forked from mirrors/gecko-dev
		
	 96dc530924
			
		
	
	
		96dc530924
		
	
	
	
	
		
			
			Before this change, we accessed the browser URL in the following ways:
- "chrome://browser/content/browser.xul"
- "chrome://browser/content/" (which redirects to chrome://browser/content/browser.xul)
- Services.prefs.getCharPref("browser.chromeURL") which returns "chrome://browser/content/"
- getBrowserURL() from utilityOverlay.js
MozReview-Commit-ID: I5vtRke1x9t
--HG--
extra : rebase_source : c525350a1954740873e85b045cbb14a8b43aa89d
		
	
			
		
			
				
	
	
		
			1007 lines
		
	
	
	
		
			35 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			1007 lines
		
	
	
	
		
			35 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
| /* -*- indent-tabs-mode: nil; js-indent-level: 2 -*-
 | |
|  * This Source Code Form is subject to the terms of the Mozilla Public
 | |
|  * License, v. 2.0. If a copy of the MPL was not distributed with this
 | |
|  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
 | |
| 
 | |
| // Services = object with smart getters for common XPCOM services
 | |
| ChromeUtils.import("resource://gre/modules/AppConstants.jsm");
 | |
| ChromeUtils.import("resource://gre/modules/Services.jsm");
 | |
| ChromeUtils.import("resource://gre/modules/XPCOMUtils.jsm");
 | |
| 
 | |
| ChromeUtils.defineModuleGetter(this, "PrivateBrowsingUtils",
 | |
|                                "resource://gre/modules/PrivateBrowsingUtils.jsm");
 | |
| 
 | |
| XPCOMUtils.defineLazyModuleGetters(this, {
 | |
|   BrowserWindowTracker: "resource:///modules/BrowserWindowTracker.jsm",
 | |
|   ContextualIdentityService: "resource://gre/modules/ContextualIdentityService.jsm",
 | |
|   ShellService: "resource:///modules/ShellService.jsm"
 | |
| });
 | |
| 
 | |
| XPCOMUtils.defineLazyServiceGetter(this, "aboutNewTabService",
 | |
|                                    "@mozilla.org/browser/aboutnewtab-service;1",
 | |
|                                    "nsIAboutNewTabService");
 | |
| 
 | |
| Object.defineProperty(this, "BROWSER_NEW_TAB_URL", {
 | |
|   configurable: true,
 | |
|   enumerable: true,
 | |
|   get() {
 | |
|     if (PrivateBrowsingUtils.isWindowPrivate(window) &&
 | |
|         !PrivateBrowsingUtils.permanentPrivateBrowsing &&
 | |
|         !aboutNewTabService.overridden) {
 | |
|       return "about:privatebrowsing";
 | |
|     }
 | |
|     return aboutNewTabService.newTabURL;
 | |
|   },
 | |
| });
 | |
| 
 | |
| var TAB_DROP_TYPE = "application/x-moz-tabbrowser-tab";
 | |
| 
 | |
| var gBidiUI = false;
 | |
| 
 | |
| /**
 | |
|  * Determines whether the given url is considered a special URL for new tabs.
 | |
|  */
 | |
| function isBlankPageURL(aURL) {
 | |
|   return aURL == "about:blank" ||
 | |
|          aURL == "about:home" ||
 | |
|          aURL == "about:welcome" ||
 | |
|          aURL == BROWSER_NEW_TAB_URL;
 | |
| }
 | |
| 
 | |
| function getTopWin(skipPopups) {
 | |
|   // If this is called in a browser window, use that window regardless of
 | |
|   // whether it's the frontmost window, since commands can be executed in
 | |
|   // background windows (bug 626148).
 | |
|   if (top.document.documentElement.getAttribute("windowtype") == "navigator:browser" &&
 | |
|       (!skipPopups || top.toolbar.visible))
 | |
|     return top;
 | |
| 
 | |
|   return BrowserWindowTracker.getTopWindow({
 | |
|     private: PrivateBrowsingUtils.isWindowPrivate(window),
 | |
|     allowPopups: !skipPopups
 | |
|   });
 | |
| }
 | |
| 
 | |
| function getBoolPref(prefname, def) {
 | |
|   try {
 | |
|     return Services.prefs.getBoolPref(prefname);
 | |
|   } catch (er) {
 | |
|     return def;
 | |
|   }
 | |
| }
 | |
| 
 | |
| function doGetProtocolFlags(aURI) {
 | |
|   let handler = Services.io.getProtocolHandler(aURI.scheme);
 | |
|   // see DoGetProtocolFlags in nsIProtocolHandler.idl
 | |
|   return handler instanceof Ci.nsIProtocolHandlerWithDynamicFlags ?
 | |
|          handler.QueryInterface(Ci.nsIProtocolHandlerWithDynamicFlags).getFlagsForURI(aURI) :
 | |
|          handler.protocolFlags;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * openUILink handles clicks on UI elements that cause URLs to load.
 | |
|  *
 | |
|  * As the third argument, you may pass an object with the same properties as
 | |
|  * accepted by openUILinkIn, plus "ignoreButton" and "ignoreAlt".
 | |
|  *
 | |
|  * @param url {string}
 | |
|  * @param event {Event | Object} Event or JSON object representing an Event
 | |
|  * @param {Boolean | Object} aIgnoreButton
 | |
|  * @param {Boolean} aIgnoreButton
 | |
|  * @param {Boolean} aIgnoreAlt
 | |
|  * @param {Boolean} aAllowThirdPartyFixup
 | |
|  * @param {Object} aPostData
 | |
|  * @param {nsIURI} aReferrerURI
 | |
|  */
 | |
| function openUILink(url, event, aIgnoreButton, aIgnoreAlt, aAllowThirdPartyFixup,
 | |
|                     aPostData, aReferrerURI) {
 | |
|   let params;
 | |
| 
 | |
|   if (aIgnoreButton && typeof aIgnoreButton == "object") {
 | |
|     params = aIgnoreButton;
 | |
| 
 | |
|     // don't forward "ignoreButton" and "ignoreAlt" to openUILinkIn
 | |
|     aIgnoreButton = params.ignoreButton;
 | |
|     aIgnoreAlt = params.ignoreAlt;
 | |
|     delete params.ignoreButton;
 | |
|     delete params.ignoreAlt;
 | |
|   } else {
 | |
|     params = {
 | |
|       allowThirdPartyFixup: aAllowThirdPartyFixup,
 | |
|       postData: aPostData,
 | |
|       referrerURI: aReferrerURI,
 | |
