OLD | NEW |
1 /* | 1 /* |
2 * This file is part of Adblock Plus <https://adblockplus.org/>, | 2 * This file is part of Adblock Plus <https://adblockplus.org/>, |
3 * Copyright (C) 2006-2015 Eyeo GmbH | 3 * Copyright (C) 2006-2015 Eyeo GmbH |
4 * | 4 * |
5 * Adblock Plus is free software: you can redistribute it and/or modify | 5 * Adblock Plus is free software: you can redistribute it and/or modify |
6 * it under the terms of the GNU General Public License version 3 as | 6 * it under the terms of the GNU General Public License version 3 as |
7 * published by the Free Software Foundation. | 7 * published by the Free Software Foundation. |
8 * | 8 * |
9 * Adblock Plus is distributed in the hope that it will be useful, | 9 * Adblock Plus is distributed in the hope that it will be useful, |
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of | 10 * but WITHOUT ANY WARRANTY; without even the implied warranty of |
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | 11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
12 * GNU General Public License for more details. | 12 * GNU General Public License for more details. |
13 * | 13 * |
14 * You should have received a copy of the GNU General Public License | 14 * You should have received a copy of the GNU General Public License |
15 * along with Adblock Plus. If not, see <http://www.gnu.org/licenses/>. | 15 * along with Adblock Plus. If not, see <http://www.gnu.org/licenses/>. |
16 */ | 16 */ |
17 | 17 |
18 /** | 18 /** |
19 * @fileOverview Content policy implementation, responsible for blocking things. | 19 * @fileOverview Content policy implementation, responsible for blocking things. |
20 */ | 20 */ |
21 | 21 |
22 Cu.import("resource://gre/modules/XPCOMUtils.jsm"); | 22 "use strict"; |
23 Cu.import("resource://gre/modules/Services.jsm"); | 23 |
| 24 let {XPCOMUtils} = Cu.import("resource://gre/modules/XPCOMUtils.jsm", {}); |
| 25 let {Services} = Cu.import("resource://gre/modules/Services.jsm", {}); |
24 | 26 |
25 let {Utils} = require("utils"); | 27 let {Utils} = require("utils"); |
26 let {Prefs} = require("prefs"); | 28 let {Prefs} = require("prefs"); |
27 let {FilterStorage} = require("filterStorage"); | 29 let {FilterStorage} = require("filterStorage"); |
28 let {BlockingFilter, WhitelistFilter, RegExpFilter} = require("filterClasses"); | 30 let {BlockingFilter, WhitelistFilter, RegExpFilter} = require("filterClasses"); |
29 let {defaultMatcher} = require("matcher"); | 31 let {defaultMatcher} = require("matcher"); |
30 let {objectMouseEventHander} = require("objectTabs"); | 32 let {objectMouseEventHander} = require("objectTabs"); |
31 let {RequestNotifier} = require("requestNotifier"); | 33 let {RequestNotifier} = require("requestNotifier"); |
32 let {ElemHide} = require("elemHide"); | 34 let {ElemHide} = require("elemHide"); |
33 | 35 |
(...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
68 var Policy = exports.Policy = | 70 var Policy = exports.Policy = |
69 { | 71 { |
70 /** | 72 /** |
71 * Map of localized content type names by their identifiers. | 73 * Map of localized content type names by their identifiers. |
72 * @type Map | 74 * @type Map |
73 */ | 75 */ |
74 localizedDescr: new Map(), | 76 localizedDescr: new Map(), |
75 | 77 |
76 /** | 78 /** |
77 * Map containing all schemes that should be ignored by content policy. | 79 * Map containing all schemes that should be ignored by content policy. |
78 * @type Object | 80 * @type Set |
79 */ | 81 */ |
80 whitelistSchemes: {}, | 82 whitelistSchemes: new Set(), |
81 | 83 |
82 /** | 84 /** |
83 * Called on module startup, initializes various exported properties. | 85 * Called on module startup, initializes various exported properties. |
84 */ | 86 */ |
85 init: function() | 87 init: function() |
86 { | 88 { |
87 // Populate types map | 89 // Populate types map |
88 let iface = Ci.nsIContentPolicy; | 90 let iface = Ci.nsIContentPolicy; |
89 for (let name in iface) | 91 for (let name in iface) |
90 if (name.indexOf("TYPE_") == 0 && name != "TYPE_DATAREQUEST") | 92 if (name.indexOf("TYPE_") == 0 && name != "TYPE_DATAREQUEST") |
91 types.set(iface[name], name.substr(5)); | 93 types.set(iface[name], name.substr(5)); |
92 | 94 |
93 // Populate localized type names | 95 // Populate localized type names |
94 for (let typeName of contentTypes) | 96 for (let typeName of contentTypes) |
95 this.localizedDescr.set(typeName, Utils.getString("type_label_" + typeName
.toLowerCase())); | 97 this.localizedDescr.set(typeName, Utils.getString("type_label_" + typeName
.toLowerCase())); |
96 | 98 |
97 // whitelisted URL schemes | 99 // whitelisted URL schemes |
