gecko/browser/components/safebrowsing/content/sb-loader.js

206 lines
7.3 KiB
JavaScript

# ***** BEGIN LICENSE BLOCK *****
# Version: MPL 1.1/GPL 2.0/LGPL 2.1
#
# The contents of this file are subject to the Mozilla Public License Version
# 1.1 (the "License"); you may not use this file except in compliance with
# the License. You may obtain a copy of the License at
# http://www.mozilla.org/MPL/
#
# Software distributed under the License is distributed on an "AS IS" basis,
# WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
# for the specific language governing rights and limitations under the
# License.
#
# The Original Code is Google Safe Browsing.
#
# The Initial Developer of the Original Code is Google Inc.
# Portions created by the Initial Developer are Copyright (C) 2006
# the Initial Developer. All Rights Reserved.
#
# Contributor(s):
# Fritz Schneider <fritz@google.com> (original author)
#
# Alternatively, the contents of this file may be used under the terms of
# either the GNU General Public License Version 2 or later (the "GPL"), or
# the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
# in which case the provisions of the GPL or the LGPL are applicable instead
# of those above. If you wish to allow use of your version of this file only
# under the terms of either the GPL or the LGPL, and not to allow others to
# use your version of this file under the terms of the MPL, indicate your
# decision by deleting the provisions above and replace them with the notice
# and other provisions required by the GPL or the LGPL. If you do not delete
# the provisions above, a recipient may use your version of this file under
# the terms of any one of the MPL, the GPL or the LGPL.
#
# ***** END LICENSE BLOCK *****
/**
* This file is included into the main browser chrome from
* browser/base/content/global-scripts.inc
*/
var safebrowsing = {
controller: null,
phishWarden: null,
// We set up the web progress listener immediately so we don't miss any
// phishing urls. Since the phishing infrastructure isn't loaded yet, we
// just store the urls in a list.
progressListener: null,
progressListenerCallback: {
requests: [],
onDocNavStart: function(request, url) {
this.requests.push({
'request': request,
'url': url
});
}
},
startup: function() {
setTimeout(safebrowsing.deferredStartup, 2000);
// clean up
window.removeEventListener("load", safebrowsing.startup, false);
},
deferredStartup: function() {
var appContext = Cc["@mozilla.org/safebrowsing/application;1"]
.getService().wrappedJSObject;
var malwareWarden = new appContext.PROT_MalwareWarden();
safebrowsing.malwareWarden = malwareWarden;
// Register tables
malwareWarden.registerBlackTable("goog-malware-sha128");
malwareWarden.maybeToggleUpdateChecking();
// Each new browser window needs its own controller.
safebrowsing.progressListener.QueryInterface(Ci.nsIWebProgressListener);
var phishWarden = new appContext.PROT_PhishingWarden(
safebrowsing.progressListener, getBrowser());
safebrowsing.phishWarden = phishWarden;
// Register tables
// XXX: move table names to a pref that we originally will download
// from the provider (need to workout protocol details)
phishWarden.registerBlackTable("goog-phish-sha128");
// Download/update lists if we're in non-enhanced mode
phishWarden.maybeToggleUpdateChecking();
safebrowsing.controller = new appContext.PROT_Controller(
window, getBrowser(), phishWarden);
// Remove the global progress listener. The phishingWarden moves
// the progress listener to the tabbrowser so we don't need it anymore.
safebrowsing.progressListener.globalProgressListenerEnabled = false;
// The initial pages may be a phishing site (e.g., user clicks on a link
// in an email message and it opens a new window with a phishing site),
// so we need to check all requests that fired before deferredStartup.
if (!phishWarden.phishWardenEnabled_) {
safebrowsing.progressListenerCallback.requests = null;
safebrowsing.progressListenerCallback.onDocNavStart = null;
safebrowsing.progressListenerCallback = null;
safebrowsing.progressListener = null;
return;
}
var pendingRequests = safebrowsing.progressListenerCallback.requests;
for (var i = 0; i < pendingRequests.length; ++i) {
var request = pendingRequests[i].request;
var url = pendingRequests[i].url;
phishWarden.onDocNavStart(request, url);
}
// Cleanup
safebrowsing.progressListenerCallback.requests = null;
safebrowsing.progressListenerCallback.onDocNavStart = null;
safebrowsing.progressListenerCallback = null;
safebrowsing.progressListener = null;
},
/**
* Clean up.
*/
shutdown: function() {
if (safebrowsing.controller) {
// If the user shuts down before deferredStartup, there is no controller.
safebrowsing.controller.shutdown();
}
if (safebrowsing.phishWarden) {
safebrowsing.phishWarden.shutdown();
}
if (safebrowsing.malwareWarden) {
safebrowsing.malwareWarden.shutdown();
}
window.removeEventListener("unload", safebrowsing.shutdown, false);
},
setReportPhishingMenu: function() {
var uri = getBrowser().currentURI;
if (!uri)
return;
var sbIconElt = document.getElementById("safebrowsing-urlbar-icon");
var helpMenuElt = document.getElementById("helpMenu");
var phishLevel = sbIconElt.getAttribute("level");
// Show/hide the appropriate menu item.
document.getElementById("menu_HelpPopup_reportPhishingtoolmenu")
.hidden = ("safe" != phishLevel);
document.getElementById("menu_HelpPopup_reportPhishingErrortoolmenu")
.hidden = ("safe" == phishLevel);
var broadcasterId;
if ("safe" == phishLevel) {
broadcasterId = "reportPhishingBroadcaster";
} else {
broadcasterId = "reportPhishingErrorBroadcaster";
}
var broadcaster = document.getElementById(broadcasterId);
if (!broadcaster)
return;
var progressListener =
Cc["@mozilla.org/browser/safebrowsing/navstartlistener;1"]
.createInstance(Ci.nsIDocNavStartProgressListener);
broadcaster.setAttribute("disabled", progressListener.isSpurious(uri));
},
/**
* Used to report a phishing page or a false positive
* @param name String either "Phish" or "Error"
* @return String the report phishing URL.
*/
getReportURL: function(name) {
var appContext = Cc["@mozilla.org/safebrowsing/application;1"]
.getService().wrappedJSObject;
var reportUrl = appContext.getReportURL(name);
var pageUrl = getBrowser().currentURI.asciiSpec;
reportUrl += "&url=" + encodeURIComponent(pageUrl);
return reportUrl;
}
}
// Set up a global request listener immediately so we don't miss
// any url loads. We do the actually checking in the deferredStartup
// method.
safebrowsing.progressListener =
Components.classes["@mozilla.org/browser/safebrowsing/navstartlistener;1"]
.createInstance(Components.interfaces.nsIDocNavStartProgressListener);
safebrowsing.progressListener.callback =
safebrowsing.progressListenerCallback;
safebrowsing.progressListener.globalProgressListenerEnabled = true;
safebrowsing.progressListener.delay = 0;
window.addEventListener("load", safebrowsing.startup, false);
window.addEventListener("unload", safebrowsing.shutdown, false);