|       referrerPolicy: Ci.nsIHttpChannel.REFERRER_POLICY_UNSET,
 | |
|       initiatingDoc: event ? event.target.ownerDocument : null,
 | |
|     };
 | |
|   }
 | |
| 
 | |
|   if (!params.triggeringPrincipal) {
 | |
|     throw new Error("Required argument triggeringPrincipal missing within openUILink");
 | |
|   }
 | |
| 
 | |
|   let where = whereToOpenLink(event, aIgnoreButton, aIgnoreAlt);
 | |
|   openUILinkIn(url, where, params);
 | |
| }
 | |
| 
 | |
| 
 | |
| /**
 | |
|  * whereToOpenLink() looks at an event to decide where to open a link.
 | |
|  *
 | |
|  * The event may be a mouse event (click, double-click, middle-click) or keypress event (enter).
 | |
|  *
 | |
|  * On Windows, the modifiers are:
 | |
|  * Ctrl        new tab, selected
 | |
|  * Shift       new window
 | |
|  * Ctrl+Shift  new tab, in background
 | |
|  * Alt         save
 | |
|  *
 | |
|  * Middle-clicking is the same as Ctrl+clicking (it opens a new tab).
 | |
|  *
 | |
|  * Exceptions:
 | |
|  * - Alt is ignored for menu items selected using the keyboard so you don't accidentally save stuff.
 | |
|  *    (Currently, the Alt isn't sent here at all for menu items, but that will change in bug 126189.)
 | |
|  * - Alt is hard to use in context menus, because pressing Alt closes the menu.
 | |
|  * - Alt can't be used on the bookmarks toolbar because Alt is used for "treat this as something draggable".
 | |
|  * - The button is ignored for the middle-click-paste-URL feature, since it's always a middle-click.
 | |
|  *
 | |
|  * @param e {Event|Object} Event or JSON Object
 | |
|  * @param ignoreButton {Boolean}
 | |
|  * @param ignoreAlt {Boolean}
 | |
|  * @returns {"current" | "tabshifted" | "tab" | "save" | "window"}
 | |
|  */
 | |
| function whereToOpenLink(e, ignoreButton, ignoreAlt) {
 | |
|   // This method must treat a null event like a left click without modifier keys (i.e.
 | |
|   // e = { shiftKey:false, ctrlKey:false, metaKey:false, altKey:false, button:0 })
 | |
|   // for compatibility purposes.
 | |
|   if (!e)
 | |
|     return "current";
 | |
| 
 | |
|   var shift = e.shiftKey;
 | |
|   var ctrl =  e.ctrlKey;
 | |
|   var meta =  e.metaKey;
 | |
|   var alt  =  e.altKey && !ignoreAlt;
 | |
| 
 | |
|   // ignoreButton allows "middle-click paste" to use function without always opening in a new window.
 | |
|   var middle = !ignoreButton && e.button == 1;
 | |
|   var middleUsesTabs = getBoolPref("browser.tabs.opentabfor.middleclick", true);
 | |
| 
 | |
|   // Don't do anything special with right-mouse clicks.  They're probably clicks on context menu items.
 | |
| 
 | |
|   var metaKey = AppConstants.platform == "macosx" ? meta : ctrl;
 | |
|   if (metaKey || (middle && middleUsesTabs))
 | |
|     return shift ? "tabshifted" : "tab";
 | |
| 
 | |
|   if (alt && getBoolPref("browser.altClickSave", false))
 | |
|     return "save";
 | |
| 
 | |
|   if (shift || (middle && !middleUsesTabs))
 | |
|     return "window";
 | |
| 
 | |
|   return "current";
 | |
| }
 | |
| 
 | |
| /* openTrustedLinkIn will attempt to open the given URI using the SystemPrincipal
 | |
|  * as the trigeringPrincipal, unless a more specific Principal is provided.
 | |
|  *
 | |
|  * See openUILinkIn for a discussion of parameters
 | |
|  */
 | |
| function openTrustedLinkIn(url, where, aParams) {
 | |
|   var params = aParams;
 | |
| 
 | |
|   if (!params) {
 | |
|     params = {};
 | |
|   }
 | |
| 
 | |
|   if (!params.triggeringPrincipal) {
 | |
|     params.triggeringPrincipal = Services.scriptSecurityManager.getSystemPrincipal();
 | |
|   }
 | |
| 
 | |
|   openUILinkIn(url, where, params);
 | |
| }
 | |
| 
 | |
| /* openWebLinkIn will attempt to open the given URI using the NullPrincipal
 | |
|  * as the triggeringPrincipal, unless a more specific Principal is provided.
 | |
|  *
 | |
|  * See openUILinkIn for a discussion of parameters
 | |
|  */
 | |
| function openWebLinkIn(url, where, params) {
 | |
|   if (!params) {
 | |
|     params = {};
 | |
|   }
 | |
| 
 | |
|   if (!params.triggeringPrincipal) {
 | |
|     params.triggeringPrincipal = Services.scriptSecurityManager.createNullPrincipal({});
 | |
|   }
 | |
| 
 | |
|   openUILinkIn(url, where, params);
 | |
| }
 | |
| 
 | |
| /* openUILinkIn opens a URL in a place specified by the parameter |where|.
 | |
|  *
 | |
|  * |where| can be:
 | |
|  *  "current"     current tab            (if there aren't any browser windows, then in a new window instead)
 | |
|  *  "tab"         new tab                (if there aren't any browser windows, then in a new window instead)
 | |
|  *  "tabshifted"  same as "tab" but in background if default is to select new tabs, and vice versa
 | |
|  *  "window"      new window
 | |
|  *  "save"        save to disk (with no filename hint!)
 | |
|  *
 | |
|  * DEPRECATION WARNING:
 | |
|  * USE        -> openTrustedLinkIn(url, where, aParams) if the source is always
 | |
|  *                     a user event on a user- or product-specified URL (as
 | |
|  *                     opposed to URLs provided by a webpage)
 | |
|  * USE        -> openWebLinkIn(url, where, aParams) if the URI should be loaded
 | |
|  *                     with a specific triggeringPrincipal, for instance, if
 | |
|  *                     the url was supplied by web content.
 | |
|  * DEPRECATED -> openUILinkIn(url, where, AllowThirdPartyFixup, aPostData, ...)
 | |
|  *
 | |
|  *
 | |
