mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
206 lines
7.3 KiB
JavaScript
206 lines
7.3 KiB
JavaScript
# ***** BEGIN LICENSE BLOCK *****
|
|
# Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
|
#
|
|
# The contents of this file are subject to the Mozilla Public License Version
|
|
# 1.1 (the "License"); you may not use this file except in compliance with
|
|
# the License. You may obtain a copy of the License at
|
|
# http://www.mozilla.org/MPL/
|
|
#
|
|
# Software distributed under the License is distributed on an "AS IS" basis,
|
|
# WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
|
# for the specific language governing rights and limitations under the
|
|
# License.
|
|
#
|
|
# The Original Code is Google Safe Browsing.
|
|
#
|
|
# The Initial Developer of the Original Code is Google Inc.
|
|
# Portions created by the Initial Developer are Copyright (C) 2006
|
|
# the Initial Developer. All Rights Reserved.
|
|
#
|
|
# Contributor(s):
|
|
# Fritz Schneider <fritz@google.com> (original author)
|
|
#
|
|
# Alternatively, the contents of this file may be used under the terms of
|
|
# either the GNU General Public License Version 2 or later (the "GPL"), or
|
|
# the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
|
# in which case the provisions of the GPL or the LGPL are applicable instead
|
|
# of those above. If you wish to allow use of your version of this file only
|
|
# under the terms of either the GPL or the LGPL, and not to allow others to
|
|
# use your version of this file under the terms of the MPL, indicate your
|
|
# decision by deleting the provisions above and replace them with the notice
|
|
# and other provisions required by the GPL or the LGPL. If you do not delete
|
|
# the provisions above, a recipient may use your version of this file under
|
|
# the terms of any one of the MPL, the GPL or the LGPL.
|
|
#
|
|
# ***** END LICENSE BLOCK *****
|
|
|
|
|
|
/**
|
|
* This file is included into the main browser chrome from
|
|
* browser/base/content/global-scripts.inc
|
|
*/
|
|
|
|
var safebrowsing = {
|
|
controller: null,
|
|
phishWarden: null,
|
|
|
|
// We set up the web progress listener immediately so we don't miss any
|
|
// phishing urls. Since the phishing infrastructure isn't loaded yet, we
|
|
// just store the urls in a list.
|
|
progressListener: null,
|
|
progressListenerCallback: {
|
|
requests: [],
|
|
onDocNavStart: function(request, url) {
|
|
this.requests.push({
|
|
'request': request,
|
|
'url': url
|
|
});
|
|
}
|
|
},
|
|
|
|
startup: function() {
|
|
setTimeout(safebrowsing.deferredStartup, 2000);
|
|
|
|
// clean up
|
|
window.removeEventListener("load", safebrowsing.startup, false);
|
|
},
|
|
|
|
deferredStartup: function() {
|
|
var appContext = Cc["@mozilla.org/safebrowsing/application;1"]
|
|
.getService().wrappedJSObject;
|
|
|
|
var malwareWarden = new appContext.PROT_MalwareWarden();
|
|
safebrowsing.malwareWarden = malwareWarden;
|
|
|
|
// Register tables
|
|
malwareWarden.registerBlackTable("goog-malware-sha128");
|
|
|
|
malwareWarden.maybeToggleUpdateChecking();
|
|
|
|
// Each new browser window needs its own controller.
|
|
|
|
safebrowsing.progressListener.QueryInterface(Ci.nsIWebProgressListener);
|
|
var phishWarden = new appContext.PROT_PhishingWarden(
|
|
safebrowsing.progressListener, getBrowser());
|
|
safebrowsing.phishWarden = phishWarden;
|
|
|
|
// Register tables
|
|
// XXX: move table names to a pref that we originally will download
|
|
// from the provider (need to workout protocol details)
|
|
phishWarden.registerBlackTable("goog-phish-sha128");
|
|
|
|
// Download/update lists if we're in non-enhanced mode
|
|
phishWarden.maybeToggleUpdateChecking();
|
|
safebrowsing.controller = new appContext.PROT_Controller(
|
|
window, getBrowser(), phishWarden);
|
|
|
|
// Remove the global progress listener. The phishingWarden moves
|
|
// the progress listener to the tabbrowser so we don't need it anymore.
|
|
safebrowsing.progressListener.globalProgressListenerEnabled = false;
|
|
|
|
// The initial pages may be a phishing site (e.g., user clicks on a link
|
|
// in an email message and it opens a new window with a phishing site),
|
|
// so we need to check all requests that fired before deferredStartup.
