Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 function parseQuery(request, key) {
2 var params = request.queryString.split('&');
3 for (var j = 0; j < params.length; ++j) {
4 var p = params[j];
5 if (p == key)
6 return true;
7 if (p.indexOf(key + "=") == 0)
8 return p.substring(key.length + 1);
9 if (p.indexOf("=") < 0 && key == "")
10 return p;
11 }
12 return false;
13 }
15 function handleRequest(request, response) {
16 var name = parseQuery(request, "name");
17 var type = parseQuery(request, "type");
18 var cors = parseQuery(request, "cors");
19 var file = Components.classes["@mozilla.org/file/directory_service;1"].
20 getService(Components.interfaces.nsIProperties).
21 get("CurWorkD", Components.interfaces.nsILocalFile);
22 var fis = Components.classes['@mozilla.org/network/file-input-stream;1'].
23 createInstance(Components.interfaces.nsIFileInputStream);
24 var bis = Components.classes["@mozilla.org/binaryinputstream;1"].
25 createInstance(Components.interfaces.nsIBinaryInputStream);
26 var split = name.split("/");
27 for(var i = 0; i < split.length; ++i) {
28 file.append(split[i]);
29 }
30 fis.init(file, -1, -1, false);
31 bis.setInputStream(fis);
32 var bytes = bis.readBytes(bis.available());
33 response.setHeader("Content-Length", ""+bytes.length, false);
34 response.setHeader("Content-Type", type, false);
35 if (cors == "anonymous") {
36 response.setHeader("Access-Control-Allow-Origin", "*", false);
37 } else if (cors == "use-credentials") {
38 response.setHeader("Access-Control-Allow-Origin", "http://mochi.test:8888", false);
39 response.setHeader("Access-Control-Allow-Credentials", "true", false);
40 }
41 response.write(bytes, bytes.length);
42 bis.close();
43 }