98 for (let scheme of Prefs.whitelistschemes.toLowerCase().split(" ")) | 100 for (let scheme of Prefs.whitelistschemes.toLowerCase().split(" ")) |
99 this.whitelistSchemes[scheme] = true; | 101 this.whitelistSchemes.add(scheme); |
100 | 102 |
101 // Generate class identifier used to collapse node and register correspondin
g | 103 // Generate class identifier used to collapse node and register correspondin
g |
102 // stylesheet. | 104 // stylesheet. |
103 let offset = "a".charCodeAt(0); | 105 let offset = "a".charCodeAt(0); |
104 for (let i = 0; i < 20; i++) | 106 for (let i = 0; i < 20; i++) |
105 collapsedClass += String.fromCharCode(offset + Math.random() * 26); | 107 collapsedClass += String.fromCharCode(offset + Math.random() * 26); |
106 | 108 |
107 let collapseStyle = Services.io.newURI("data:text/css," + | 109 let collapseStyle = Services.io.newURI("data:text/css," + |
108 encodeURIComponent("." + collapsedClass + | 110 encodeURIComponent("." + collapsedClass + |
109 "{-moz-binding: url(chrome://global/content/bindings/general.xml#foobarb
azdummy) !important;}"), null, null); | 111 "{-moz-binding: url(chrome://global/content/bindings/general.xml#foobarb
azdummy) !important;}"), null, null); |
(...skipping 141 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
251 // Store node data | 253 // Store node data |
252 RequestNotifier.addNodeData(node, topWnd, contentType, docDomain, thirdParty
, locationText, match); | 254 RequestNotifier.addNodeData(node, topWnd, contentType, docDomain, thirdParty
, locationText, match); |
253 if (match) | 255 if (match) |
254 FilterStorage.increaseHitCount(match, wnd); | 256 FilterStorage.increaseHitCount(match, wnd); |
255 | 257 |
256 return !match || match instanceof WhitelistFilter; | 258 return !match || match instanceof WhitelistFilter; |
257 }, | 259 }, |
258 | 260 |
259 /** | 261 /** |
260 * Checks whether the location's scheme is blockable. | 262 * Checks whether the location's scheme is blockable. |
261 * @param location {nsIURI} | 263 * @param location {nsIURI} |
262 * @return {Boolean} | 264 * @return {Boolean} |
263 */ | 265 */ |
264 isBlockableScheme: function(location) | 266 isBlockableScheme: function(location) |
265 { | 267 { |
266 return !(location.scheme in Policy.whitelistSchemes); | 268 return !Policy.whitelistSchemes.has(location.scheme); |
267 }, | 269 }, |
268 | 270 |
269 /** | 271 /** |
270 * Checks whether a page is whitelisted. | 272 * Checks whether a page is whitelisted. |
271 * @param {String} url | 273 * @param {String} url |
272 * @param {String} [parentUrl] location of the parent page | 274 * @param {String} [parentUrl] location of the parent page |
273 * @param {String} [sitekey] public key provided on the page | 275 * @param {String} [sitekey] public key provided on the page |
274 * @return {Filter} filter that matched the URL or null if not whitelisted | 276 * @return {Filter} filter that matched the URL or null if not whitelisted |
275 */ | 277 */ |
276 isWhitelisted: function(url, parentUrl, sitekey) | 278 isWhitelisted: function(url, parentUrl, sitekey) |
277 { | 279 { |
278 if (!url) | 280 if (!url) |
279 return null; | 281 return null; |
280 | 282 |
281 // Do not apply exception rules to schemes on our whitelistschemes list. | 283 // Do not apply exception rules to schemes on our whitelistschemes list. |
282 let match = /^([\w\-]+):/.exec(url); | 284 let match = /^([\w\-]+):/.exec(url); |
283 if (match && match[1] in Policy.whitelistSchemes) | 285 if (match && Policy.whitelistSchemes.has(match[1])) |
284 return null; | 286 return null; |
285 | 287 |
286 if (!parentUrl) | 288 if (!parentUrl) |
287 parentUrl = url; | 289 parentUrl = url; |
288 | 290 |
289 // Ignore fragment identifier | 291 // Ignore fragment identifier |
290 let index = url.indexOf("#"); | 292 let index = url.indexOf("#"); |
291 if (index >= 0) | 293 if (index >= 0) |
292 url = url.substring(0, index); | 294 url = url.substring(0, index); |
293 | 295 |
(...skipping 385 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
679 if (!wnd || wnd.closed) | 681 if (!wnd || wnd.closed) |
680 return; | 682 return; |
681 | 683 |
682 if (entry.type == "OBJECT") | 684 if (entry.type == "OBJECT") |
683 { | 685 { |
684 node.removeEventListener("mouseover", objectMouseEventHander, true); | 686 node.removeEventListener("mouseover", objectMouseEventHander, true); |
685 node.removeEventListener("mouseout", objectMouseEventHander, true); | 687 node.removeEventListener("mouseout", objectMouseEventHander, true); |
686 } | 688 } |
687 Policy.processNode(wnd, node, entry.type, Utils.makeURI(entry.location), true)
; | 689 Policy.processNode(wnd, node, entry.type, Utils.makeURI(entry.location), true)
; |
688 } | 690 } |
OLD | NEW |