|
* allowThirdPartyFixup controls whether third party services such as Google's
|
|
* I Feel Lucky are allowed to interpret this URL. This parameter may be
|
|
* undefined, which is treated as false.
|
|
*
|
|
* Instead of aAllowThirdPartyFixup, you may also pass an object with any of
|
|
* these properties:
|
|
* allowThirdPartyFixup (boolean)
|
|
* postData (nsIInputStream)
|
|
* referrerInfo (nsIReferrerInfo)
|
|
* relatedToCurrent (boolean)
|
|
* skipTabAnimation (boolean)
|
|
* allowPinnedTabHostChange (boolean)
|
|
* allowPopups (boolean)
|
|
* userContextId (unsigned int)
|
|
* targetBrowser (XUL browser)
|
|
*/
|
|
function openUILinkIn(
|
|
url,
|
|
where,
|
|
aAllowThirdPartyFixup,
|
|
aPostData,
|
|
aReferrerInfo
|
|
) {
|
|
var params;
|
|
|
|
if (arguments.length == 3 && typeof arguments[2] == "object") {
|
|
params = aAllowThirdPartyFixup;
|
|
}
|
|
if (!params || !params.triggeringPrincipal) {
|
|
throw new Error(
|
|
"Required argument triggeringPrincipal missing within openUILinkIn"
|
|
);
|
|
}
|
|
|
|
params.fromChrome = true;
|
|
|
|
openLinkIn(url, where, params);
|
|
}
|
|
|
|
/* eslint-disable complexity */
|
|
function openLinkIn(url, where, params) {
|
|
if (!where || !url) {
|
|
return;
|
|
}
|
|
|
|
var aFromChrome = params.fromChrome;
|
|
var aAllowThirdPartyFixup = params.allowThirdPartyFixup;
|
|
var aPostData = params.postData;
|
|
var aCharset = params.charset;
|
|
var aReferrerInfo = params.referrerInfo
|
|
? params.referrerInfo
|
|
: new ReferrerInfo(Ci.nsIReferrerInfo.EMPTY, true, null);
|
|
var aRelatedToCurrent = params.relatedToCurrent;
|
|
var aAllowInheritPrincipal = !!params.allowInheritPrincipal;
|
|
var aAllowMixedContent = params.allowMixedContent;
|
|
var aForceAllowDataURI = params.forceAllowDataURI;
|
|
var aInBackground = params.inBackground;
|
|
var aInitiatingDoc = params.initiatingDoc;
|
|
var aIsPrivate = params.private;
|
|
var aSkipTabAnimation = params.skipTabAnimation;
|
|
var aAllowPinnedTabHostChange = !!params.allowPinnedTabHostChange;
|
|
var aAllowPopups = !!params.allowPopups;
|
|
var aUserContextId = params.userContextId;
|
|
var aIndicateErrorPageLoad = params.indicateErrorPageLoad;
|
|
var aPrincipal = params.originPrincipal;
|
|
var aStoragePrincipal = params.originStoragePrincipal;
|
|
var aTriggeringPrincipal = params.triggeringPrincipal;
|
|
var aCsp = params.csp;
|
|
var aForceAboutBlankViewerInCurrent = params.forceAboutBlankViewerInCurrent;
|
|
var aResolveOnNewTabCreated = params.resolveOnNewTabCreated;
|
|
|
|
if (!aTriggeringPrincipal) {
|
|
throw new Error("Must load with a triggering Principal");
|
|
}
|
|
|
|
if (where == "save") {
|
|
// TODO(1073187): propagate referrerPolicy.
|
|
// ContentClick.jsm passes isContentWindowPrivate for saveURL instead of passing a CPOW initiatingDoc
|
|
if ("isContentWindowPrivate" in params) {
|
|
saveURL(
|
|
url,
|
|
null,
|
|
null,
|
|
true,
|
|
true,
|
|
aReferrerInfo,
|
|
null,
|
|
params.isContentWindowPrivate,
|
|
aPrincipal
|
|
);
|
|
} else {
|
|
if (!aInitiatingDoc) {
|
|
Cu.reportError(
|
|
"openUILink/openLinkIn was called with " +
|
|
"where == 'save' but without initiatingDoc. See bug 814264."
|
|
);
|
|
return;
|
|
}
|
|
saveURL(url, null, null, true, true, aReferrerInfo, aInitiatingDoc);
|
|
}
|
|
return;
|
|
}
|
|
|
|
// Establish which window we'll load the link in.