|  * allowThirdPartyFixup controls whether third party services such as Google's
 | |
|  * I Feel Lucky are allowed to interpret this URL. This parameter may be
 | |
|  * undefined, which is treated as false.
 | |
|  *
 | |
|  * Instead of aAllowThirdPartyFixup, you may also pass an object with any of
 | |
|  * these properties:
 | |
|  *   allowThirdPartyFixup (boolean)
 | |
|  *   postData             (nsIInputStream)
 | |
|  *   referrerURI          (nsIURI)
 | |
|  *   relatedToCurrent     (boolean)
 | |
|  *   skipTabAnimation     (boolean)
 | |
|  *   allowPinnedTabHostChange (boolean)
 | |
|  *   allowPopups          (boolean)
 | |
|  *   userContextId        (unsigned int)
 | |
|  *   targetBrowser        (XUL browser)
 | |
|  */
 | |
| function openUILinkIn(url, where, aAllowThirdPartyFixup, aPostData, aReferrerURI) {
 | |
|   var params;
 | |
| 
 | |
|   if (arguments.length == 3 && typeof arguments[2] == "object") {
 | |
|     params = aAllowThirdPartyFixup;
 | |
|   } else {
 | |
|     throw new Error("Required argument triggeringPrincipal missing within openUILinkIn");
 | |
|   }
 | |
| 
 | |
|   params.fromChrome = true;
 | |
| 
 | |
|   openLinkIn(url, where, params);
 | |
| }
 | |
| 
 | |
| /* eslint-disable complexity */
 | |
| function openLinkIn(url, where, params) {
 | |
|   if (!where || !url)
 | |
|     return;
 | |
| 
 | |
|   var aFromChrome           = params.fromChrome;
 | |
|   var aAllowThirdPartyFixup = params.allowThirdPartyFixup;
 | |
|   var aPostData             = params.postData;
 | |
|   var aCharset              = params.charset;
 | |
|   var aReferrerURI          = params.referrerURI;
 | |
|   var aReferrerPolicy       = ("referrerPolicy" in params ?
 | |
|       params.referrerPolicy : Ci.nsIHttpChannel.REFERRER_POLICY_UNSET);
 | |
|   var aRelatedToCurrent     = params.relatedToCurrent;
 | |
|   var aAllowMixedContent    = params.allowMixedContent;
 | |
|   var aForceAllowDataURI    = params.forceAllowDataURI;
 | |
|   var aInBackground         = params.inBackground;
 | |
|   var aDisallowInheritPrincipal = params.disallowInheritPrincipal;
 | |
|   var aInitiatingDoc        = params.initiatingDoc;
 | |
|   var aIsPrivate            = params.private;
 | |
|   var aSkipTabAnimation     = params.skipTabAnimation;
 | |
|   var aAllowPinnedTabHostChange = !!params.allowPinnedTabHostChange;
 | |
|   var aNoReferrer           = params.noReferrer;
 | |
|   var aAllowPopups          = !!params.allowPopups;
 | |
|   var aUserContextId        = params.userContextId;
 | |
|   var aIndicateErrorPageLoad = params.indicateErrorPageLoad;
 | |
|   var aPrincipal            = params.originPrincipal;
 | |
|   var aTriggeringPrincipal  = params.triggeringPrincipal;
 | |
|   var aForceAboutBlankViewerInCurrent =
 | |
|       params.forceAboutBlankViewerInCurrent;
 | |
|   var aResolveOnNewTabCreated = params.resolveOnNewTabCreated;
 | |
| 
 | |
|   if (where == "save") {
 | |
|     // TODO(1073187): propagate referrerPolicy.
 | |
| 
 | |
|     // ContentClick.jsm passes isContentWindowPrivate for saveURL instead of passing a CPOW initiatingDoc
 | |
|     if ("isContentWindowPrivate" in params) {
 | |
|       saveURL(url, null, null, true, true, aNoReferrer ? null : aReferrerURI,
 | |
|               null, params.isContentWindowPrivate, aPrincipal);
 | |
|     } else {
 | |
|       if (!aInitiatingDoc) {
 | |
|         Cu.reportError("openUILink/openLinkIn was called with " +
 | |
|           "where == 'save' but without initiatingDoc.  See bug 814264.");
 | |
|         return;
 | |
|       }
 | |
|       saveURL(url, null, null, true, true, aNoReferrer ? null : aReferrerURI, aInitiatingDoc);
 | |
|     }
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   // Establish which window we'll load the link in.
 | |
|   let w;
 | |
|   if (where == "current" && params.targetBrowser) {
 | |
|     w = params.targetBrowser.ownerGlobal;
 | |
|   } else {
 | |
|     w = getTopWin();
 | |
|   }
 | |
|   // We don't want to open tabs in popups, so try to find a non-popup window in
 | |
|   // that case.
 | |
|   if ((where == "tab" || where == "tabshifted") &&
 | |
|       w && !w.toolbar.visible) {
 | |
|     w = getTopWin(true);
 | |
|     aRelatedToCurrent = false;
 | |
|   }
 | |
| 
 | |
|   // Teach the principal about the right OA to use, e.g. in case when
 | |
|   // opening a link in a new private window, or in a new container tab.
 | |
|   // Please note we do not have to do that for SystemPrincipals and we
 | |
|   // can not do it for NullPrincipals since NullPrincipals are only
 | |
|   // identical if they actually are the same object (See Bug: 1346759)
 | |
|   function useOAForPrincipal(principal) {
 | |
|     if (principal && principal.isCodebasePrincipal) {
 | |
|       let attrs = {
 | |
|         userContextId: aUserContextId,
 | |
|         privateBrowsingId: aIsPrivate || (w && PrivateBrowsingUtils.isWindowPrivate(w)),
 | |
|       };
 | |
|       return Services.scriptSecurityManager.createCodebasePrincipal(principal.URI, attrs);
 | |
|     }
 | |
|     return principal;
 | |
|   }
 | |
|   aPrincipal = useOAForPrincipal(aPrincipal);
 | |
|   aTriggeringPrincipal = useOAForPrincipal(aTriggeringPrincipal);
 | |
| 
 | |
|   if (!w || where == "window") {
 | |
|     let features = "chrome,dialog=no,all";
 | |
|     if (aIsPrivate) {
 | |
|       features += ",private";
 | |
|       // To prevent regular browsing data from leaking to private browsing sites,
