RetroZilla/browser/components/safebrowsing/content/sb-loader.js

196 lines
6.9 KiB
JavaScript
Raw Normal View History

2015-10-21 05:03:22 +02:00
/* ***** BEGIN LICENSE BLOCK *****
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
*
* The contents of this file are subject to the Mozilla Public License Version
* 1.1 (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
* http://www.mozilla.org/MPL/
*
* Software distributed under the License is distributed on an "AS IS" basis,
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
* for the specific language governing rights and limitations under the
* License.
*
* The Original Code is Google Safe Browsing.
*
* The Initial Developer of the Original Code is Google Inc.
* Portions created by the Initial Developer are Copyright (C) 2006
* the Initial Developer. All Rights Reserved.
*
* Contributor(s):
* Fritz Schneider <fritz@google.com> (original author)
*
* Alternatively, the contents of this file may be used under the terms of
* either the GNU General Public License Version 2 or later (the "GPL"), or
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
* in which case the provisions of the GPL or the LGPL are applicable instead
* of those above. If you wish to allow use of your version of this file only
* under the terms of either the GPL or the LGPL, and not to allow others to
* use your version of this file under the terms of the MPL, indicate your
* decision by deleting the provisions above and replace them with the notice
* and other provisions required by the GPL or the LGPL. If you do not delete
* the provisions above, a recipient may use your version of this file under
* the terms of any one of the MPL, the GPL or the LGPL.
*
* ***** END LICENSE BLOCK ***** */
/**
* This file is included into the main browser chrome from
* browser/base/content/global-scripts.inc
*/
var safebrowsing = {
controller: null,
phishWarden: null,
// We set up the web progress listener immediately so we don't miss any
// phishing urls. Since the phishing infrastructure isn't loaded yet, we
// just store the urls in a list.
progressListener: null,
progressListenerCallback: {
requests: [],
onDocNavStart: function(request, url) {
this.requests.push({
'request': request,
'url': url
});
}
},
startup: function() {
setTimeout(safebrowsing.deferredStartup, 2000);
var helpMenu = document.getElementById("menu_HelpPopup");
if (helpMenu) {
helpMenu.addEventListener("popupshowing",
safebrowsing.setReportPhishingMenu,
false);
}
// clean up
window.removeEventListener("load", safebrowsing.startup, false);
},
deferredStartup: function() {
var appContext = Cc["@mozilla.org/safebrowsing/application;1"]
.getService().wrappedJSObject;
// Each new browser window needs its own controller.
var contentArea = document.getElementById("content");
var phishWarden = new appContext.PROT_PhishingWarden(
safebrowsing.progressListener);
safebrowsing.phishWarden = phishWarden;
// Register tables
// XXX: move table names to a pref that we originally will download
// from the provider (need to workout protocol details)
phishWarden.registerWhiteTable("goog-white-domain");
phishWarden.registerWhiteTable("goog-white-url");
phishWarden.registerBlackTable("goog-black-url");
phishWarden.registerBlackTable("goog-black-enchash");
// Download/update lists if we're in non-enhanced mode
phishWarden.maybeToggleUpdateChecking();
var tabWatcher = new appContext.G_TabbedBrowserWatcher(
contentArea,
"safebrowsing-watcher",
true /*ignore about:blank*/);
safebrowsing.controller = new appContext.PROT_Controller(
window,
tabWatcher,
phishWarden);
// The initial pages may be a phishing site (e.g., user clicks on a link
// in an email message and it opens a new window with a phishing site),
// so we need to check all requests that fired before deferredStartup.
if (!phishWarden.phishWardenEnabled_) {
safebrowsing.progressListenerCallback.requests = null;
safebrowsing.progressListenerCallback.onDocNavStart = null;
safebrowsing.progressListenerCallback = null;
safebrowsing.progressListener = null;
return;
}
var pendingRequests = safebrowsing.progressListenerCallback.requests;
for (var i = 0; i < pendingRequests.length; ++i) {
var request = pendingRequests[i].request;
var url = pendingRequests[i].url;
phishWarden.onDocNavStart(request, url);
}
// Cleanup
safebrowsing.progressListenerCallback.requests = null;
safebrowsing.progressListenerCallback.onDocNavStart = null;
safebrowsing.progressListenerCallback = null;
safebrowsing.progressListener = null;
},
/**
* Clean up.
*/
shutdown: function() {
if (safebrowsing.controller) {
// If the user shuts down before deferredStartup, there is no controller.
safebrowsing.controller.shutdown();
}
if (safebrowsing.phishWarden) {
safebrowsing.phishWarden.shutdown();
}
var helpMenu = document.getElementById("menu_HelpPopup");
if (helpMenu) {
helpMenu.removeEventListener("popupshowing",
safebrowsing.setReportPhishingMenu,
false);
}
window.removeEventListener("unload", safebrowsing.shutdown, false);
},
setReportPhishingMenu: function() {
var uri = getBrowser().currentURI;
if (!uri)
return;
var broadcaster = document.getElementById("reportPhishingBroadcaster");
if (!broadcaster)
return;
var progressListener =
Cc["@mozilla.org/browser/safebrowsing/navstartlistener;1"]
.createInstance(Ci.nsIDocNavStartProgressListener);
broadcaster.setAttribute("disabled", progressListener.isSpurious(uri));
},
/**
* Used to report phishing pages.
* @return String the report phishing URL.
*/
getReportPhishingURL: function() {
var appContext = Cc["@mozilla.org/safebrowsing/application;1"]
.getService().wrappedJSObject;
var reportUrl = appContext.getReportPhishingURL();
var pageUrl = getBrowser().currentURI.asciiSpec;
reportUrl += "&url=" + encodeURIComponent(pageUrl);
return reportUrl;
}
}
// Set up our request listener immediately so we don't miss
// any url loads. We do the actually checking in the deferredStartup
// method.
safebrowsing.progressListener =
Cc["@mozilla.org/browser/safebrowsing/navstartlistener;1"]
.createInstance(Ci.nsIDocNavStartProgressListener);
safebrowsing.progressListener.callback =
safebrowsing.progressListenerCallback;
safebrowsing.progressListener.enabled = true;
safebrowsing.progressListener.delay = 0;
window.addEventListener("load", safebrowsing.startup, false);
window.addEventListener("unload", safebrowsing.shutdown, false);