|
|
let w;
|
|
if (where == "current" && params.targetBrowser) {
|
|
w = params.targetBrowser.ownerGlobal;
|
|
} else {
|
|
w = getTopWin();
|
|
}
|
|
// We don't want to open tabs in popups, so try to find a non-popup window in
|
|
// that case.
|
|
if ((where == "tab" || where == "tabshifted") && w && !w.toolbar.visible) {
|
|
w = getTopWin(true);
|
|
aRelatedToCurrent = false;
|
|
}
|
|
|
|
// Teach the principal about the right OA to use, e.g. in case when
|
|
// opening a link in a new private window, or in a new container tab.
|
|
// Please note we do not have to do that for SystemPrincipals and we
|
|
// can not do it for NullPrincipals since NullPrincipals are only
|
|
// identical if they actually are the same object (See Bug: 1346759)
|
|
function useOAForPrincipal(principal) {
|
|
if (principal && principal.isCodebasePrincipal) {
|
|
let attrs = {
|
|
userContextId: aUserContextId,
|
|
privateBrowsingId:
|
|
aIsPrivate || (w && PrivateBrowsingUtils.isWindowPrivate(w)),
|
|
firstPartyDomain: principal.originAttributes.firstPartyDomain,
|
|
};
|
|
return Services.scriptSecurityManager.principalWithOA(principal, attrs);
|
|
}
|
|
return principal;
|
|
}
|
|
aPrincipal = useOAForPrincipal(aPrincipal);
|
|
aStoragePrincipal = useOAForPrincipal(aStoragePrincipal);
|
|
aTriggeringPrincipal = useOAForPrincipal(aTriggeringPrincipal);
|
|
|
|
if (!w || where == "window") {
|
|
let features = "chrome,dialog=no,all";
|
|
if (aIsPrivate) {
|
|
features += ",private";
|
|
// To prevent regular browsing data from leaking to private browsing sites,
|
|
// strip the referrer when opening a new private window. (See Bug: 1409226)
|
|
aReferrerInfo = new ReferrerInfo(
|
|
aReferrerInfo.referrerPolicy,
|
|
false,
|
|
aReferrerInfo.originalReferrer
|
|
);
|
|
}
|
|
|
|
// This propagates to window.arguments.
|
|
var sa = Cc["@mozilla.org/array;1"].createInstance(Ci.nsIMutableArray);
|
|
|
|
var wuri = Cc["@mozilla.org/supports-string;1"].createInstance(
|
|
Ci.nsISupportsString
|
|
);
|
|
wuri.data = url;
|
|
|
|
let charset = null;
|
|
if (aCharset) {
|
|
charset = Cc["@mozilla.org/supports-string;1"].createInstance(
|
|
Ci.nsISupportsString
|
|
);
|
|
charset.data = "charset=" + aCharset;
|
|
}
|
|
|
|
var allowThirdPartyFixupSupports = Cc[
|
|
"@mozilla.org/supports-PRBool;1"
|
|
].createInstance(Ci.nsISupportsPRBool);
|
|
allowThirdPartyFixupSupports.data = aAllowThirdPartyFixup;
|
|
|
|
var userContextIdSupports = Cc[
|
|
"@mozilla.org/supports-PRUint32;1"
|
|
].createInstance(Ci.nsISupportsPRUint32);
|
|
userContextIdSupports.data = aUserContextId;
|
|
|
|
sa.appendElement(wuri);
|
|
sa.appendElement(charset);
|
|
sa.appendElement(aReferrerInfo);
|
|
sa.appendElement(aPostData);
|
|
sa.appendElement(allowThirdPartyFixupSupports);
|
|
sa.appendElement(userContextIdSupports);
|
|
sa.appendElement(aPrincipal);
|
|
sa.appendElement(aStoragePrincipal);
|
|
sa.appendElement(aTriggeringPrincipal);
|
|
sa.appendElement(null); // allowInheritPrincipal
|
|
sa.appendElement(aCsp);
|
|
|
|
const sourceWindow = w || window;
|
|
let win;
|
|
if (params.frameOuterWindowID != undefined && sourceWindow) {
|
|
// Only notify it as a WebExtensions' webNavigation.onCreatedNavigationTarget
|
|
// event if it contains the expected frameOuterWindowID params.
|
|
// (e.g. we should not notify it as a onCreatedNavigationTarget if the user is
|
|
// opening a new window using the keyboard shortcut).
