Left: | ||
Right: |
OLD | NEW |
---|---|
1 /* | 1 /* |
2 * This file is part of Adblock Plus <https://adblockplus.org/>, | 2 * This file is part of Adblock Plus <https://adblockplus.org/>, |
3 * Copyright (C) 2006-2015 Eyeo GmbH | 3 * Copyright (C) 2006-2015 Eyeo GmbH |
4 * | 4 * |
5 * Adblock Plus is free software: you can redistribute it and/or modify | 5 * Adblock Plus is free software: you can redistribute it and/or modify |
6 * it under the terms of the GNU General Public License version 3 as | 6 * it under the terms of the GNU General Public License version 3 as |
7 * published by the Free Software Foundation. | 7 * published by the Free Software Foundation. |
8 * | 8 * |
9 * Adblock Plus is distributed in the hope that it will be useful, | 9 * Adblock Plus is distributed in the hope that it will be useful, |
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of | 10 * but WITHOUT ANY WARRANTY; without even the implied warranty of |
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | 11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
12 * GNU General Public License for more details. | 12 * GNU General Public License for more details. |
13 * | 13 * |
14 * You should have received a copy of the GNU General Public License | 14 * You should have received a copy of the GNU General Public License |
15 * along with Adblock Plus. If not, see <http://www.gnu.org/licenses/>. | 15 * along with Adblock Plus. If not, see <http://www.gnu.org/licenses/>. |
16 */ | 16 */ |
17 | 17 |
18 /** | 18 /** |
19 * @fileOverview Content policy implementation, responsible for blocking things. | 19 * @fileOverview Content policy implementation, responsible for blocking things. |
20 */ | 20 */ |
21 | 21 |
22 "use strict"; | 22 "use strict"; |
23 | 23 |
24 let {XPCOMUtils} = Cu.import("resource://gre/modules/XPCOMUtils.jsm", {}); | 24 let {XPCOMUtils} = Cu.import("resource://gre/modules/XPCOMUtils.jsm", {}); |
25 let {Services} = Cu.import("resource://gre/modules/Services.jsm", {}); | 25 let {Services} = Cu.import("resource://gre/modules/Services.jsm", {}); |
26 let {PrivateBrowsingUtils} = Cu.import("resource://gre/modules/PrivateBrowsingUt ils.jsm", {}); | |
27 | 26 |
28 let {Utils} = require("utils"); | 27 let {Utils} = require("utils"); |
29 let {Prefs} = require("prefs"); | 28 let {Prefs} = require("prefs"); |
30 let {FilterStorage} = require("filterStorage"); | 29 let {FilterStorage} = require("filterStorage"); |
31 let {BlockingFilter, WhitelistFilter, RegExpFilter} = require("filterClasses"); | 30 let {BlockingFilter, WhitelistFilter, RegExpFilter} = require("filterClasses"); |
32 let {defaultMatcher} = require("matcher"); | 31 let {defaultMatcher} = require("matcher"); |
33 let {objectMouseEventHander} = require("objectTabs"); | 32 let {objectMouseEventHander} = require("objectTabs"); |
34 let {RequestNotifier} = require("requestNotifier"); | |
35 let {ElemHide} = require("elemHide"); | 33 let {ElemHide} = require("elemHide"); |
36 | 34 |
37 /** | 35 /** |
38 * Randomly generated class name, to be applied to collapsed nodes. | |
39 */ | |
40 let collapsedClass = ""; | |
41 | |
42 /** | |
43 * Maps numerical content type IDs to strings. | |
44 * @type Map | |
45 */ | |
46 let types = new Map(); | |
47 | |
48 /** | |
49 * Public policy checking functions and auxiliary objects | 36 * Public policy checking functions and auxiliary objects |
50 * @class | 37 * @class |
51 */ | 38 */ |
52 var Policy = exports.Policy = | 39 var Policy = exports.Policy = |
53 { | 40 { |
54 /** | 41 /** |
55 * Set of explicitly supported content types | 42 * Set of explicitly supported content types |
56 * @type Set | 43 * @type Set |
57 */ | 44 */ |
58 contentTypes: new Set([ | 45 contentTypes: new Set([ |
(...skipping 19 matching lines...) Expand all Loading... | |
78 | 65 |
79 /** | 66 /** |
80 * Called on module startup, initializes various exported properties. | 67 * Called on module startup, initializes various exported properties. |
81 */ | 68 */ |
82 init: function() | 69 init: function() |
83 { | 70 { |
84 // whitelisted URL schemes | 71 // whitelisted URL schemes |
85 for (let scheme of Prefs.whitelistschemes.toLowerCase().split(" ")) | 72 for (let scheme of Prefs.whitelistschemes.toLowerCase().split(" ")) |
86 this.whitelistSchemes.add(scheme); | 73 this.whitelistSchemes.add(scheme); |
87 | 74 |
88 // Generate class identifier used to collapse node and register correspondin g | 75 let messageManager = Cc["@mozilla.org/parentprocessmessagemanager;1"] |
89 // stylesheet. | 76 .getService(Ci.nsIMessageListenerManager) |
77 .QueryInterface(Ci.nsIMessageBroadcaster); | |
78 let handler = (message => this.shouldAllow(message.data)); | |
79 messageManager.addMessageListener("AdblockPlus:ShouldAllow", handler); | |
tschuster
2015/11/12 14:04:17
nit: The surrounding brackets are unnecessary.