 | |
|       // strip the referrer when opening a new private window. (See Bug: 1409226)
 | |
|       aNoReferrer = true;
 | |
|     }
 | |
| 
 | |
|     // This propagates to window.arguments.
 | |
|     var sa = Cc["@mozilla.org/array;1"].
 | |
|              createInstance(Ci.nsIMutableArray);
 | |
| 
 | |
|     var wuri = Cc["@mozilla.org/supports-string;1"].
 | |
|                createInstance(Ci.nsISupportsString);
 | |
|     wuri.data = url;
 | |
| 
 | |
|     let charset = null;
 | |
|     if (aCharset) {
 | |
|       charset = Cc["@mozilla.org/supports-string;1"]
 | |
|                   .createInstance(Ci.nsISupportsString);
 | |
|       charset.data = "charset=" + aCharset;
 | |
|     }
 | |
| 
 | |
|     var allowThirdPartyFixupSupports = Cc["@mozilla.org/supports-PRBool;1"].
 | |
|                                        createInstance(Ci.nsISupportsPRBool);
 | |
|     allowThirdPartyFixupSupports.data = aAllowThirdPartyFixup;
 | |
| 
 | |
|     var referrerURISupports = null;
 | |
|     if (aReferrerURI && !aNoReferrer) {
 | |
|       referrerURISupports = Cc["@mozilla.org/supports-string;1"].
 | |
|                             createInstance(Ci.nsISupportsString);
 | |
|       referrerURISupports.data = aReferrerURI.spec;
 | |
|     }
 | |
| 
 | |
|     var referrerPolicySupports = Cc["@mozilla.org/supports-PRUint32;1"].
 | |
|                                  createInstance(Ci.nsISupportsPRUint32);
 | |
|     referrerPolicySupports.data = aReferrerPolicy;
 | |
| 
 | |
|     var userContextIdSupports = Cc["@mozilla.org/supports-PRUint32;1"].
 | |
|                                  createInstance(Ci.nsISupportsPRUint32);
 | |
|     userContextIdSupports.data = aUserContextId;
 | |
| 
 | |
|     sa.appendElement(wuri);
 | |
|     sa.appendElement(charset);
 | |
|     sa.appendElement(referrerURISupports);
 | |
|     sa.appendElement(aPostData);
 | |
|     sa.appendElement(allowThirdPartyFixupSupports);
 | |
|     sa.appendElement(referrerPolicySupports);
 | |
|     sa.appendElement(userContextIdSupports);
 | |
|     sa.appendElement(aPrincipal);
 | |
|     sa.appendElement(aTriggeringPrincipal);
 | |
| 
 | |
|     const sourceWindow = (w || window);
 | |
|     let win;
 | |
|     if (params.frameOuterWindowID != undefined && sourceWindow) {
 | |
|       // Only notify it as a WebExtensions' webNavigation.onCreatedNavigationTarget
 | |
|       // event if it contains the expected frameOuterWindowID params.
 | |
|       // (e.g. we should not notify it as a onCreatedNavigationTarget if the user is
 | |
|       // opening a new window using the keyboard shortcut).
 | |
|       const sourceTabBrowser = sourceWindow.gBrowser.selectedBrowser;
 | |
|       let delayedStartupObserver = aSubject => {
 | |
|         if (aSubject == win) {
 | |
|           Services.obs.removeObserver(delayedStartupObserver, "browser-delayed-startup-finished");
 | |
|           Services.obs.notifyObservers({
 | |
|             wrappedJSObject: {
 | |
|               url,
 | |
|               createdTabBrowser: win.gBrowser.selectedBrowser,
 | |
|               sourceTabBrowser,
 | |
|               sourceFrameOuterWindowID: params.frameOuterWindowID,
 | |
|             },
 | |
|           }, "webNavigation-createdNavigationTarget");
 | |
|         }
 | |
|       };
 | |
|       Services.obs.addObserver(delayedStartupObserver, "browser-delayed-startup-finished");
 | |
|     }
 | |
|     win = Services.ww.openWindow(sourceWindow, AppConstants.BROWSER_CHROME_URL, null, features, sa);
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   // We're now committed to loading the link in an existing browser window.
 | |
| 
 | |
|   // Raise the target window before loading the URI, since loading it may
 | |
|   // result in a new frontmost window (e.g. "javascript:window.open('');").
 | |
|   w.focus();
 | |
| 
 | |
|   let targetBrowser;
 | |
|   let loadInBackground;
 | |
|   let uriObj;
 | |
| 
 | |
|   if (where == "current") {
 | |
|     targetBrowser = params.targetBrowser || w.gBrowser.selectedBrowser;
 | |
|     loadInBackground = false;
 | |
| 
 | |
|     try {
 | |
|       uriObj = Services.io.newURI(url);
 | |
|     } catch (e) {}
 | |
| 
 | |
|     if (w.gBrowser.getTabForBrowser(targetBrowser).pinned &&
 | |
|         !aAllowPinnedTabHostChange) {
 | |
|       try {
 | |
|         // nsIURI.host can throw for non-nsStandardURL nsIURIs.
 | |
|         if (!uriObj || (!uriObj.schemeIs("javascript") &&
 | |
|                         targetBrowser.currentURI.host != uriObj.host)) {
 | |
|           where = "tab";
 | |
|           loadInBackground = false;
 | |
|         }
 | |
|       } catch (err) {
 | |
|         where = "tab";
 | |
|         loadInBackground = false;
 | |
|       }
 | |
|     }
 | |
|   } else {
 | |
|     // 'where' is "tab" or "tabshifted", so we'll load the link in a new tab.
 | |
|     loadInBackground = aInBackground;
 | |
|     if (loadInBackground == null) {
 | |
|       loadInBackground =
 | |
|         aFromChrome ? false : getBoolPref("browser.tabs.loadInBackground");
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   let focusUrlBar = false;
 | |
| 
 | |
|   switch (where) {
 | |
|   case "current":
 | |
|     let flags = Ci.nsIWebNavigation.LOAD_FLAGS_NONE;
 | |
| 
 | |
|     if (aAllowThirdPartyFixup) {
 | |
|       flags |= Ci.nsIWebNavigation.LOAD_FLAGS_ALLOW_THIRD_PARTY_FIXUP;
 | |