|
|
const sourceTabBrowser = sourceWindow.gBrowser.selectedBrowser;
|
|
let delayedStartupObserver = aSubject => {
|
|
if (aSubject == win) {
|
|
Services.obs.removeObserver(
|
|
delayedStartupObserver,
|
|
"browser-delayed-startup-finished"
|
|
);
|
|
Services.obs.notifyObservers(
|
|
{
|
|
wrappedJSObject: {
|
|
url,
|
|
createdTabBrowser: win.gBrowser.selectedBrowser,
|
|
sourceTabBrowser,
|
|
sourceFrameOuterWindowID: params.frameOuterWindowID,
|
|
},
|
|
},
|
|
"webNavigation-createdNavigationTarget"
|
|
);
|
|
}
|
|
};
|
|
Services.obs.addObserver(
|
|
delayedStartupObserver,
|
|
"browser-delayed-startup-finished"
|
|
);
|
|
}
|
|
win = Services.ww.openWindow(
|
|
sourceWindow,
|
|
AppConstants.BROWSER_CHROME_URL,
|
|
null,
|
|
features,
|
|
sa
|
|
);
|
|
return;
|
|
}
|
|
|
|
// We're now committed to loading the link in an existing browser window.
|
|
|
|
// Raise the target window before loading the URI, since loading it may
|
|
// result in a new frontmost window (e.g. "javascript:window.open('');").
|
|
w.focus();
|
|
|
|
let targetBrowser;
|
|
let loadInBackground;
|
|
let uriObj;
|
|
|
|
if (where == "current") {
|
|
targetBrowser = params.targetBrowser || w.gBrowser.selectedBrowser;
|
|
loadInBackground = false;
|
|
|
|
try {
|
|
uriObj = Services.io.newURI(url);
|
|
} catch (e) {}
|
|
|
|
if (
|
|
w.gBrowser.getTabForBrowser(targetBrowser).pinned &&
|
|
!aAllowPinnedTabHostChange
|
|
) {
|
|
try {
|
|
// nsIURI.host can throw for non-nsStandardURL nsIURIs.
|
|
if (
|
|
!uriObj ||
|
|
(!uriObj.schemeIs("javascript") &&
|
|
targetBrowser.currentURI.host != uriObj.host)
|
|
) {
|
|
where = "tab";
|
|
loadInBackground = false;
|
|
}
|
|
} catch (err) {
|
|
where = "tab";
|
|
loadInBackground = false;
|
|
}
|
|
}
|
|
} else {
|
|
// 'where' is "tab" or "tabshifted", so we'll load the link in a new tab.
|
|
loadInBackground = aInBackground;
|
|
if (loadInBackground == null) {
|
|
loadInBackground = aFromChrome
|
|
? false
|
|
: Services.prefs.getBoolPref("browser.tabs.loadInBackground");
|
|
}
|
|
}
|
|
|
|
let focusUrlBar = false;
|
|
|
|
switch (where) {
|
|
case "current":
|
|
let flags = Ci.nsIWebNavigation.LOAD_FLAGS_NONE;
|
|
|
|
if (aAllowThirdPartyFixup) {
|
|
flags |= Ci.nsIWebNavigation.LOAD_FLAGS_ALLOW_THIRD_PARTY_FIXUP;
|
|
flags |= Ci.nsIWebNavigation.LOAD_FLAGS_FIXUP_SCHEME_TYPOS;
|
|
}
|
|
// LOAD_FLAGS_DISALLOW_INHERIT_PRINCIPAL isn't supported for javascript URIs,
|
|
// i.e. it causes them not to load at all. Callers should strip
|
|
// "javascript:" from pasted strings to prevent blank tabs
|
|
if (!aAllowInheritPrincipal) {
|
|
flags |= Ci.nsIWebNavigation.LOAD_FLAGS_DISALLOW_INHERIT_PRINCIPAL;
|
|
}
|
|
|
|
if (aAllowPopups) {
|
|
flags |= Ci.nsIWebNavigation.LOAD_FLAGS_ALLOW_POPUPS;
|
|
}
|
|
if (aIndicateErrorPageLoad) {
|
|
flags |= Ci.nsIWebNavigation.LOAD_FLAGS_ERROR_LOAD_CHANGES_RV;
|
|
}
|
|
if (aForceAllowDataURI) {
|
|
flags |= Ci.nsIWebNavigation.LOAD_FLAGS_FORCE_ALLOW_DATA_URI;
|
|
}
|
|
|
|
let { URI_INHERITS_SECURITY_CONTEXT } = Ci.nsIProtocolHandler;
|
|
if (
|
|
aForceAboutBlankViewerInCurrent &&
|
|
(!uriObj || doGetProtocolFlags(uriObj) & URI_INHERITS_SECURITY_CONTEXT)
|
|
) {
|
|
// Unless we know for sure we're not inheriting principals,
|
|
// force the about:blank viewer to have the right principal:
|
|
targetBrowser.createAboutBlankContentViewer(
|
|
aPrincipal,
|
|
aStoragePrincipal
|
|
);
|
|
}
|
|
|
|
targetBrowser.loadURI(url, {
|
|
triggeringPrincipal: aTriggeringPrincipal,
|
|
csp: aCsp,
|
|
flags,
|
|
referrerInfo: aReferrerInfo,
|
|
postData: aPostData,
|
|
userContextId: aUserContextId,
|
|
});
|
|
|
|
// Don't focus the content area if focus is in the address bar and we're
|
|
// loading the New Tab page.
