100 lines
3.2 KiB
JavaScript
100 lines
3.2 KiB
JavaScript
var svgEditorExtension_xdomain_messaging = (function () {
|
|
'use strict';
|
|
|
|
function _typeof(obj) {
|
|
if (typeof Symbol === "function" && typeof Symbol.iterator === "symbol") {
|
|
_typeof = function (obj) {
|
|
return typeof obj;
|
|
};
|
|
} else {
|
|
_typeof = function (obj) {
|
|
return obj && typeof Symbol === "function" && obj.constructor === Symbol && obj !== Symbol.prototype ? "symbol" : typeof obj;
|
|
};
|
|
}
|
|
|
|
return _typeof(obj);
|
|
}
|
|
|
|
function _toConsumableArray(arr) {
|
|
return _arrayWithoutHoles(arr) || _iterableToArray(arr) || _nonIterableSpread();
|
|
}
|
|
|
|
function _arrayWithoutHoles(arr) {
|
|
if (Array.isArray(arr)) {
|
|
for (var i = 0, arr2 = new Array(arr.length); i < arr.length; i++) arr2[i] = arr[i];
|
|
|
|
return arr2;
|
|
}
|
|
}
|
|
|
|
function _iterableToArray(iter) {
|
|
if (Symbol.iterator in Object(iter) || Object.prototype.toString.call(iter) === "[object Arguments]") return Array.from(iter);
|
|
}
|
|
|
|
function _nonIterableSpread() {
|
|
throw new TypeError("Invalid attempt to spread non-iterable instance");
|
|
}
|
|
|
|
/**
|
|
* Should not be needed for same domain control (just call via child frame),
|
|
* but an API common for cross-domain and same domain use can be found
|
|
* in embedapi.js with a demo at embedapi.html.
|
|
*/
|
|
var extXdomainMessaging = {
|
|
name: 'xdomain-messaging',
|
|
init: function init() {
|
|
var svgEditor = this;
|
|
var svgCanvas = svgEditor.canvas;
|
|
|
|
try {
|
|
window.addEventListener('message', function (e) {
|
|
// We accept and post strings for the sake of IE9 support
|
|
if (!e.data || !['string', 'object'].includes(_typeof(e.data)) || e.data.charAt() === '|') {
|
|
return;
|
|
}
|
|
|
|
var data = _typeof(e.data) === 'object' ? e.data : JSON.parse(e.data);
|
|
|
|
if (!data || _typeof(data) !== 'object' || data.namespace !== 'svgCanvas') {
|
|
return;
|
|
} // The default is not to allow any origins, including even the same domain or
|
|
// if run on a `file:///` URL. See `svgedit-config-es.js` for an example of how
|
|
// to configure
|
|
|
|
|
|
var allowedOrigins = svgEditor.curConfig.allowedOrigins;
|
|
|
|
if (!allowedOrigins.includes('*') && !allowedOrigins.includes(e.origin)) {
|
|
console.log("Origin ".concat(e.origin, " not whitelisted for posting to ").concat(window.origin)); // eslint-disable-line no-console
|
|
|
|
return;
|
|
}
|
|
|
|
var cbid = data.id;
|
|
var name = data.name,
|
|
args = data.args;
|
|
var message = {
|
|
namespace: 'svg-edit',
|
|
id: cbid
|
|
};
|
|
|
|
try {
|
|
// Now that we know the origin is trusted, we perform otherwise
|
|
// unsafe arbitrary canvas method execution
|
|
message.result = svgCanvas[name].apply(svgCanvas, _toConsumableArray(args)); // lgtm [js/remote-property-injection]
|
|
} catch (err) {
|
|
message.error = err.message;
|
|
}
|
|
|
|
e.source.postMessage(JSON.stringify(message), '*');
|
|
});
|
|
} catch (err) {
|
|
console.log('Error with xdomain message listener: ' + err); // eslint-disable-line no-console
|
|
}
|
|
}
|
|
};
|
|
|
|
return extXdomainMessaging;
|
|
|
|
}());
|