mirror of
https://github.com/rn10950/RetroZilla.git
synced 2024-11-10 01:40:17 +01:00
196 lines
6.9 KiB
JavaScript
196 lines
6.9 KiB
JavaScript
|
/* ***** BEGIN LICENSE BLOCK *****
|
||
|
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
||
|
*
|
||
|
* The contents of this file are subject to the Mozilla Public License Version
|
||
|
* 1.1 (the "License"); you may not use this file except in compliance with
|
||
|
* the License. You may obtain a copy of the License at
|
||
|
* http://www.mozilla.org/MPL/
|
||
|
*
|
||
|
* Software distributed under the License is distributed on an "AS IS" basis,
|
||
|
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
||
|
* for the specific language governing rights and limitations under the
|
||
|
* License.
|
||
|
*
|
||
|
* The Original Code is Google Safe Browsing.
|
||
|
*
|
||
|
* The Initial Developer of the Original Code is Google Inc.
|
||
|
* Portions created by the Initial Developer are Copyright (C) 2006
|
||
|
* the Initial Developer. All Rights Reserved.
|
||
|
*
|
||
|
* Contributor(s):
|
||
|
* Fritz Schneider <fritz@google.com> (original author)
|
||
|
*
|
||
|
* Alternatively, the contents of this file may be used under the terms of
|
||
|
* either the GNU General Public License Version 2 or later (the "GPL"), or
|
||
|
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
||
|
* in which case the provisions of the GPL or the LGPL are applicable instead
|
||
|
* of those above. If you wish to allow use of your version of this file only
|
||
|
* under the terms of either the GPL or the LGPL, and not to allow others to
|
||
|
* use your version of this file under the terms of the MPL, indicate your
|
||
|
* decision by deleting the provisions above and replace them with the notice
|
||
|
* and other provisions required by the GPL or the LGPL. If you do not delete
|
||
|
* the provisions above, a recipient may use your version of this file under
|
||
|
* the terms of any one of the MPL, the GPL or the LGPL.
|
||
|
*
|
||
|
* ***** END LICENSE BLOCK ***** */
|
||
|
|
||
|
|
||
|
/**
|
||
|
* This file is included into the main browser chrome from
|
||
|
* browser/base/content/global-scripts.inc
|
||
|
*/
|
||
|
|
||
|
var safebrowsing = {
|
||
|
controller: null,
|
||
|
phishWarden: null,
|
||
|
|
||
|
// We set up the web progress listener immediately so we don't miss any
|
||
|
// phishing urls. Since the phishing infrastructure isn't loaded yet, we
|
||
|
// just store the urls in a list.
|
||
|
progressListener: null,
|
||
|
progressListenerCallback: {
|
||
|
requests: [],
|
||
|
onDocNavStart: function(request, url) {
|
||
|
this.requests.push({
|
||
|
'request': request,
|
||
|
'url': url
|
||
|
});
|
||
|
}
|
||
|
},
|
||
|
|
||
|
startup: function() {
|
||
|
setTimeout(safebrowsing.deferredStartup, 2000);
|
||
|
|
||
|
var helpMenu = document.getElementById("menu_HelpPopup");
|
||
|
if (helpMenu) {
|
||
|
helpMenu.addEventListener("popupshowing",
|
||
|
safebrowsing.setReportPhishingMenu,
|
||
|
false);
|
||
|
}
|
||
|
|
||
|
// clean up
|
||
|
window.removeEventListener("load", safebrowsing.startup, false);
|
||
|
},
|
||
|
|
||
|
deferredStartup: function() {
|
||
|
var appContext = Cc["@mozilla.org/safebrowsing/application;1"]
|
||
|
.getService().wrappedJSObject;
|
||
|
|
||
|
// Each new browser window needs its own controller.
|
||
|
|
||
|
var contentArea = document.getElementById("content");
|
||
|
|
||
|
var phishWarden = new appContext.PROT_PhishingWarden(
|
||
|
safebrowsing.progressListener);
|
||
|
safebrowsing.phishWarden = phishWarden;
|
||
|
|
||
|
// Register tables
|
||
|
// XXX: move table names to a pref that we originally will download
|
||
|
// from the provider (need to workout protocol details)
|
||
|
phishWarden.registerWhiteTable("goog-white-domain");
|
||
|
phishWarden.registerWhiteTable("goog-white-url");
|
||
|
phishWarden.registerBlackTable("goog-black-url");
|
||
|
phishWarden.registerBlackTable("goog-black-enchash");
|
||
|
|
||
|
// Download/update lists if we're in non-enhanced mode
|
||
|
phishWarden.maybeToggleUpdateChecking();
|
||
|
var tabWatcher = new appContext.G_TabbedBrowserWatcher(
|
||
|
contentArea,
|
||
|
"safebrowsing-watcher",
|
||
|
true /*ignore about:blank*/);
|
||
|
safebrowsing.controller = new appContext.PROT_Controller(
|
||
|
window,
|
||
|
tabWatcher,
|
||
|
phishWarden);
|
||
|
|
||
|
// The initial pages may be a phishing site (e.g., user clicks on a link
|
||
|
// in an email message and it opens a new window with a phishing site),
|
||
|
// so we need to check all requests that fired before deferredStartup.