|       flags |= Ci.nsIWebNavigation.LOAD_FLAGS_FIXUP_SCHEME_TYPOS;
 | |
|     }
 | |
| 
 | |
|     // LOAD_FLAGS_DISALLOW_INHERIT_PRINCIPAL isn't supported for javascript URIs,
 | |
|     // i.e. it causes them not to load at all. Callers should strip
 | |
|     // "javascript:" from pasted strings to protect users from malicious URIs
 | |
|     // (see stripUnsafeProtocolOnPaste).
 | |
|     if (aDisallowInheritPrincipal && !(uriObj && uriObj.schemeIs("javascript"))) {
 | |
|       flags |= Ci.nsIWebNavigation.LOAD_FLAGS_DISALLOW_INHERIT_PRINCIPAL;
 | |
|     }
 | |
| 
 | |
|     if (aAllowPopups) {
 | |
|       flags |= Ci.nsIWebNavigation.LOAD_FLAGS_ALLOW_POPUPS;
 | |
|     }
 | |
|     if (aIndicateErrorPageLoad) {
 | |
|       flags |= Ci.nsIWebNavigation.LOAD_FLAGS_ERROR_LOAD_CHANGES_RV;
 | |
|     }
 | |
|     if (aForceAllowDataURI) {
 | |
|       flags |= Ci.nsIWebNavigation.LOAD_FLAGS_FORCE_ALLOW_DATA_URI;
 | |
|     }
 | |
| 
 | |
|     let {URI_INHERITS_SECURITY_CONTEXT} = Ci.nsIProtocolHandler;
 | |
|     if (aForceAboutBlankViewerInCurrent &&
 | |
|         (!uriObj ||
 | |
|          (doGetProtocolFlags(uriObj) & URI_INHERITS_SECURITY_CONTEXT))) {
 | |
|       // Unless we know for sure we're not inheriting principals,
 | |
|       // force the about:blank viewer to have the right principal:
 | |
|       targetBrowser.createAboutBlankContentViewer(aPrincipal);
 | |
|     }
 | |
| 
 | |
|     targetBrowser.loadURI(url, {
 | |
|       triggeringPrincipal: aTriggeringPrincipal,
 | |
|       flags,
 | |
|       referrerURI: aNoReferrer ? null : aReferrerURI,
 | |
|       referrerPolicy: aReferrerPolicy,
 | |
|       postData: aPostData,
 | |
|       userContextId: aUserContextId
 | |
|     });
 | |
| 
 | |
|     // Don't focus the content area if focus is in the address bar and we're
 | |
|     // loading the New Tab page.
 | |
|     focusUrlBar = w.document.activeElement == w.gURLBar.inputField &&
 | |
|                   w.isBlankPageURL(url);
 | |
|     break;
 | |
|   case "tabshifted":
 | |
|     loadInBackground = !loadInBackground;
 | |
|     // fall through
 | |
|   case "tab":
 | |
|     focusUrlBar = !loadInBackground && w.isBlankPageURL(url)
 | |
|       && !aboutNewTabService.willNotifyUser;
 | |
| 
 | |
|     let tabUsedForLoad = w.gBrowser.loadOneTab(url, {
 | |
|       referrerURI: aReferrerURI,
 | |
|       referrerPolicy: aReferrerPolicy,
 | |
|       charset: aCharset,
 | |
|       postData: aPostData,
 | |
|       inBackground: loadInBackground,
 | |
|       allowThirdPartyFixup: aAllowThirdPartyFixup,
 | |
|       relatedToCurrent: aRelatedToCurrent,
 | |
|       skipAnimation: aSkipTabAnimation,
 | |
|       allowMixedContent: aAllowMixedContent,
 | |
|       noReferrer: aNoReferrer,
 | |
|       userContextId: aUserContextId,
 | |
|       originPrincipal: aPrincipal,
 | |
|       triggeringPrincipal: aTriggeringPrincipal,
 | |
|       focusUrlBar,
 | |
|     });
 | |
|     targetBrowser = tabUsedForLoad.linkedBrowser;
 | |
| 
 | |
|     if (aResolveOnNewTabCreated) {
 | |
|       aResolveOnNewTabCreated(targetBrowser);
 | |
|     }
 | |
| 
 | |
|     if (params.frameOuterWindowID != undefined && w) {
 | |
|       // Only notify it as a WebExtensions' webNavigation.onCreatedNavigationTarget
 | |
|       // event if it contains the expected frameOuterWindowID params.
 | |
|       // (e.g. we should not notify it as a onCreatedNavigationTarget if the user is
 | |
|       // opening a new tab using the keyboard shortcut).
 | |
|       Services.obs.notifyObservers({
 | |
|         wrappedJSObject: {
 | |
|           url,
 | |
|           createdTabBrowser: targetBrowser,
 | |
|           sourceTabBrowser: w.gBrowser.selectedBrowser,
 | |
|           sourceFrameOuterWindowID: params.frameOuterWindowID,
 | |
|         },
 | |
|       }, "webNavigation-createdNavigationTarget");
 | |
|     }
 | |
|     break;
 | |
|   }
 | |
| 
 | |
|   if (!focusUrlBar && targetBrowser == w.gBrowser.selectedBrowser) {
 | |
|     // Focus the content, but only if the browser used for the load is selected.
 | |
|     targetBrowser.focus();
 | |
|   }
 | |
| }
 | |
| 
 | |
| // Used as an onclick handler for UI elements with link-like behavior.
 | |
| // e.g. onclick="checkForMiddleClick(this, event);"
 | |
| function checkForMiddleClick(node, event) {
 | |
|   // We should be using the disabled property here instead of the attribute,
 | |
|   // but some elements that this function is used with don't support it (e.g.
 | |
|   // menuitem).
 | |
|   if (node.getAttribute("disabled") == "true")
 | |
|     return; // Do nothing
 | |
| 
 | |
|   if (event.button == 1) {
 | |
|     /* Execute the node's oncommand or command.
 | |
|      *
 | |
|      * XXX: we should use node.oncommand(event) once bug 246720 is fixed.
 | |
|      */
 | |
|     var target = node.hasAttribute("oncommand") ? node :
 | |
|                  node.ownerDocument.getElementById(node.getAttribute("command"));
 | |
|     var fn = new Function("event", target.getAttribute("oncommand"));
 | |
|     fn.call(target, event);
 | |
| 
 | |
|     // If the middle-click was on part of a menu, close the menu.
 | |
|     // (Menus close automatically with left-click but not with middle-click.)
 | |
|     closeMenus(event.target);
 | |
|   }
 | |
| }
 | |
| 
 | |
| // Populate a menu with user-context menu items. This method should be called
 | |