Wladimir Palant
2015/11/12 15:16:31
This code is going to be replaced in https://coder
| |
80 onShutdown.add(() => messageManager.removeMessageListener("AdblockPlus:Shoul dAllow", handler)); | |
81 | |
82 // Generate class identifier used to collapse nodes and register | |
83 // corresponding stylesheet. | |
84 let collapsedClass = ""; | |
90 let offset = "a".charCodeAt(0); | 85 let offset = "a".charCodeAt(0); |
91 for (let i = 0; i < 20; i++) | 86 for (let i = 0; i < 20; i++) |
92 collapsedClass += String.fromCharCode(offset + Math.random() * 26); | 87 collapsedClass += String.fromCharCode(offset + Math.random() * 26); |
93 | 88 |
89 let handler2 = () => collapsedClass; | |
90 messageManager.addMessageListener("AdblockPlus:GetCollapsedClass", handler2) ; | |
91 onShutdown.add(() => messageManager.removeMessageListener("AdblockPlus:GetCo llapsedClass", handler2)); | |
92 | |
94 let collapseStyle = Services.io.newURI("data:text/css," + | 93 let collapseStyle = Services.io.newURI("data:text/css," + |
95 encodeURIComponent("." + collapsedClass + | 94 encodeURIComponent("." + collapsedClass + |
96 "{-moz-binding: url(chrome://global/content/bindings/general.xml#foobarb azdummy) !important;}"), null, null); | 95 "{-moz-binding: url(chrome://global/content/bindings/general.xml#foobarb azdummy) !important;}"), null, null); |
97 Utils.styleService.loadAndRegisterSheet(collapseStyle, Ci.nsIStyleSheetServi ce.USER_SHEET); | 96 Utils.styleService.loadAndRegisterSheet(collapseStyle, Ci.nsIStyleSheetServi ce.USER_SHEET); |
98 onShutdown.add(() => | 97 onShutdown.add(() => |
99 { | 98 { |
100 Utils.styleService.unregisterSheet(collapseStyle, Ci.nsIStyleSheetService. USER_SHEET); | 99 Utils.styleService.unregisterSheet(collapseStyle, Ci.nsIStyleSheetService. USER_SHEET); |
101 }); | 100 }); |
102 }, | 101 }, |
103 | 102 |
104 /** | 103 /** |
105 * Checks whether a node should be blocked, hides it if necessary | 104 * Checks whether a node should be blocked, hides it if necessary |
106 * @param wnd {nsIDOMWindow} | 105 * @param {Object} data request data |
107 * @param node {nsIDOMElement} | 106 * @param {String} data.contentType |
108 * @param contentType {String} | 107 * @param {String} data.location |
109 * @param location {String} | 108 * @param {Object[]} data.frames |
110 * @param collapse {Boolean} true to force hiding of the node | 109 * @param {Boolean} data.isPrivate true if the request belongs to a private b rowsing window |
111 * @return {Boolean} false if the node should be blocked | 110 * @return {Object} An object containing properties block, collapse and hits |
tschuster
2015/11/12 14:04:17
I think s/block/allow
Wladimir Palant
2015/11/12 15:16:31
Right, fixed.