|
||
|
if (!phishWarden.phishWardenEnabled_) {
|
||
|
safebrowsing.progressListenerCallback.requests = null;
|
||
|
safebrowsing.progressListenerCallback.onDocNavStart = null;
|
||
|
safebrowsing.progressListenerCallback = null;
|
||
|
safebrowsing.progressListener = null;
|
||
|
return;
|
||
|
}
|
||
|
|
||
|
var pendingRequests = safebrowsing.progressListenerCallback.requests;
|
||
|
for (var i = 0; i < pendingRequests.length; ++i) {
|
||
|
var request = pendingRequests[i].request;
|
||
|
var url = pendingRequests[i].url;
|
||
|
|
||
|
phishWarden.onDocNavStart(request, url);
|
||
|
}
|
||
|
// Cleanup
|
||
|
safebrowsing.progressListenerCallback.requests = null;
|
||
|
safebrowsing.progressListenerCallback.onDocNavStart = null;
|
||
|
safebrowsing.progressListenerCallback = null;
|
||
|
safebrowsing.progressListener = null;
|
||
|
},
|
||
|
|
||
|
/**
|
||
|
* Clean up.
|
||
|
*/
|
||
|
shutdown: function() {
|
||
|
if (safebrowsing.controller) {
|
||
|
// If the user shuts down before deferredStartup, there is no controller.
|
||
|
safebrowsing.controller.shutdown();
|
||
|
}
|
||
|
if (safebrowsing.phishWarden) {
|
||
|
safebrowsing.phishWarden.shutdown();
|
||
|
}
|
||
|
var helpMenu = document.getElementById("menu_HelpPopup");
|
||
|
if (helpMenu) {
|
||
|
helpMenu.removeEventListener("popupshowing",
|
||
|
safebrowsing.setReportPhishingMenu,
|
||
|
false);
|
||
|
}
|
||
|
|
||
|
window.removeEventListener("unload", safebrowsing.shutdown, false);
|
||
|
},
|
||
|
|
||
|
setReportPhishingMenu: function() {
|
||
|
var uri = getBrowser().currentURI;
|
||
|
if (!uri)
|
||
|
return;
|
||
|
|
||
|
var broadcaster = document.getElementById("reportPhishingBroadcaster");
|
||
|
if (!broadcaster)
|
||
|
return;
|
||
|
|
||
|
var progressListener =
|
||
|
Cc["@mozilla.org/browser/safebrowsing/navstartlistener;1"]
|
||
|
.createInstance(Ci.nsIDocNavStartProgressListener);
|
||
|
broadcaster.setAttribute("disabled", progressListener.isSpurious(uri));
|
||
|
},
|
||
|
|
||
|
/**
|
||
|
* Used to report phishing pages.
|
||
|
* @return String the report phishing URL.
|
||
|
*/
|
||
|
getReportPhishingURL: function() {
|
||
|
var appContext = Cc["@mozilla.org/safebrowsing/application;1"]
|
||
|
.getService().wrappedJSObject;
|
||
|
var reportUrl = appContext.getReportPhishingURL();
|
||
|
|
||
|
var pageUrl = getBrowser().currentURI.asciiSpec;
|
||
|
reportUrl += "&url=" + encodeURIComponent(pageUrl);
|
||
|
|
||
|
return reportUrl;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// Set up our request listener immediately so we don't miss
|
||
|
// any url loads. We do the actually checking in the deferredStartup
|
||
|
// method.
|
||
|
safebrowsing.progressListener =
|
||
|
Cc["@mozilla.org/browser/safebrowsing/navstartlistener;1"]
|
||
|
.createInstance(Ci.nsIDocNavStartProgressListener);
|
||
|
safebrowsing.progressListener.callback =
|
||
|
safebrowsing.progressListenerCallback;
|
||
|
safebrowsing.progressListener.enabled = true;
|
||
|
safebrowsing.progressListener.delay = 0;
|
||
|
|
||
|
window.addEventListener("load", safebrowsing.startup, false);
|
||
|
window.addEventListener("unload", safebrowsing.shutdown, false);
|