| // by onpopupshowing passing the event as first argument.
 | |
| function createUserContextMenu(event, {
 | |
|                                         isContextMenu = false,
 | |
|                                         excludeUserContextId = 0,
 | |
|                                         showDefaultTab = false,
 | |
|                                         useAccessKeys = true
 | |
|                                       } = {}) {
 | |
|   while (event.target.hasChildNodes()) {
 | |
|     event.target.firstChild.remove();
 | |
|   }
 | |
| 
 | |
|   let bundle = Services.strings.createBundle("chrome://browser/locale/browser.properties");
 | |
|   let docfrag = document.createDocumentFragment();
 | |
| 
 | |
|   // If we are excluding a userContextId, we want to add a 'no-container' item.
 | |
|   if (excludeUserContextId || showDefaultTab) {
 | |
|     let menuitem = document.createElement("menuitem");
 | |
|     menuitem.setAttribute("data-usercontextid", "0");
 | |
|     menuitem.setAttribute("label", bundle.GetStringFromName("userContextNone.label"));
 | |
|     menuitem.setAttribute("accesskey", bundle.GetStringFromName("userContextNone.accesskey"));
 | |
| 
 | |
|     // We don't set an oncommand/command attribute because if we have
 | |
|     // to exclude a userContextId we are generating the contextMenu and
 | |
|     // isContextMenu will be true.
 | |
| 
 | |
|     docfrag.appendChild(menuitem);
 | |
| 
 | |
|     let menuseparator = document.createElement("menuseparator");
 | |
|     docfrag.appendChild(menuseparator);
 | |
|   }
 | |
| 
 | |
|   ContextualIdentityService.getPublicIdentities().forEach(identity => {
 | |
|     if (identity.userContextId == excludeUserContextId) {
 | |
|       return;
 | |
|     }
 | |
| 
 | |
|     let menuitem = document.createElement("menuitem");
 | |
|     menuitem.setAttribute("data-usercontextid", identity.userContextId);
 | |
|     menuitem.setAttribute("label", ContextualIdentityService.getUserContextLabel(identity.userContextId));
 | |
| 
 | |
|     if (identity.accessKey && useAccessKeys) {
 | |
|       menuitem.setAttribute("accesskey", bundle.GetStringFromName(identity.accessKey));
 | |
|     }
 | |
| 
 | |
|     menuitem.classList.add("menuitem-iconic");
 | |
|     menuitem.setAttribute("data-identity-color", identity.color);
 | |
| 
 | |
|     if (!isContextMenu) {
 | |
|       menuitem.setAttribute("command", "Browser:NewUserContextTab");
 | |
|     }
 | |
| 
 | |
|     menuitem.setAttribute("data-identity-icon", identity.icon);
 | |
| 
 | |
|     docfrag.appendChild(menuitem);
 | |
|   });
 | |
| 
 | |
|   if (!isContextMenu) {
 | |
|     docfrag.appendChild(document.createElement("menuseparator"));
 | |
| 
 | |
|     let menuitem = document.createElement("menuitem");
 | |
|     menuitem.setAttribute("label",
 | |
|                           bundle.GetStringFromName("userContext.aboutPage.label"));
 | |
|     if (useAccessKeys) {
 | |
|       menuitem.setAttribute("accesskey",
 | |
|                             bundle.GetStringFromName("userContext.aboutPage.accesskey"));
 | |
|     }
 | |
|     menuitem.setAttribute("command", "Browser:OpenAboutContainers");
 | |
|     docfrag.appendChild(menuitem);
 | |
|   }
 | |
| 
 | |
|   event.target.appendChild(docfrag);
 | |
|   return true;
 | |
| }
 | |
| 
 | |
| // Closes all popups that are ancestors of the node.
 | |
| function closeMenus(node) {
 | |
|   if ("tagName" in node) {
 | |
|     if (node.namespaceURI == "http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul"
 | |
|     && (node.tagName == "menupopup" || node.tagName == "popup"))
 | |
|       node.hidePopup();
 | |
| 
 | |
|     closeMenus(node.parentNode);
 | |
|   }
 | |
| }
 | |
| 
 | |
| /** This function takes in a key element and compares it to the keys pressed during an event.
 | |
|  *
 | |
|  * @param aEvent
 | |
|  *        The KeyboardEvent event you want to compare against your key.
 | |
|  *
 | |
|  * @param aKey
 | |
|  *        The <key> element checked to see if it was called in aEvent.
 | |
|  *        For example, aKey can be a variable set to document.getElementById("key_close")
 | |
|  *        to check if the close command key was pressed in aEvent.
 | |
| */
 | |
| function eventMatchesKey(aEvent, aKey) {
 | |
|   let keyPressed = aKey.getAttribute("key").toLowerCase();
 | |
|   let keyModifiers = aKey.getAttribute("modifiers");
 | |
|   let modifiers = ["Alt", "Control", "Meta", "Shift"];
 | |
| 
 | |
|   if (aEvent.key != keyPressed) {
 | |
|     return false;
 | |
|   }
 | |
|   let eventModifiers = modifiers.filter(modifier => aEvent.getModifierState(modifier));
 | |
|   // Check if aEvent has a modifier and aKey doesn't
 | |
|   if (eventModifiers.length > 0 && keyModifiers.length == 0) {
 | |
|      return false;
 | |
|   }
 | |
|   // Check whether aKey's modifiers match aEvent's modifiers
 | |
|   if (keyModifiers) {
 | |
|     keyModifiers = keyModifiers.split(/[\s,]+/);
 | |
|     // Capitalize first letter of aKey's modifers to compare to aEvent's modifier
 | |
|     keyModifiers.forEach(function(modifier, index) {
 | |
|       if (modifier == "accel") {
 | |
|         keyModifiers[index] = AppConstants.platform == "macosx" ? "Meta" : "Control";
 | |
|       } else {
 | |
|         keyModifiers[index] = modifier[0].toUpperCase() + modifier.slice(1);
 | |
|       }
 | |
|     });
 | |
|     return modifiers.every(modifier => keyModifiers.includes(modifier) == aEvent.getModifierState(modifier));