|
|
focusUrlBar =
|
|
w.document.activeElement == w.gURLBar.inputField &&
|
|
w.isBlankPageURL(url);
|
|
break;
|
|
case "tabshifted":
|
|
loadInBackground = !loadInBackground;
|
|
// fall through
|
|
case "tab":
|
|
focusUrlBar =
|
|
!loadInBackground &&
|
|
w.isBlankPageURL(url) &&
|
|
!aboutNewTabService.willNotifyUser;
|
|
|
|
let tabUsedForLoad = w.gBrowser.loadOneTab(url, {
|
|
referrerInfo: aReferrerInfo,
|
|
charset: aCharset,
|
|
postData: aPostData,
|
|
inBackground: loadInBackground,
|
|
allowThirdPartyFixup: aAllowThirdPartyFixup,
|
|
relatedToCurrent: aRelatedToCurrent,
|
|
skipAnimation: aSkipTabAnimation,
|
|
allowMixedContent: aAllowMixedContent,
|
|
userContextId: aUserContextId,
|
|
originPrincipal: aPrincipal,
|
|
originStoragePrincipal: aStoragePrincipal,
|
|
triggeringPrincipal: aTriggeringPrincipal,
|
|
allowInheritPrincipal: aAllowInheritPrincipal,
|
|
csp: aCsp,
|
|
focusUrlBar,
|
|
});
|
|
targetBrowser = tabUsedForLoad.linkedBrowser;
|
|
|
|
if (aResolveOnNewTabCreated) {
|
|
aResolveOnNewTabCreated(targetBrowser);
|
|
}
|
|
|
|
if (params.frameOuterWindowID != undefined && w) {
|
|
// Only notify it as a WebExtensions' webNavigation.onCreatedNavigationTarget
|
|
// event if it contains the expected frameOuterWindowID params.
|
|
// (e.g. we should not notify it as a onCreatedNavigationTarget if the user is
|
|
// opening a new tab using the keyboard shortcut).
|
|
Services.obs.notifyObservers(
|
|
{
|
|
wrappedJSObject: {
|
|
url,
|
|
createdTabBrowser: targetBrowser,
|
|
sourceTabBrowser: w.gBrowser.selectedBrowser,
|
|
sourceFrameOuterWindowID: params.frameOuterWindowID,
|
|
},
|
|
},
|
|
"webNavigation-createdNavigationTarget"
|
|
);
|
|
}
|
|
break;
|
|
}
|
|
|
|
if (!focusUrlBar && targetBrowser == w.gBrowser.selectedBrowser) {
|
|
// Focus the content, but only if the browser used for the load is selected.
|
|
targetBrowser.focus();
|
|
}
|
|
}
|
|
|
|
// Used as an onclick handler for UI elements with link-like behavior.
|
|
// e.g. onclick="checkForMiddleClick(this, event);"
|
|
function checkForMiddleClick(node, event) {
|
|
// We should be using the disabled property here instead of the attribute,
|
|
// but some elements that this function is used with don't support it (e.g.
|
|
// menuitem).
|
|
if (node.getAttribute("disabled") == "true") {
|
|
return;
|
|
} // Do nothing
|
|
|
|
if (event.button == 1) {
|
|
/* Execute the node's oncommand or command.