| |
111 * indicating how this request should be handled. | |
112 */ | 112 */ |
113 processNode: function(wnd, node, contentType, location, collapse) | 113 shouldAllow: function({contentType, location, frames, isPrivate}) |
114 { | 114 { |
115 let topWnd = wnd.top; | 115 let hits = []; |
116 if (!topWnd || !topWnd.location || !topWnd.location.href) | 116 |
117 return true; | 117 function addHit(frameIndex, contentType, docDomain, thirdParty, location, fi lter) |
118 { | |
119 if (filter && !isPrivate) | |
120 FilterStorage.increaseHitCount(filter); | |
121 hits.push({ | |
122 frameIndex, contentType, docDomain, thirdParty, location, | |
123 filter: filter ? filter.text : null | |
124 }); | |
125 } | |
126 | |
127 function response(allow, collapse) | |
128 { | |
129 return {allow, collapse, hits}; | |
130 } | |
118 | 131 |
119 // Ignore whitelisted schemes | 132 // Ignore whitelisted schemes |
120 if (!this.isBlockableScheme(location)) | 133 if (!this.isBlockableScheme(location)) |
121 return true; | 134 return response(true, false); |
122 | 135 |
123 // Interpret unknown types as "other" | 136 // Interpret unknown types as "other" |
124 if (!this.contentTypes.has(contentType)) | 137 if (!this.contentTypes.has(contentType)) |
125 contentType = "OTHER"; | 138 contentType = "OTHER"; |
126 | 139 |
127 let originWindow = Utils.getOriginWindow(wnd); | 140 let wndLocation = frames[0].location; |
128 let wndLocation = originWindow.location.href; | |
129 let docDomain = getHostname(wndLocation); | 141 let docDomain = getHostname(wndLocation); |
130 let match = null; | 142 let match = null; |
131 let [sitekey, sitekeyWnd] = getSitekey(wnd); | 143 let [sitekey, sitekeyFrame] = getSitekey(frames); |
132 let nogeneric = false; | 144 let nogeneric = false; |
133 | |
134 function cleanWindowLocation(wnd) | |
135 { | |
136 let url = getWindowLocation(wnd); | |
137 let index = url.indexOf("#"); | |
138 if (index >= 0) | |
139 url = url.substring(0, index); | |
140 | |
141 return url; | |
142 } | |
143 | |
144 function addHit(match) | |
145 { | |
146 if (!PrivateBrowsingUtils.isContentWindowPrivate(wnd)) | |
147 FilterStorage.increaseHitCount(match); | |
148 } | |
149 | |
150 if (!match && Prefs.enabled) | 145 if (!match && Prefs.enabled) |
151 { | 146 { |
152 let testWnd = wnd; | |
153 let testSitekey = sitekey; | 147 let testSitekey = sitekey; |
154 let testSitekeyWnd = sitekeyWnd; | 148 let testSitekeyFrame = sitekeyFrame; |
155 let parentWndLocation = cleanWindowLocation(testWnd); | 149 for (let i = 0; i < frames.length; i++) |
156 while (true) | |
157 { | 150 { |
158 let testWndLocation = parentWndLocation; | 151 let frame = frames[i]; |
159 parentWndLocation = (testWnd == testWnd.parent ? testWndLocation : clean WindowLocation(testWnd.parent)); | 152 let testWndLocation = frame.location; |
153 let parentWndLocation = frames[Math.min(i + 1, frames.length - 1)].locat ion; | |
160 let parentDocDomain = getHostname(parentWndLocation); | 154 let parentDocDomain = getHostname(parentWndLocation); |
161 | 155 |
162 let typeMap = RegExpFilter.typeMap.DOCUMENT; | 156 let typeMap = RegExpFilter.typeMap.DOCUMENT; |
163 if (contentType == "ELEMHIDE") | 157 if (contentType == "ELEMHIDE") |
164 typeMap = typeMap | RegExpFilter.typeMap.ELEMHIDE; | 158 typeMap = typeMap | RegExpFilter.typeMap.ELEMHIDE; |
165 let whitelistMatch = defaultMatcher.matchesAny(testWndLocation, typeMap, parentDocDomain, false, testSitekey); | 159 let whitelistMatch = defaultMatcher.matchesAny(testWndLocation, typeMap, parentDocDomain, false, testSitekey); |
