Fri, 16 Jan 2015 18:13:44 +0100
Integrate suggestion from review to improve consistency with existing code.
michael@0 | 1 | /* This Source Code Form is subject to the terms of the Mozilla Public |
michael@0 | 2 | * License, v. 2.0. If a copy of the MPL was not distributed with this |
michael@0 | 3 | * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
michael@0 | 4 | |
michael@0 | 5 | "use strict"; |
michael@0 | 6 | |
michael@0 | 7 | this.EXPORTED_SYMBOLS = [ "Feeds" ]; |
michael@0 | 8 | |
michael@0 | 9 | Components.utils.import("resource://gre/modules/XPCOMUtils.jsm"); |
michael@0 | 10 | |
michael@0 | 11 | XPCOMUtils.defineLazyModuleGetter(this, "BrowserUtils", |
michael@0 | 12 | "resource://gre/modules/BrowserUtils.jsm"); |
michael@0 | 13 | |
michael@0 | 14 | const Ci = Components.interfaces; |
michael@0 | 15 | |
michael@0 | 16 | this.Feeds = { |
michael@0 | 17 | |
michael@0 | 18 | /** |
michael@0 | 19 | * isValidFeed: checks whether the given data represents a valid feed. |
michael@0 | 20 | * |
michael@0 | 21 | * @param aLink |
michael@0 | 22 | * An object representing a feed with title, href and type. |
michael@0 | 23 | * @param aPrincipal |
michael@0 | 24 | * The principal of the document, used for security check. |
michael@0 | 25 | * @param aIsFeed |
michael@0 | 26 | * Whether this is already a known feed or not, if true only a security |
michael@0 | 27 | * check will be performed. |
michael@0 | 28 | */ |
michael@0 | 29 | isValidFeed: function(aLink, aPrincipal, aIsFeed) { |
michael@0 | 30 | if (!aLink || !aPrincipal) |
michael@0 | 31 | return false; |
michael@0 | 32 | |
michael@0 | 33 | var type = aLink.type.toLowerCase().replace(/^\s+|\s*(?:;.*)?$/g, ""); |
michael@0 | 34 | if (!aIsFeed) { |
michael@0 | 35 | aIsFeed = (type == "application/rss+xml" || |
michael@0 | 36 | type == "application/atom+xml"); |
michael@0 | 37 | } |
michael@0 | 38 | |
michael@0 | 39 | if (aIsFeed) { |
michael@0 | 40 | try { |
michael@0 | 41 | BrowserUtils.urlSecurityCheck(aLink.href, aPrincipal, |
michael@0 | 42 | Ci.nsIScriptSecurityManager.DISALLOW_INHERIT_PRINCIPAL); |
michael@0 | 43 | return type || "application/rss+xml"; |
michael@0 | 44 | } |
michael@0 | 45 | catch(ex) { |
michael@0 | 46 | } |
michael@0 | 47 | } |
michael@0 | 48 | |
michael@0 | 49 | return null; |
michael@0 | 50 | }, |
michael@0 | 51 | |
michael@0 | 52 | }; |