aboutsummaryrefslogtreecommitdiff
path: root/src/background/Application.ts
blob: 87865e62cf874ae7068206de983c594e7b76d9e0 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
import { injectable, inject } from "tsyringe";
import ContentMessageListener from "./infrastructures/ContentMessageListener";
import SettingController from "./controllers/SettingController";
import VersionController from "./controllers/VersionController";
import SettingRepository from "./repositories/SettingRepository";
import FindRepositoryImpl from "./repositories/FindRepository";
import ReadyFrameRepository from "./repositories/ReadyFrameRepository";

@injectable()
export default class Application {
  constructor(
    private contentMessageListener: ContentMessageListener,
    private settingController: SettingController,
    private versionController: VersionController,
    @inject("SyncSettingRepository")
    private syncSettingRepository: SettingRepository,
    @inject("FindRepository")
    private readonly findRepository: FindRepositoryImpl,
    @inject("ReadyFrameRepository")
    private readonly frameRepository: ReadyFrameRepository
  ) {}

  run() {
    this.settingController.reload();

    browser.tabs.onUpdated.addListener((tabId: number, info) => {
      if (info.status == "loading") {
        this.frameRepository.clearFrameIds(tabId);
        this.findRepository.deleteLocalState(tabId);
      }
    });
    browser.runtime.onInstalled.addListener((details) => {
      if (details.reason !== "install" && details.reason !== "update") {
        return;
      }
      this.versionController.notify();
    });
    browser.webNavigation.onCompleted.addListener((detail) => {
      // The console iframe embedded by Vim-Vixen has url starting with
      // 'moz-extensions://'.  The add-on should ignore it from search targets.
      //
      // When a browser blocks to load an iframe by x-frame options or a
      // content security policy, the URL begins with 'about:neterror', and
      // a background script fails to send a message to iframe.
      if (
        detail.url.startsWith("http://") ||
        detail.url.startsWith("https://")
      ) {
        this.frameRepository.addFrameId(detail.tabId, detail.frameId);
      }
    });

    this.contentMessageListener.run();
    this.syncSettingRepository.onChange(() => {
      this.settingController.reload();
    });
  }
}