166 if (whitelistMatch instanceof WhitelistFilter) | 160 if (whitelistMatch instanceof WhitelistFilter) |
167 { | 161 { |
168 addHit(whitelistMatch); | 162 let whitelistType = (whitelistMatch.contentType & RegExpFilter.typeMap .DOCUMENT) ? "DOCUMENT" : "ELEMHIDE"; |
169 RequestNotifier.addNodeData(testWnd.document, topWnd, | 163 addHit(i, whitelistType, parentDocDomain, false, testWndLocation, |
170 (whitelistMatch.contentType & RegExpFilter.typeMap.DOCUMENT) ? "DOCU MENT" : "ELEMHIDE", | 164 whitelistMatch); |
171 parentDocDomain, false, testWndLocation, whitelistMatch); | 165 return response(true, false); |
172 return true; | |
173 } | 166 } |
174 | 167 |
175 let genericType = (contentType == "ELEMHIDE" ? "GENERICHIDE" : "GENERICB LOCK"); | 168 let genericType = (contentType == "ELEMHIDE" ? "GENERICHIDE" : "GENERICB LOCK"); |
176 let nogenericMatch = defaultMatcher.matchesAny(testWndLocation, | 169 let nogenericMatch = defaultMatcher.matchesAny(testWndLocation, |
177 RegExpFilter.typeMap[genericType], parentDocDomain, false, testSitek ey); | 170 RegExpFilter.typeMap[genericType], parentDocDomain, false, testSitek ey); |
178 if (nogenericMatch instanceof WhitelistFilter) | 171 if (nogenericMatch instanceof WhitelistFilter) |
179 { | 172 { |
180 nogeneric = true; | 173 nogeneric = true; |
181 | 174 addHit(i, genericType, parentDocDomain, false, testWndLocation, |
182 addHit(nogenericMatch); | 175 nogenericMatch); |
183 RequestNotifier.addNodeData(testWnd.document, topWnd, genericType, | |
184 parentDocDomain, false, testWndLocation, | |
185 nogenericMatch); | |
186 } | 176 } |
187 | 177 |
188 if (testWnd.parent == testWnd) | 178 if (frame == testSitekeyFrame) |
189 break; | 179 [testSitekey, testSitekeyFrame] = getSitekey(frames.slice(i + 1)); |
190 | |
191 if (testWnd == testSitekeyWnd) | |
192 [testSitekey, testSitekeyWnd] = getSitekey(testWnd.parent); | |
193 testWnd = testWnd.parent; | |
194 } | 180 } |
195 } | 181 } |
196 | 182 |
197 if (!match && contentType == "ELEMHIDE") | 183 if (!match && contentType == "ELEMHIDE") |
198 { | 184 { |
199 match = location; | 185 match = location; |
200 location = match.text.replace(/^.*?#/, '#'); | 186 location = match.text.replace(/^.*?#/, '#'); |
201 | 187 |
202 if (!match.isActiveOnDomain(docDomain)) | 188 if (!match.isActiveOnDomain(docDomain)) |
203 return true; | 189 return response(true, false); |
204 | 190 |
205 let exception = ElemHide.getException(match, docDomain); | 191 let exception = ElemHide.getException(match, docDomain); |
206 if (exception) | 192 if (exception) |
207 { | 193 { |
208 addHit(exception); | 194 addHit(null, contentType, docDomain, false, location, exception); |
209 RequestNotifier.addNodeData(node, topWnd, contentType, docDomain, false, location, exception); | 195 return response(true, false); |
210 return true; | |
211 } | 196 } |
212 | 197 |
213 if (nogeneric && match.isGeneric()) | 198 if (nogeneric && match.isGeneric()) |
214 return true; | 199 return response(true, false); |
215 } | 200 } |
216 | 201 |
217 let thirdParty = (contentType == "ELEMHIDE" ? false : isThirdParty(location, docDomain)); | 202 let thirdParty = (contentType == "ELEMHIDE" ? false : isThirdParty(location, docDomain)); |
218 | 203 let collapse = false; |
219 if (!match && Prefs.enabled && RegExpFilter.typeMap.hasOwnProperty(contentTy pe)) | 204 if (!match && Prefs.enabled && RegExpFilter.typeMap.hasOwnProperty(contentTy pe)) |
