Left: | ||
Right: |
LEFT | RIGHT |
---|---|
1 /* | 1 /* |
2 * This file is part of Adblock Plus <https://adblockplus.org/>, | 2 * This file is part of Adblock Plus <https://adblockplus.org/>, |
3 * Copyright (C) 2006-2015 Eyeo GmbH | 3 * Copyright (C) 2006-2015 Eyeo GmbH |
4 * | 4 * |
5 * Adblock Plus is free software: you can redistribute it and/or modify | 5 * Adblock Plus is free software: you can redistribute it and/or modify |
6 * it under the terms of the GNU General Public License version 3 as | 6 * it under the terms of the GNU General Public License version 3 as |
7 * published by the Free Software Foundation. | 7 * published by the Free Software Foundation. |
8 * | 8 * |
9 * Adblock Plus is distributed in the hope that it will be useful, | 9 * Adblock Plus is distributed in the hope that it will be useful, |
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of | 10 * but WITHOUT ANY WARRANTY; without even the implied warranty of |
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | 11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
12 * GNU General Public License for more details. | 12 * GNU General Public License for more details. |
13 * | 13 * |
14 * You should have received a copy of the GNU General Public License | 14 * You should have received a copy of the GNU General Public License |
15 * along with Adblock Plus. If not, see <http://www.gnu.org/licenses/>. | 15 * along with Adblock Plus. If not, see <http://www.gnu.org/licenses/>. |
16 */ | 16 */ |
17 | 17 |
18 /** | 18 /** |
19 * @fileOverview Content policy implementation, responsible for blocking things. | 19 * @fileOverview Content policy implementation, responsible for blocking things. |
20 */ | 20 */ |
21 | 21 |
22 Cu.import("resource://gre/modules/XPCOMUtils.jsm"); | 22 "use strict"; |
23 Cu.import("resource://gre/modules/Services.jsm"); | 23 |
24 let {XPCOMUtils} = Cu.import("resource://gre/modules/XPCOMUtils.jsm", {}); | |
25 let {Services} = Cu.import("resource://gre/modules/Services.jsm", {}); | |
24 | 26 |
25 let {Utils} = require("utils"); | 27 let {Utils} = require("utils"); |
26 let {Prefs} = require("prefs"); | 28 let {Prefs} = require("prefs"); |
27 let {FilterStorage} = require("filterStorage"); | 29 let {FilterStorage} = require("filterStorage"); |
28 let {BlockingFilter, WhitelistFilter, RegExpFilter} = require("filterClasses"); | 30 let {BlockingFilter, WhitelistFilter, RegExpFilter} = require("filterClasses"); |
29 let {defaultMatcher} = require("matcher"); | 31 let {defaultMatcher} = require("matcher"); |
30 let {objectMouseEventHander} = require("objectTabs"); | 32 let {objectMouseEventHander} = require("objectTabs"); |
31 let {RequestNotifier} = require("requestNotifier"); | 33 let {RequestNotifier} = require("requestNotifier"); |
32 let {ElemHide} = require("elemHide"); | 34 let {ElemHide} = require("elemHide"); |
33 | 35 |
(...skipping 16 matching lines...) Expand all Loading... | |
50 "ELEMHIDE", "POPUP", "GENERICHIDE", "GENERICBLOCK" | 52 "ELEMHIDE", "POPUP", "GENERICHIDE", "GENERICBLOCK" |
51 ]); | 53 ]); |
52 | 54 |
53 /** | 55 /** |
54 * Randomly generated class name, to be applied to collapsed nodes. | 56 * Randomly generated class name, to be applied to collapsed nodes. |
55 */ | 57 */ |
56 let collapsedClass = ""; | 58 let collapsedClass = ""; |
57 | 59 |
58 /** | 60 /** |
59 * Maps numerical content type IDs to strings. | 61 * Maps numerical content type IDs to strings. |
60 * @type Map | 62 * @type Map |
Thomas Greiner
2015/11/02 18:54:36
Detail: Since we've already been specifying the ty
Wladimir Palant
2015/11/03 11:26:49
True, will improve JSDoc comments in a separate co
Thomas Greiner
2015/11/03 11:54:54
Great, thanks.