|
|
*/
|
|
|
|
let cmdEvent = document.createEvent("xulcommandevent");
|
|
cmdEvent.initCommandEvent(
|
|
"command",
|
|
true,
|
|
true,
|
|
window,
|
|
0,
|
|
event.ctrlKey,
|
|
event.altKey,
|
|
event.shiftKey,
|
|
event.metaKey,
|
|
event,
|
|
event.mozInputSource
|
|
);
|
|
node.dispatchEvent(cmdEvent);
|
|
|
|
// If the middle-click was on part of a menu, close the menu.
|
|
// (Menus close automatically with left-click but not with middle-click.)
|
|
closeMenus(event.target);
|
|
}
|
|
}
|
|
|
|
// Populate a menu with user-context menu items. This method should be called
|
|
// by onpopupshowing passing the event as first argument.
|
|
function createUserContextMenu(
|
|
event,
|
|
{
|
|
isContextMenu = false,
|
|
excludeUserContextId = 0,
|
|
showDefaultTab = false,
|
|
useAccessKeys = true,
|
|
} = {}
|
|
) {
|
|
while (event.target.hasChildNodes()) {
|
|
event.target.firstChild.remove();
|
|
}
|
|
|
|
let bundle = Services.strings.createBundle(
|
|
"chrome://browser/locale/browser.properties"
|
|
);
|
|
let docfrag = document.createDocumentFragment();
|
|
|
|
// If we are excluding a userContextId, we want to add a 'no-container' item.
|
|
if (excludeUserContextId || showDefaultTab) {
|
|
let menuitem = document.createXULElement("menuitem");
|
|
menuitem.setAttribute("data-usercontextid", "0");
|
|
menuitem.setAttribute(
|
|
"label",
|
|
bundle.GetStringFromName("userContextNone.label")
|
|
);
|
|
menuitem.setAttribute(
|
|
"accesskey",
|
|
bundle.GetStringFromName("userContextNone.accesskey")
|
|
);
|
|
|
|
// We don't set an oncommand/command attribute because if we have
|
|
// to exclude a userContextId we are generating the contextMenu and
|
|
// isContextMenu will be true.
|
|
|
|
docfrag.appendChild(menuitem);
|
|
|
|
let menuseparator = document.createXULElement("menuseparator");
|
|
docfrag.appendChild(menuseparator);
|
|
}
|
|
|
|
ContextualIdentityService.getPublicIdentities().forEach(identity => {
|
|
if (identity.userContextId == excludeUserContextId) {
|
|
return;
|
|
}
|
|
|
|
let menuitem = document.createXULElement("menuitem");
|
|
menuitem.setAttribute("data-usercontextid", identity.userContextId);
|
|
menuitem.setAttribute(
|
|
"label",
|
|
ContextualIdentityService.getUserContextLabel(identity.userContextId)
|
|
);
|
|
|
|
if (identity.accessKey && useAccessKeys) {
|
|
menuitem.setAttribute(
|
|
"accesskey",
|
|
bundle.GetStringFromName(identity.accessKey)
|
|
);
|
|
}
|
|
|
|
menuitem.classList.add("menuitem-iconic");
|
|
menuitem.classList.add("identity-color-" + identity.color);
|
|
|
|
if (!isContextMenu) {
|
|
menuitem.setAttribute("command", "Browser:NewUserContextTab");
|
|
}
|
|
|
|
menuitem.classList.add("identity-icon-" + identity.icon);
|
|
|
|
docfrag.appendChild(menuitem);
|
|
});
|
|
|
|
if (!isContextMenu) {
|
|
docfrag.appendChild(document.createXULElement("menuseparator"));
|
|
|
|
let menuitem = document.createXULElement("menuitem");
|
|
menuitem.setAttribute(
|
|
"label",
|
|
bundle.GetStringFromName("userContext.aboutPage.label")
|
|
);
|
|
if (useAccessKeys) {
|
|
menuitem.setAttribute(
|
|
"accesskey",
|
|
bundle.GetStringFromName("userContext.aboutPage.accesskey")
|
|
);
|
|
}
|
|
menuitem.setAttribute("command", "Browser:OpenAboutContainers");
|
|
docfrag.appendChild(menuitem);
|
|
}
|
|
|
|
event.target.appendChild(docfrag);
|
|
return true;
|
|
}
|
|
|
|
// Closes all popups that are ancestors of the node.
