1 /* This Source Code Form is subject to the terms of the Mozilla Public
2 * License, v. 2.0. If a copy of the MPL was not distributed with this file,
3 * You can obtain one at http://mozilla.org/MPL/2.0/. */
10 debug = function (s) { dump("-*- ContentPermissionPrompt: " + s + "\n"); };
13 debug = function (s) {};
16 const Ci = Components.interfaces;
17 const Cr = Components.results;
18 const Cu = Components.utils;
19 const Cc = Components.classes;
21 const PROMPT_FOR_UNKNOWN = ['geolocation', 'desktop-notification'];
23 Cu.import("resource://gre/modules/XPCOMUtils.jsm");
24 Cu.import("resource://gre/modules/Services.jsm");
25 Cu.import("resource://gre/modules/Webapps.jsm");
26 Cu.import("resource://gre/modules/AppsUtils.jsm");
27 Cu.import("resource://gre/modules/PermissionsInstaller.jsm");
28 Cu.import("resource://gre/modules/PermissionsTable.jsm");
30 var permissionManager = Cc["@mozilla.org/permissionmanager;1"].getService(Ci.nsIPermissionManager);
31 var secMan = Cc["@mozilla.org/scriptsecuritymanager;1"].getService(Ci.nsIScriptSecurityManager);
33 XPCOMUtils.defineLazyServiceGetter(this,
35 "@mozilla.org/permissionSettings;1",
36 "nsIDOMPermissionSettings");
38 function rememberPermission(aPermission, aPrincipal, aSession)
40 function convertPermToAllow(aPerm, aPrincipal)
43 permissionManager.testExactPermissionFromPrincipal(aPrincipal, aPerm);
44 if (type == Ci.nsIPermissionManager.PROMPT_ACTION ||
45 (type == Ci.nsIPermissionManager.UNKNOWN_ACTION &&
46 PROMPT_FOR_UNKNOWN.indexOf(aPermission) >= 0)) {
48 permissionManager.addFromPrincipal(aPrincipal,
50 Ci.nsIPermissionManager.ALLOW_ACTION);
52 permissionManager.addFromPrincipal(aPrincipal,
54 Ci.nsIPermissionManager.ALLOW_ACTION,
55 Ci.nsIPermissionManager.EXPIRE_SESSION, 0);
60 // Expand the permission to see if we have multiple access properties to convert
61 let access = PermissionsTable[aPermission].access;
63 for (let idx in access) {
64 convertPermToAllow(aPermission + "-" + access[idx], aPrincipal);
67 convertPermToAllow(aPermission, aPrincipal);
71 function ContentPermissionPrompt() {}
73 ContentPermissionPrompt.prototype = {
75 handleExistingPermission: function handleExistingPermission(request) {
76 let access = (request.access && request.access !== "unused") ? request.type + "-" + request.access :
78 let result = Services.perms.testExactPermissionFromPrincipal(request.principal, access);
79 if (result == Ci.nsIPermissionManager.ALLOW_ACTION) {
83 if (result == Ci.nsIPermissionManager.DENY_ACTION ||
84 result == Ci.nsIPermissionManager.UNKNOWN_ACTION && PROMPT_FOR_UNKNOWN.indexOf(access) < 0) {
91 handledByApp: function handledByApp(request) {
92 if (request.principal.appId == Ci.nsIScriptSecurityManager.NO_APP_ID ||
93 request.principal.appId == Ci.nsIScriptSecurityManager.UNKNOWN_APP_ID) {
94 // This should not really happen
99 let appsService = Cc["@mozilla.org/AppsService;1"]
100 .getService(Ci.nsIAppsService);
101 let app = appsService.getAppByLocalId(request.principal.appId);
103 let url = Services.io.newURI(app.origin, null, null);
104 let principal = secMan.getAppCodebasePrincipal(url, request.principal.appId,
105 /*mozbrowser*/false);
106 let access = (request.access && request.access !== "unused") ? request.type + "-" + request.access :
108 let result = Services.perms.testExactPermissionFromPrincipal(principal, access);
110 if (result == Ci.nsIPermissionManager.ALLOW_ACTION ||
111 result == Ci.nsIPermissionManager.PROMPT_ACTION) {
119 prompt: function(request) {
121 if (secMan.isSystemPrincipal(request.principal)) {
126 if (this.handledByApp(request))
129 // returns true if the request was handled
130 if (this.handleExistingPermission(request))
133 // If the request was initiated from a hidden iframe
134 // we don't forward it to content and cancel it right away
135 let frame = request.element;
138 this.delegatePrompt(request);
142 frame.wrappedJSObject.getVisible().onsuccess = function gv_success(evt) {
143 if (!evt.target.result) {
148 self.delegatePrompt(request);
153 delegatePrompt: function(request) {
154 let browser = Services.wm.getMostRecentWindow("navigator:browser");
155 let content = browser.getContentWindow();
159 let access = (request.access && request.access !== "unused") ? request.type + "-" + request.access :
162 let requestId = this._id++;
163 content.addEventListener("mozContentEvent", function contentEvent(evt) {
164 if (evt.detail.id != requestId)
166 evt.target.removeEventListener(evt.type, contentEvent);
168 if (evt.detail.type == "permission-allow") {
169 rememberPermission(request.type, request.principal, !evt.detail.remember);
174 if (evt.detail.remember) {
175 Services.perms.addFromPrincipal(request.principal, access,
176 Ci.nsIPermissionManager.DENY_ACTION);
178 Services.perms.addFromPrincipal(request.principal, access,
179 Ci.nsIPermissionManager.DENY_ACTION,
180 Ci.nsIPermissionManager.EXPIRE_SESSION, 0);
186 let principal = request.principal;
187 let isApp = principal.appStatus != Ci.nsIPrincipal.APP_STATUS_NOT_INSTALLED;
188 let remember = (principal.appStatus == Ci.nsIPrincipal.APP_STATUS_PRIVILEGED ||
189 principal.appStatus == Ci.nsIPrincipal.APP_STATUS_CERTIFIED)
194 type: "permission-prompt",
195 permission: request.type,
197 origin: principal.origin,
202 this._permission = access;
203 this._uri = request.principal.URI.spec;
204 this._origin = request.principal.origin;
207 browser.shell.sendChromeEvent(details);
211 // When it's an app, get the manifest to add the l10n application name.
212 let app = DOMApplicationRegistry.getAppByLocalId(principal.appId);
213 DOMApplicationRegistry.getManifestFor(app.origin, function getManifest(aManifest) {
214 let helper = new ManifestHelper(aManifest, app.origin);
215 details.appName = helper.name;
216 browser.shell.sendChromeEvent(details);
220 classID: Components.ID("{8c719f03-afe0-4aac-91ff-6c215895d467}"),
222 QueryInterface: XPCOMUtils.generateQI([Ci.nsIContentPermissionPrompt])
226 //module initialization
227 this.NSGetFactory = XPCOMUtils.generateNSGetFactory([ContentPermissionPrompt]);