| |
61 */ | 63 */ |
62 let types = new Map(); | 64 let types = new Map(); |
63 | 65 |
64 /** | 66 /** |
65 * Public policy checking functions and auxiliary objects | 67 * Public policy checking functions and auxiliary objects |
66 * @class | 68 * @class |
67 */ | 69 */ |
68 var Policy = exports.Policy = | 70 var Policy = exports.Policy = |
69 { | 71 { |
70 /** | 72 /** |
71 * Map of localized content type names by their identifiers. | 73 * Map of localized content type names by their identifiers. |
72 * @type Map | 74 * @type Map |
73 */ | 75 */ |
74 localizedDescr: new Map(), | 76 localizedDescr: new Map(), |
75 | 77 |
76 /** | 78 /** |
77 * Map containing all schemes that should be ignored by content policy. | 79 * Map containing all schemes that should be ignored by content policy. |
78 * @type Object | 80 * @type Set |
79 */ | 81 */ |
80 whitelistSchemes: {}, | 82 whitelistSchemes: new Set(), |
81 | 83 |
82 /** | 84 /** |
83 * Called on module startup, initializes various exported properties. | 85 * Called on module startup, initializes various exported properties. |
84 */ | 86 */ |
85 init: function() | 87 init: function() |
86 { | 88 { |
87 // Populate types map | 89 // Populate types map |
88 let iface = Ci.nsIContentPolicy; | 90 let iface = Ci.nsIContentPolicy; |
89 for (let name in iface) | 91 for (let name in iface) |
90 if (name.indexOf("TYPE_") == 0 && name != "TYPE_DATAREQUEST") | 92 if (name.indexOf("TYPE_") == 0 && name != "TYPE_DATAREQUEST") |
91 types.set(iface[name], name.substr(5)); | 93 types.set(iface[name], name.substr(5)); |
92 | 94 |
93 // Populate localized type names | 95 // Populate localized type names |
94 for (let typeName of contentTypes) | 96 for (let typeName of contentTypes) |
95 this.localizedDescr.set(typeName, Utils.getString("type_label_" + typeName .toLowerCase())); | 97 this.localizedDescr.set(typeName, Utils.getString("type_label_" + typeName .toLowerCase())); |
96 | 98 |
97 // whitelisted URL schemes | 99 // whitelisted URL schemes |
98 for (let scheme of Prefs.whitelistschemes.toLowerCase().split(" ")) | 100 for (let scheme of Prefs.whitelistschemes.toLowerCase().split(" ")) |
99 this.whitelistSchemes[scheme] = true; | 101 this.whitelistSchemes.add(scheme); |
100 | 102 |
101 // Generate class identifier used to collapse node and register correspondin g | 103 // Generate class identifier used to collapse node and register correspondin g |
102 // stylesheet. | 104 // stylesheet. |
103 let offset = "a".charCodeAt(0); | 105 let offset = "a".charCodeAt(0); |
104 for (let i = 0; i < 20; i++) | 106 for (let i = 0; i < 20; i++) |
105 collapsedClass += String.fromCharCode(offset + Math.random() * 26); | 107 collapsedClass += String.fromCharCode(offset + Math.random() * 26); |
106 | 108 |
107 let collapseStyle = Services.io.newURI("data:text/css," + | 109 let collapseStyle = Services.io.newURI("data:text/css," + |
108 encodeURIComponent("." + collapsedClass + | 110 encodeURIComponent("." + collapsedClass + |
109 "{-moz-binding: url(chrome://global/content/bindings/general.xml#foobarb azdummy) !important;}"), null, null); | 111 "{-moz-binding: url(chrome://global/content/bindings/general.xml#foobarb azdummy) !important;}"), null, null); |
(...skipping 146 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
256 return !match || match instanceof WhitelistFilter; | 258 return !match || match instanceof WhitelistFilter; |
257 }, | 259 }, |
258 | 260 |
259 /** | 261 /** |
260 * Checks whether the location's scheme is blockable. | 262 * Checks whether the location's scheme is blockable. |
261 * @param location {nsIURI} | 263 * @param location {nsIURI} |
262 * @return {Boolean} | 264 * @return {Boolean} |
263 */ | 265 */ |
264 isBlockableScheme: function(location) | 266 isBlockableScheme: function(location) |
265 { | 267 { |
266 return !(location.scheme in Policy.whitelistSchemes); | 268 return !Policy.whitelistSchemes.has(location.scheme); |
267 }, | 269 }, |
268 | 270 |
269 /** | 271 /** |
270 * Checks whether a page is whitelisted. | 272 * Checks whether a page is whitelisted. |
271 * @param {String} url | 273 * @param {String} url |
272 * @param {String} [parentUrl] location of the parent page | 274 * @param {String} [parentUrl] location of the parent page |
273 * @param {String} [sitekey] public key provided on the page | 275 * @param {String} [sitekey] public key provided on the page |
274 * @return {Filter} filter that matched the URL or null if not whitelisted | 276 * @return {Filter} filter that matched the URL or null if not whitelisted |
275 */ | 277 */ |
276 isWhitelisted: function(url, parentUrl, sitekey) | 278 isWhitelisted: function(url, parentUrl, sitekey) |
277 { | 279 { |
278 if (!url) | 280 if (!url) |