|
|
function closeMenus(node) {
|
|
if ("tagName" in node) {
|
|
if (
|
|
node.namespaceURI ==
|
|
"http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul" &&
|
|
(node.tagName == "menupopup" || node.tagName == "popup")
|
|
) {
|
|
node.hidePopup();
|
|
}
|
|
|
|
closeMenus(node.parentNode);
|
|
}
|
|
}
|
|
|
|
/** This function takes in a key element and compares it to the keys pressed during an event.
|
|
*
|
|
* @param aEvent
|
|
* The KeyboardEvent event you want to compare against your key.
|
|
*
|
|
* @param aKey
|
|
* The <key> element checked to see if it was called in aEvent.
|
|
* For example, aKey can be a variable set to document.getElementById("key_close")
|
|
* to check if the close command key was pressed in aEvent.
|
|
*/
|
|
function eventMatchesKey(aEvent, aKey) {
|
|
let keyPressed = aKey.getAttribute("key").toLowerCase();
|
|
let keyModifiers = aKey.getAttribute("modifiers");
|
|
let modifiers = ["Alt", "Control", "Meta", "Shift"];
|
|
|
|
if (aEvent.key != keyPressed) {
|
|
return false;
|
|
}
|
|
let eventModifiers = modifiers.filter(modifier =>
|
|
aEvent.getModifierState(modifier)
|
|
);
|
|
// Check if aEvent has a modifier and aKey doesn't
|
|
if (eventModifiers.length > 0 && keyModifiers.length == 0) {
|
|
return false;
|
|
}
|
|
// Check whether aKey's modifiers match aEvent's modifiers
|
|
if (keyModifiers) {
|
|
keyModifiers = keyModifiers.split(/[\s,]+/);
|
|
// Capitalize first letter of aKey's modifers to compare to aEvent's modifier
|
|
keyModifiers.forEach(function(modifier, index) {
|
|
if (modifier == "accel") {
|
|
keyModifiers[index] =
|
|
AppConstants.platform == "macosx" ? "Meta" : "Control";
|
|
} else {
|
|
keyModifiers[index] = modifier[0].toUpperCase() + modifier.slice(1);
|
|
}
|
|
});
|
|
return modifiers.every(
|
|
modifier =>
|
|
keyModifiers.includes(modifier) == aEvent.getModifierState(modifier)
|
|
);
|
|
}
|
|
return true;
|
|
}
|
|
|
|
// Gather all descendent text under given document node.
|
|
function gatherTextUnder(root) {
|
|
var text = "";
|
|
var node = root.firstChild;
|
|
var depth = 1;
|
|
while (node && depth > 0) {
|
|
// See if this node is text.
|
|
if (node.nodeType == Node.TEXT_NODE) {
|
|
// Add this text to our collection.
|
|
text += " " + node.data;
|
|
} else if (node instanceof HTMLImageElement) {
|
|
// If it has an "alt" attribute, add that.
|
|
var altText = node.getAttribute("alt");
|
|
if (altText && altText != "") {
|
|
text += " " + altText;
|
|
}
|
|
}
|
|
// Find next node to test.
|
|
// First, see if this node has children.
|
|
if (node.hasChildNodes()) {
|
|
// Go to first child.
|
|
node = node.firstChild;
|
|
depth++;
|
|
} else {
|
|
// No children, try next sibling (or parent next sibling).
|
|
while (depth > 0 && !node.nextSibling) {
|
|
node = node.parentNode;
|
|
depth--;
|
|
}
|
|
if (node.nextSibling) {
|
|
node = node.nextSibling;
|
|
}
|
|
}
|
|
}
|
|
// Strip leading and tailing whitespace.
|
|
text = text.trim();
|
|
// Compress remaining whitespace.
|
|
text = text.replace(/\s+/g, " ");
|
|
return text;
|
|
}
|
|
|
|
// This function exists for legacy reasons.
|
|
function getShellService() {
|
|
return ShellService;
|
|
}
|
|
|
|
function isBidiEnabled() {
|
|
// first check the pref.
|
|
if (Services.prefs.getBoolPref("bidi.browser.ui", false)) {
|
|
return true;
|
|
}
|
|
|
|
// now see if the app locale is an RTL one.