 | |
|   }
 | |
|   return true;
 | |
| }
 | |
| 
 | |
| // Gather all descendent text under given document node.
 | |
| function gatherTextUnder(root) {
 | |
|   var text = "";
 | |
|   var node = root.firstChild;
 | |
|   var depth = 1;
 | |
|   while ( node && depth > 0 ) {
 | |
|     // See if this node is text.
 | |
|     if ( node.nodeType == Node.TEXT_NODE ) {
 | |
|       // Add this text to our collection.
 | |
|       text += " " + node.data;
 | |
|     } else if ( node instanceof HTMLImageElement) {
 | |
|       // If it has an "alt" attribute, add that.
 | |
|       var altText = node.getAttribute( "alt" );
 | |
|       if ( altText && altText != "" ) {
 | |
|         text += " " + altText;
 | |
|       }
 | |
|     }
 | |
|     // Find next node to test.
 | |
|     // First, see if this node has children.
 | |
|     if ( node.hasChildNodes() ) {
 | |
|       // Go to first child.
 | |
|       node = node.firstChild;
 | |
|       depth++;
 | |
|     } else {
 | |
|       // No children, try next sibling (or parent next sibling).
 | |
|       while ( depth > 0 && !node.nextSibling ) {
 | |
|         node = node.parentNode;
 | |
|         depth--;
 | |
|       }
 | |
|       if ( node.nextSibling ) {
 | |
|         node = node.nextSibling;
 | |
|       }
 | |
|     }
 | |
|   }
 | |
|   // Strip leading and tailing whitespace.
 | |
|   text = text.trim();
 | |
|   // Compress remaining whitespace.
 | |
|   text = text.replace( /\s+/g, " " );
 | |
|   return text;
 | |
| }
 | |
| 
 | |
| // This function exists for legacy reasons.
 | |
| function getShellService() {
 | |
|   return ShellService;
 | |
| }
 | |
| 
 | |
| function isBidiEnabled() {
 | |
|   // first check the pref.
 | |
|   if (getBoolPref("bidi.browser.ui", false))
 | |
|     return true;
 | |
| 
 | |
|   // now see if the app locale is an RTL one.
 | |
|   const isRTL = Services.locale.isAppLocaleRTL;
 | |
| 
 | |
|   if (isRTL) {
 | |
|     Services.prefs.setBoolPref("bidi.browser.ui", true);
 | |
|   }
 | |
|   return isRTL;
 | |
| }
 | |
| 
 | |
| function openAboutDialog() {
 | |
|   var enumerator = Services.wm.getEnumerator("Browser:About");
 | |
|   while (enumerator.hasMoreElements()) {
 | |
|     // Only open one about window (Bug 599573)
 | |
|     let win = enumerator.getNext();
 | |
|     if (win.closed) {
 | |
|       continue;
 | |
|     }
 | |
|     win.focus();
 | |
|     return;
 | |
|   }
 | |
| 
 | |
|   var features = "chrome,";
 | |
|   if (AppConstants.platform == "win") {
 | |
|     features += "centerscreen,dependent";
 | |
|   } else if (AppConstants.platform == "macosx") {
 | |
|     features += "resizable=no,minimizable=no";
 | |
|   } else {
 | |
|     features += "centerscreen,dependent,dialog=no";
 | |
|   }
 | |
| 
 | |
|   window.openDialog("chrome://browser/content/aboutDialog.xul", "", features);
 | |
| }
 | |
| 
 | |
| function openPreferences(paneID, extraArgs) {
 | |
|   let histogram = Services.telemetry.getHistogramById("FX_PREFERENCES_OPENED_VIA");
 | |
|   if (extraArgs && extraArgs.origin) {
 | |
|     histogram.add(extraArgs.origin);
 | |
|   } else {
 | |
|     histogram.add("other");
 | |
|   }
 | |
| 
 | |
|   // This function is duplicated from preferences.js.
 | |
|   function internalPrefCategoryNameToFriendlyName(aName) {
 | |
|     return (aName || "").replace(/^pane./, function(toReplace) { return toReplace[4].toLowerCase(); });
 | |
|   }
 | |
| 
 | |
|   let win = Services.wm.getMostRecentWindow("navigator:browser");
 | |
|   let friendlyCategoryName = internalPrefCategoryNameToFriendlyName(paneID);
 | |
|   let params;
 | |
|   if (extraArgs && extraArgs.urlParams) {
 | |
|     params = new URLSearchParams();
 | |
|     let urlParams = extraArgs.urlParams;
 | |
|     for (let name in urlParams) {
 | |
|       if (urlParams[name] !== undefined) {
 | |
|         params.set(name, urlParams[name]);
 | |
|       }
 | |
|     }
 | |
|   }
 | |
|   let preferencesURL = "about:preferences" + (params ? "?" + params : "") +
 | |
|     (friendlyCategoryName ? "#" + friendlyCategoryName : "");
 | |
|   let newLoad = true;
 | |
|   let browser = null;
 | |
|   if (!win) {
 | |
|     let windowArguments = Cc["@mozilla.org/array;1"]
 | |
|       .createInstance(Ci.nsIMutableArray);
 | |
|     let supportsStringPrefURL = Cc["@mozilla.org/supports-string;1"]
 | |
|       .createInstance(Ci.nsISupportsString);
 | |
|     supportsStringPrefURL.data = preferencesURL;
 | |
|     windowArguments.appendElement(supportsStringPrefURL);
 | |
| 
 | |
|     win = Services.ww.openWindow(null, AppConstants.BROWSER_CHROME_URL,
 | |
|       "_blank", "chrome,dialog=no,all", windowArguments);
 | |
|   } else {
 | |
|     let shouldReplaceFragment = friendlyCategoryName ? "whenComparingAndReplace" : "whenComparing";
 | |
|     newLoad = !win.switchToTabHavingURI(preferencesURL, true, {
 | |
|       ignoreFragment: shouldReplaceFragment,
 | |
|       replaceQueryString: true,
 | |
|       triggeringPrincipal: Services.scriptSecurityManager.getSystemPrincipal(),
 | |
|     });
 | |
|     browser = win.gBrowser.selectedBrowser;
 | |
|   }
 | |
| 
 | |
|   if (newLoad) {
 | |
|     Services.obs.addObserver(function panesLoadedObs(prefWin, topic, data) {
 | |
|       if (!browser) {
 | |
|         browser = win.gBrowser.selectedBrowser;
 | |
|       }
 | |
|       if (prefWin != browser.contentWindow) {