|
|
if (!phishWarden.phishWardenEnabled_) {
|
|
safebrowsing.progressListenerCallback.requests = null;
|
|
safebrowsing.progressListenerCallback.onDocNavStart = null;
|
|
safebrowsing.progressListenerCallback = null;
|
|
safebrowsing.progressListener = null;
|
|
return;
|
|
}
|
|
|
|
var pendingRequests = safebrowsing.progressListenerCallback.requests;
|
|
for (var i = 0; i < pendingRequests.length; ++i) {
|
|
var request = pendingRequests[i].request;
|
|
var url = pendingRequests[i].url;
|
|
|
|
phishWarden.onDocNavStart(request, url);
|
|
}
|
|
// Cleanup
|
|
safebrowsing.progressListenerCallback.requests = null;
|
|
safebrowsing.progressListenerCallback.onDocNavStart = null;
|
|
safebrowsing.progressListenerCallback = null;
|
|
safebrowsing.progressListener = null;
|
|
},
|
|
|
|
/**
|
|
* Clean up.
|
|
*/
|
|
shutdown: function() {
|
|
if (safebrowsing.controller) {
|
|
// If the user shuts down before deferredStartup, there is no controller.
|
|
safebrowsing.controller.shutdown();
|
|
}
|
|
if (safebrowsing.phishWarden) {
|
|
safebrowsing.phishWarden.shutdown();
|
|
}
|
|
if (safebrowsing.malwareWarden) {
|
|
safebrowsing.malwareWarden.shutdown();
|
|
}
|
|
|
|
window.removeEventListener("unload", safebrowsing.shutdown, false);
|
|
},
|
|
|
|
setReportPhishingMenu: function() {
|
|
var uri = getBrowser().currentURI;
|
|
if (!uri)
|
|
return;
|
|
|
|
var sbIconElt = document.getElementById("safebrowsing-urlbar-icon");
|
|
var helpMenuElt = document.getElementById("helpMenu");
|
|
var phishLevel = sbIconElt.getAttribute("level");
|
|
|
|
// Show/hide the appropriate menu item.
|
|
document.getElementById("menu_HelpPopup_reportPhishingtoolmenu")
|
|
.hidden = ("safe" != phishLevel);
|
|
document.getElementById("menu_HelpPopup_reportPhishingErrortoolmenu")
|
|
.hidden = ("safe" == phishLevel);
|
|
|
|
var broadcasterId;
|
|
if ("safe" == phishLevel) {
|
|
broadcasterId = "reportPhishingBroadcaster";
|
|
} else {
|
|
broadcasterId = "reportPhishingErrorBroadcaster";
|
|
}
|
|
|
|
var broadcaster = document.getElementById(broadcasterId);
|
|
if (!broadcaster)
|
|
return;
|
|
|
|
var progressListener =
|
|
Cc["@mozilla.org/browser/safebrowsing/navstartlistener;1"]
|
|
.createInstance(Ci.nsIDocNavStartProgressListener);
|
|
broadcaster.setAttribute("disabled", progressListener.isSpurious(uri));
|
|
},
|
|
|
|
/**
|
|
* Used to report a phishing page or a false positive
|
|
* @param name String either "Phish" or "Error"
|
|
* @return String the report phishing URL.
|
|
*/
|
|
getReportURL: function(name) {
|
|
var appContext = Cc["@mozilla.org/safebrowsing/application;1"]
|
|
.getService().wrappedJSObject;
|
|
var reportUrl = appContext.getReportURL(name);
|
|
|
|
var pageUrl = getBrowser().currentURI.asciiSpec;
|
|
reportUrl += "&url=" + encodeURIComponent(pageUrl);
|
|
|
|
return reportUrl;
|
|
}
|
|
}
|
|
|
|
// Set up a global request listener immediately so we don't miss
|
|
// any url loads. We do the actually checking in the deferredStartup
|
|
// method.
|
|
safebrowsing.progressListener =
|
|
Components.classes["@mozilla.org/browser/safebrowsing/navstartlistener;1"]
|
|
.createInstance(Components.interfaces.nsIDocNavStartProgressListener);
|
|
safebrowsing.progressListener.callback =
|
|
safebrowsing.progressListenerCallback;
|
|
safebrowsing.progressListener.globalProgressListenerEnabled = true;
|
|
safebrowsing.progressListener.delay = 0;
|
|
|
|
window.addEventListener("load", safebrowsing.startup, false);
|
|
window.addEventListener("unload", safebrowsing.shutdown, false);
|