|
|
const isRTL = Services.locale.isAppLocaleRTL;
|
|
|
|
if (isRTL) {
|
|
Services.prefs.setBoolPref("bidi.browser.ui", true);
|
|
}
|
|
return isRTL;
|
|
}
|
|
|
|
function openAboutDialog() {
|
|
for (let win of Services.wm.getEnumerator("Browser:About")) {
|
|
// Only open one about window (Bug 599573)
|
|
if (win.closed) {
|
|
continue;
|
|
}
|
|
win.focus();
|
|
return;
|
|
}
|
|
|
|
var features = "chrome,";
|
|
if (AppConstants.platform == "win") {
|
|
features += "centerscreen,dependent";
|
|
} else if (AppConstants.platform == "macosx") {
|
|
features += "resizable=no,minimizable=no";
|
|
} else {
|
|
features += "centerscreen,dependent,dialog=no";
|
|
}
|
|
|
|
window.openDialog("chrome://browser/content/aboutDialog.xul", "", features);
|
|
}
|
|
|
|
function openPreferences(paneID, extraArgs) {
|
|
// This function is duplicated from preferences.js.
|
|
function internalPrefCategoryNameToFriendlyName(aName) {
|
|
return (aName || "").replace(/^pane./, function(toReplace) {
|
|
return toReplace[4].toLowerCase();
|
|
});
|
|
}
|
|
|
|
let win = Services.wm.getMostRecentWindow("navigator:browser");
|
|
let friendlyCategoryName = internalPrefCategoryNameToFriendlyName(paneID);
|
|
let params;
|
|
if (extraArgs && extraArgs.urlParams) {
|
|
params = new URLSearchParams();
|
|
let urlParams = extraArgs.urlParams;
|
|
for (let name in urlParams) {
|
|
if (urlParams[name] !== undefined) {
|
|
params.set(name, urlParams[name]);
|
|
}
|
|
}
|
|
}
|
|
let preferencesURL =
|
|
"about:preferences" +
|
|
(params ? "?" + params : "") +
|
|
(friendlyCategoryName ? "#" + friendlyCategoryName : "");
|
|
let newLoad = true;
|
|
let browser = null;
|
|
if (!win) {
|
|
let windowArguments = Cc["@mozilla.org/array;1"].createInstance(
|
|
Ci.nsIMutableArray
|
|
);
|
|
let supportsStringPrefURL = Cc[
|
|
"@mozilla.org/supports-string;1"
|
|
].createInstance(Ci.nsISupportsString);
|
|
supportsStringPrefURL.data = preferencesURL;
|
|
windowArguments.appendElement(supportsStringPrefURL);
|
|
|
|
win = Services.ww.openWindow(
|
|
null,
|
|
AppConstants.BROWSER_CHROME_URL,
|
|
"_blank",
|
|
"chrome,dialog=no,all",
|
|
windowArguments
|
|
);
|
|
} else {
|
|
let shouldReplaceFragment = friendlyCategoryName
|
|
? "whenComparingAndReplace"
|
|
: "whenComparing";
|
|
newLoad = !win.switchToTabHavingURI(preferencesURL, true, {
|
|
ignoreFragment: shouldReplaceFragment,
|
|
replaceQueryString: true,
|
|
triggeringPrincipal: Services.scriptSecurityManager.getSystemPrincipal(),
|
|
});
|
|
browser = win.gBrowser.selectedBrowser;
|
|
}
|
|
|
|
if (newLoad) {
|
|
Services.obs.addObserver(function panesLoadedObs(prefWin, topic, data) {
|
|
if (!browser) {
|
|
browser = win.gBrowser.selectedBrowser;
|
|
}
|
|
if (prefWin != browser.contentWindow) {
|
|
return;
|
|
}
|
|
Services.obs.removeObserver(panesLoadedObs, "sync-pane-loaded");
|
|
}, "sync-pane-loaded");
|
|
} else if (paneID) {
|
|
browser.contentWindow.gotoPref(paneID);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Opens the troubleshooting information (about:support) page for this version
|
|
* of the application.
|
|
*/
|
|
function openTroubleshootingPage() {
|
|
openTrustedLinkIn("about:support", "tab");
|
|
}
|
|
|
|
/**
|
|
* Opens the feedback page for this version of the application.