279 return null; | 281 return null; |
280 | 282 |
281 // Do not apply exception rules to schemes on our whitelistschemes list. | 283 // Do not apply exception rules to schemes on our whitelistschemes list. |
282 let match = /^([\w\-]+):/.exec(url); | 284 let match = /^([\w\-]+):/.exec(url); |
283 if (match && match[1] in Policy.whitelistSchemes) | 285 if (match && Policy.whitelistSchemes.has(match[1])) |
284 return null; | 286 return null; |
285 | 287 |
286 if (!parentUrl) | 288 if (!parentUrl) |
287 parentUrl = url; | 289 parentUrl = url; |
288 | 290 |
289 // Ignore fragment identifier | 291 // Ignore fragment identifier |
290 let index = url.indexOf("#"); | 292 let index = url.indexOf("#"); |
291 if (index >= 0) | 293 if (index >= 0) |
292 url = url.substring(0, index); | 294 url = url.substring(0, index); |
293 | 295 |
(...skipping 118 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
412 let uri = additional || Utils.makeURI(subject.location.href); | 414 let uri = additional || Utils.makeURI(subject.location.href); |
413 if (!Policy.processNode(subject.opener, subject.opener.document, "POPUP" , uri, false)) | 415 if (!Policy.processNode(subject.opener, subject.opener.document, "POPUP" , uri, false)) |
414 { | 416 { |
415 subject.stop(); | 417 subject.stop(); |
416 Utils.runAsync(() => subject.close()); | 418 Utils.runAsync(() => subject.close()); |
417 } | 419 } |
418 else if (uri.spec == "about:blank") | 420 else if (uri.spec == "about:blank") |
419 { | 421 { |
420 // An about:blank pop-up most likely means that a load will be | 422 // An about:blank pop-up most likely means that a load will be |
421 // initiated asynchronously. Wait for that. | 423 // initiated asynchronously. Wait for that. |
422 Utils.runAsync(function() | 424 Utils.runAsync(() => |
423 { | 425 { |
424 let channel = subject.QueryInterface(Ci.nsIInterfaceRequestor) | 426 let channel = subject.QueryInterface(Ci.nsIInterfaceRequestor) |
425 .getInterface(Ci.nsIDocShell) | 427 .getInterface(Ci.nsIDocShell) |
426 .QueryInterface(Ci.nsIDocumentLoader) | 428 .QueryInterface(Ci.nsIDocumentLoader) |
427 .documentChannel; | 429 .documentChannel; |
428 if (channel) | 430 if (channel) |
429 this.observe(subject, topic, data, channel.URI); | 431 this.observe(subject, topic, data, channel.URI); |
430 }); | 432 }); |
431 } | 433 } |
432 break; | 434 break; |
433 } | 435 } |
434 } | 436 } |
435 }, | 437 }, |
436 | 438 |
437 // | 439 // |
438 // nsIChannelEventSink interface implementation | 440 // nsIChannelEventSink interface implementation |
439 // | 441 // |
440 | 442 |
441 asyncOnChannelRedirect: function(oldChannel, newChannel, flags, callback) | 443 asyncOnChannelRedirect: function(oldChannel, newChannel, flags, callback) |
442 { | 444 { |
443 let result = Cr.NS_OK; | 445 let result = Cr.NS_OK; |
444 try | 446 try |
445 { | 447 { |
446 // nsILoadInfo.contentPolicyType was introduced in Gecko 35, then | 448 // nsILoadInfo.contentPolicyType was introduced in Gecko 35, then |
447 // renamed to nsILoadInfo.externalContentPolicyType in Gecko 44. | 449 // renamed to nsILoadInfo.externalContentPolicyType in Gecko 44. |
448 let loadInfo = oldChannel.loadInfo; | 450 let loadInfo = oldChannel.loadInfo; |
449 let contentType = loadInfo.externalContentPolicyType || loadInfo.contentPo licyType; | 451 let contentType = ("externalContentPolicyType" in loadInfo ? |
452 loadInfo.externalContentPolicyType : loadInfo.contentPolicyType); | |
450 if (!contentType) | 453 if (!contentType) |
451 return; | 454 return; |
452 | 455 |
453 let wnd = Utils.getRequestWindow(newChannel); | 456 let wnd = Utils.getRequestWindow(newChannel); |
454 if (!wnd) | 457 if (!wnd) |
455 return; | 458 return; |
456 | 459 |
457 if (contentType == Ci.nsIContentPolicy.TYPE_DOCUMENT) | 460 if (contentType == Ci.nsIContentPolicy.TYPE_DOCUMENT) |
458 { | 461 { |
459 if (wnd.history.length <= 1 && wnd.opener) | 462 if (wnd.history.length <= 1 && wnd.opener) |
(...skipping 219 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
679 if (!wnd || wnd.closed) | 682 if (!wnd || wnd.closed) |
680 return; | 683 return; |
681 | 684 |
682 if (entry.type == "OBJECT") | 685 if (entry.type == "OBJECT") |
683 { | 686 { |
684 node.removeEventListener("mouseover", objectMouseEventHander, true); | 687 node.removeEventListener("mouseover", objectMouseEventHander, true); |
685 node.removeEventListener("mouseout", objectMouseEventHander, true); | 688 node.removeEventListener("mouseout", objectMouseEventHander, true); |
686 } | 689 } |
687 Policy.processNode(wnd, node, entry.type, Utils.makeURI(entry.location), true) ; | 690 Policy.processNode(wnd, node, entry.type, Utils.makeURI(entry.location), true) ; |
688 } | 691 } |
LEFT | RIGHT |