forked from mirrors/gecko-dev
***
Bug 1514594: Part 3a - Change ChromeUtils.import to return an exports object; not pollute global. r=mccr8
This changes the behavior of ChromeUtils.import() to return an exports object,
rather than a module global, in all cases except when `null` is passed as a
second argument, and changes the default behavior not to pollute the global
scope with the module's exports. Thus, the following code written for the old
model:
ChromeUtils.import("resource://gre/modules/Services.jsm");
is approximately the same as the following, in the new model:
var {Services} = ChromeUtils.import("resource://gre/modules/Services.jsm");
Since the two behaviors are mutually incompatible, this patch will land with a
scripted rewrite to update all existing callers to use the new model rather
than the old.
***
Bug 1514594: Part 3b - Mass rewrite all JS code to use the new ChromeUtils.import API. rs=Gijs
This was done using the followng script:
https://bitbucket.org/kmaglione/m-c-rewrites/src/tip/processors/cu-import-exports.jsm
***
Bug 1514594: Part 3c - Update ESLint plugin for ChromeUtils.import API changes. r=Standard8
Differential Revision: https://phabricator.services.mozilla.com/D16747
***
Bug 1514594: Part 3d - Remove/fix hundreds of duplicate imports from sync tests. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D16748
***
Bug 1514594: Part 3e - Remove no-op ChromeUtils.import() calls. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D16749
***
Bug 1514594: Part 3f.1 - Cleanup various test corner cases after mass rewrite. r=Gijs
***
Bug 1514594: Part 3f.2 - Cleanup various non-test corner cases after mass rewrite. r=Gijs
Differential Revision: https://phabricator.services.mozilla.com/D16750
--HG--
extra : rebase_source : 359574ee3064c90f33bf36c2ebe3159a24cc8895
extra : histedit_source : b93c8f42808b1599f9122d7842d2c0b3e656a594%2C64a3a4e3359dc889e2ab2b49461bab9e27fc10a7
74 lines
2.8 KiB
JavaScript
74 lines
2.8 KiB
JavaScript
/* -*- indent-tabs-mode: nil; js-indent-level: 2 -*- */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
/* This content script should work in any browser or iframe and should not
|
|
* depend on the frame being contained in tabbrowser. */
|
|
|
|
/* eslint-env mozilla/frame-script */
|
|
/* eslint no-unused-vars: ["error", {args: "none"}] */
|
|
|
|
var {XPCOMUtils} = ChromeUtils.import("resource://gre/modules/XPCOMUtils.jsm");
|
|
|
|
// TabChildGlobal
|
|
var global = this;
|
|
|
|
XPCOMUtils.defineLazyModuleGetters(this, {
|
|
ContentMetaHandler: "resource:///modules/ContentMetaHandler.jsm",
|
|
LoginFormFactory: "resource://gre/modules/LoginManagerContent.jsm",
|
|
InsecurePasswordUtils: "resource://gre/modules/InsecurePasswordUtils.jsm",
|
|
ContextMenuChild: "resource:///actors/ContextMenuChild.jsm",
|
|
});
|
|
|
|
XPCOMUtils.defineLazyGetter(this, "LoginManagerContent", () => {
|
|
let tmp = {};
|
|
ChromeUtils.import("resource://gre/modules/LoginManagerContent.jsm", tmp);
|
|
tmp.LoginManagerContent.setupEventListeners(global);
|
|
return tmp.LoginManagerContent;
|
|
});
|
|
|
|
// NOTE: Much of this logic is duplicated in BrowserCLH.js for Android.
|
|
addMessageListener("RemoteLogins:fillForm", function(message) {
|
|
// intercept if ContextMenu.jsm had sent a plain object for remote targets
|
|
message.objects.inputElement = ContextMenuChild.getTarget(global, message, "inputElement");
|
|
LoginManagerContent.receiveMessage(message, content);
|
|
});
|
|
|
|
function shouldIgnoreLoginManagerEvent(event) {
|
|
// If we have a null principal then prevent any more password manager code from running and
|
|
// incorrectly using the document `location`.
|
|
return event.target.nodePrincipal.isNullPrincipal;
|
|
}
|
|
|
|
addEventListener("DOMFormHasPassword", function(event) {
|
|
if (shouldIgnoreLoginManagerEvent(event)) {
|
|
return;
|
|
}
|
|
LoginManagerContent.onDOMFormHasPassword(event, content);
|
|
let formLike = LoginFormFactory.createFromForm(event.originalTarget);
|
|
InsecurePasswordUtils.reportInsecurePasswords(formLike);
|
|
});
|
|
addEventListener("DOMInputPasswordAdded", function(event) {
|
|
if (shouldIgnoreLoginManagerEvent(event)) {
|
|
return;
|
|
}
|
|
LoginManagerContent.onDOMInputPasswordAdded(event, content);
|
|
let formLike = LoginFormFactory.createFromField(event.originalTarget);
|
|
InsecurePasswordUtils.reportInsecurePasswords(formLike);
|
|
});
|
|
addEventListener("DOMAutoComplete", function(event) {
|
|
if (shouldIgnoreLoginManagerEvent(event)) {
|
|
return;
|
|
}
|
|
LoginManagerContent.onUsernameInput(event);
|
|
});
|
|
|
|
ContentMetaHandler.init(this);
|
|
|
|
// This is a temporary hack to prevent regressions (bug 1471327).
|
|
void content;
|
|
|
|
addEventListener("DOMWindowFocus", function(event) {
|
|
sendAsyncMessage("DOMWindowFocus", {});
|
|
}, false);
|