|
|
*/
|
|
function openFeedbackPage() {
|
|
var url = Services.urlFormatter.formatURLPref("app.feedback.baseURL");
|
|
openTrustedLinkIn(url, "tab");
|
|
}
|
|
|
|
function openTourPage() {
|
|
let scope = {};
|
|
ChromeUtils.import("resource:///modules/UITour.jsm", scope);
|
|
openTrustedLinkIn(scope.UITour.url, "tab");
|
|
}
|
|
|
|
function buildHelpMenu() {
|
|
document.getElementById(
|
|
"feedbackPage"
|
|
).disabled = !Services.policies.isAllowed("feedbackCommands");
|
|
|
|
document.getElementById(
|
|
"helpSafeMode"
|
|
).disabled = !Services.policies.isAllowed("safeMode");
|
|
|
|
let supportMenu = Services.policies.getSupportMenu();
|
|
if (supportMenu) {
|
|
let menuitem = document.getElementById("helpPolicySupport");
|
|
menuitem.hidden = false;
|
|
menuitem.setAttribute("label", supportMenu.Title);
|
|
if ("AccessKey" in supportMenu) {
|
|
menuitem.setAttribute("accesskey", supportMenu.AccessKey);
|
|
}
|
|
document.getElementById("helpPolicySeparator").hidden = false;
|
|
}
|
|
|
|
// Enable/disable the "Report Web Forgery" menu item.
|
|
if (typeof gSafeBrowsing != "undefined") {
|
|
gSafeBrowsing.setReportPhishingMenu();
|
|
}
|
|
}
|
|
|
|
function isElementVisible(aElement) {
|
|
if (!aElement) {
|
|
return false;
|
|
}
|
|
|
|
// If aElement or a direct or indirect parent is hidden or collapsed,
|
|
// height, width or both will be 0.
|
|
var rect = aElement.getBoundingClientRect();
|
|
return rect.height > 0 && rect.width > 0;
|
|
}
|
|
|
|
function makeURLAbsolute(aBase, aUrl) {
|
|
// Note: makeURI() will throw if aUri is not a valid URI
|
|
return makeURI(aUrl, null, makeURI(aBase)).spec;
|
|
}
|
|
|
|
/**
|
|
* openNewTabWith: opens a new tab with the given URL.
|
|
*
|
|
* @param aURL
|
|
* The URL to open (as a string).
|
|
* @param aShiftKey
|
|
* True if shift key is held. This value is used for the purpose of
|
|
* determining whether to open in the background.
|
|
* @param aParams
|
|
* parameters passed to openLinkIn
|
|
*/
|
|
function openNewTabWith(aURL, aShiftKey, aParams = {}) {
|
|
// As in openNewWindowWith(), we want to pass the charset of the
|
|
// current document over to a new tab.
|
|
if (
|
|
document.documentElement.getAttribute("windowtype") == "navigator:browser"
|
|
) {
|
|
aParams.charset = gBrowser.selectedBrowser.characterSet;
|
|
}
|
|
|
|
openLinkIn(aURL, aShiftKey ? "tabshifted" : "tab", aParams);
|
|
}
|
|
|
|
/**
|
|
* openNewWindowWith: opens a new window with the given URL.
|
|
* See openNewTabWith for parameters.
|
|
*/
|
|
function openNewWindowWith(aURL, aParams = {}) {
|
|
// Extract the current charset menu setting from the current document and
|
|
// use it to initialize the new browser window...
|
|
if (
|
|
document.documentElement.getAttribute("windowtype") == "navigator:browser"
|
|
) {
|
|
aParams.charset = gBrowser.selectedBrowser.characterSet;
|
|
}
|
|
|
|
openLinkIn(aURL, "window", aParams);
|
|
}
|
|
|
|
function getHelpLinkURL(aHelpTopic) {
|
|
var url = Services.urlFormatter.formatURLPref("app.support.baseURL");
|
|
return url + aHelpTopic;
|
|
}
|
|
|
|
// aCalledFromModal is optional
|
|
function openHelpLink(aHelpTopic, aCalledFromModal, aWhere) {
|
|
var url = getHelpLinkURL(aHelpTopic);
|
|
var where = aWhere;
|
|
if (!aWhere) {
|
|
where = aCalledFromModal ? "window" : "tab";
|
|
}
|
|
|
|
openTrustedLinkIn(url, where);
|
|
}
|
|
|
|
function openPrefsHelp(aEvent) {
|
|
let helpTopic = aEvent.target.getAttribute("helpTopic");
|
|
openHelpLink(helpTopic);
|
|
}
|
|
|
|
/**
|
|
* Updates visibility of "Import From Another Browser" command depending on
|
|
* the DisableProfileImport policy.
|
|
*/
|
|
function updateFileMenuImportUIVisibility(id) {
|
|
if (!Services.policies.isAllowed("profileImport")) {
|
|
let command = document.getElementById(id);
|
|
command.setAttribute("disabled", "true");
|
|
}
|
|
}
|