 | |
|         return;
 | |
|       }
 | |
|       Services.obs.removeObserver(panesLoadedObs, "sync-pane-loaded");
 | |
|     }, "sync-pane-loaded");
 | |
|   } else if (paneID) {
 | |
|     browser.contentWindow.gotoPref(paneID);
 | |
|   }
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Opens the troubleshooting information (about:support) page for this version
 | |
|  * of the application.
 | |
|  */
 | |
| function openTroubleshootingPage() {
 | |
|   openTrustedLinkIn("about:support", "tab");
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Opens the feedback page for this version of the application.
 | |
|  */
 | |
| function openFeedbackPage() {
 | |
|   var url = Services.urlFormatter.formatURLPref("app.feedback.baseURL");
 | |
|   openTrustedLinkIn(url, "tab");
 | |
| }
 | |
| 
 | |
| function openTourPage() {
 | |
|   let scope = {};
 | |
|   ChromeUtils.import("resource:///modules/UITour.jsm", scope);
 | |
|   openTrustedLinkIn(scope.UITour.url, "tab");
 | |
| }
 | |
| 
 | |
| function buildHelpMenu() {
 | |
|   document.getElementById("feedbackPage")
 | |
|           .disabled = !Services.policies.isAllowed("feedbackCommands");
 | |
| 
 | |
|   document.getElementById("helpSafeMode")
 | |
|           .disabled = !Services.policies.isAllowed("safeMode");
 | |
| 
 | |
|   // Enable/disable the "Report Web Forgery" menu item.
 | |
|   if (typeof gSafeBrowsing != "undefined") {
 | |
|     gSafeBrowsing.setReportPhishingMenu();
 | |
|   }
 | |
| }
 | |
| 
 | |
| function isElementVisible(aElement) {
 | |
|   if (!aElement)
 | |
|     return false;
 | |
| 
 | |
|   // If aElement or a direct or indirect parent is hidden or collapsed,
 | |
|   // height, width or both will be 0.
 | |
|   var bo = aElement.boxObject;
 | |
|   return (bo.height > 0 && bo.width > 0);
 | |
| }
 | |
| 
 | |
| function makeURLAbsolute(aBase, aUrl) {
 | |
|   // Note:  makeURI() will throw if aUri is not a valid URI
 | |
|   return makeURI(aUrl, null, makeURI(aBase)).spec;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * openNewTabWith: opens a new tab with the given URL.
 | |
|  *
 | |
|  * @param aURL
 | |
|  *        The URL to open (as a string).
 | |
|  * @param aShiftKey
 | |
|  *        True if shift key is held.  This value is used for the purpose of
 | |
|  *        determining whether to open in the background.
 | |
|  * @param aParams
 | |
|  *        parameters passed to openLinkIn
 | |
|  */
 | |
| function openNewTabWith(aURL, aShiftKey, aParams = {}) {
 | |
| 
 | |
|   // As in openNewWindowWith(), we want to pass the charset of the
 | |
|   // current document over to a new tab.
 | |
|   if (document.documentElement.getAttribute("windowtype") == "navigator:browser")
 | |
|     aParams.charset = gBrowser.selectedBrowser.characterSet;
 | |
| 
 | |
|   openLinkIn(aURL, aShiftKey ? "tabshifted" : "tab", aParams);
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * openNewWindowWith: opens a new window with the given URL.
 | |
|  * See openNewTabWith for parameters.
 | |
|  */
 | |
| function openNewWindowWith(aURL, aParams = {}) {
 | |
|   // Extract the current charset menu setting from the current document and
 | |
|   // use it to initialize the new browser window...
 | |
|   if (document.documentElement.getAttribute("windowtype") == "navigator:browser")
 | |
|     aParams.charset = gBrowser.selectedBrowser.characterSet;
 | |
| 
 | |
|   openLinkIn(aURL, "window", aParams);
 | |
| }
 | |
| 
 | |
| function getHelpLinkURL(aHelpTopic) {
 | |
|   var url = Services.urlFormatter.formatURLPref("app.support.baseURL");
 | |
|   return url + aHelpTopic;
 | |
| }
 | |
| 
 | |
| // aCalledFromModal is optional
 | |
| function openHelpLink(aHelpTopic, aCalledFromModal, aWhere) {
 | |
|   var url = getHelpLinkURL(aHelpTopic);
 | |
|   var where = aWhere;
 | |
|   if (!aWhere)
 | |
|     where = aCalledFromModal ? "window" : "tab";
 | |
| 
 | |
|   openTrustedLinkIn(url, where);
 | |
| }
 | |
| 
 | |
| function openPrefsHelp() {
 | |
|   // non-instant apply prefwindows are usually modal, so we can't open in the topmost window,
 | |
|   // since its probably behind the window.
 | |
|   var instantApply = getBoolPref("browser.preferences.instantApply");
 | |
| 
 | |
|   var helpTopic = document.documentElement.getAttribute("helpTopic");
 | |
|   openHelpLink(helpTopic, !instantApply);
 | |
| }
 | |
| 
 | |
| function trimURL(aURL) {
 | |
|   // This function must not modify the given URL such that calling
 | |
|   // nsIURIFixup::createFixupURI with the result will produce a different URI.
 | |
| 
 | |
|   // remove single trailing slash for http/https/ftp URLs
 | |
|   let url = aURL.replace(/^((?:http|https|ftp):\/\/[^/]+)\/$/, "$1");
 | |
| 
 | |
|   // remove http://
 | |
|   if (!url.startsWith("http://")) {
 | |
|     return url;
 | |
|   }
 | |
|   let urlWithoutProtocol = url.substring(7);
 | |
| 
 | |
|   let flags = Services.uriFixup.FIXUP_FLAG_ALLOW_KEYWORD_LOOKUP |
 | |
|               Services.uriFixup.FIXUP_FLAG_FIX_SCHEME_TYPOS;
 | |
|   let fixedUpURL, expectedURLSpec;
 | |
|   try {
 | |
|     fixedUpURL = Services.uriFixup.createFixupURI(urlWithoutProtocol, flags);
 | |
|     expectedURLSpec = makeURI(aURL).displaySpec;
 | |
|   } catch (ex) {
 | |
|     return url;
 | |
|   }
 | |
|   if (fixedUpURL.displaySpec == expectedURLSpec) {
 | |
|     return urlWithoutProtocol;
 | |
|   }
 | |
|   return url;
 | |
| }
 |