220 { | 205 { |
221 match = defaultMatcher.matchesAny(location, RegExpFilter.typeMap[contentTy pe], | 206 match = defaultMatcher.matchesAny(location, RegExpFilter.typeMap[contentTy pe], |
222 docDomain, thirdParty, sitekey, nogeneri c); | 207 docDomain, thirdParty, sitekey, nogeneri c); |
223 if (match instanceof BlockingFilter && node.ownerDocument && !this.nonVisu alTypes.has(contentType)) | 208 if (match instanceof BlockingFilter && !this.nonVisualTypes.has(contentTyp e)) |
224 { | 209 collapse = (match.collapse != null ? match.collapse : !Prefs.fastcollaps e); |
225 let prefCollapse = (match.collapse != null ? match.collapse : !Prefs.fas tcollapse); | 210 } |
226 if (collapse || prefCollapse) | 211 addHit(null, contentType, docDomain, thirdParty, location, match); |
227 schedulePostProcess(node); | |
228 } | |
229 | 212 |
230 // Track mouse events for objects | 213 return response(!match || match instanceof WhitelistFilter, collapse); |
231 if (!match && contentType == "OBJECT" && node.nodeType == Ci.nsIDOMNode.EL EMENT_NODE) | |
232 { | |
233 node.addEventListener("mouseover", objectMouseEventHander, true); | |
234 node.addEventListener("mouseout", objectMouseEventHander, true); | |
235 } | |
236 } | |
237 | |
238 // Store node data | |
239 RequestNotifier.addNodeData(node, topWnd, contentType, docDomain, thirdParty , location, match); | |
240 if (match) | |
241 addHit(match); | |
242 | |
243 return !match || match instanceof WhitelistFilter; | |
244 }, | 214 }, |
245 | 215 |
246 /** | 216 /** |
247 * Checks whether the location's scheme is blockable. | 217 * Checks whether the location's scheme is blockable. |
248 * @param location {nsIURI|String} | 218 * @param location {nsIURI|String} |
249 * @return {Boolean} | 219 * @return {Boolean} |
250 */ | 220 */ |
251 isBlockableScheme: function(location) | 221 isBlockableScheme: function(location) |
252 { | 222 { |
253 let scheme; | 223 let scheme; |
(...skipping 56 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
310 if (entry.filter && !(entry.filter instanceof WhitelistFilter)) | 280 if (entry.filter && !(entry.filter instanceof WhitelistFilter)) |
311 return; | 281 return; |
312 | 282 |
313 for (let node of nodes) | 283 for (let node of nodes) |
314 Utils.runAsync(() => refilterNode(node, entry)); | 284 Utils.runAsync(() => refilterNode(node, entry)); |
315 } | 285 } |
316 }; | 286 }; |
317 Policy.init(); | 287 Policy.init(); |
318 | 288 |
319 /** | 289 /** |
320 * Actual nsIContentPolicy and nsIChannelEventSink implementation | |
321 * @class | |
322 */ | |
323 var PolicyImplementation = | |
324 { | |
325 classDescription: "Adblock Plus content policy", | |
326 classID: Components.ID("cfeaabe6-1dd1-11b2-a0c6-cb5c268894c9"), | |
327 contractID: "@adblockplus.org/abp/policy;1", | |
328 xpcom_categories: ["content-policy", "net-channel-event-sinks"], | |
329 | |
330 /** | |
331 * Registers the content policy on startup. | |
332 */ | |
333 init: function() | |
334 { | |
335 // Populate types map | |
336 let iface = Ci.nsIContentPolicy; | |
337 for (let name in iface) | |
338 if (name.indexOf("TYPE_") == 0 && name != "TYPE_DATAREQUEST") | |
339 types.set(iface[name], name.substr(5)); | |
340 | |
341 let registrar = Components.manager.QueryInterface(Ci.nsIComponentRegistrar); | |
342 registrar.registerFactory(this.classID, this.classDescription, this.contract ID, this); | |
343 | |
344 let catMan = Utils.categoryManager; | |
345 for (let category of this.xpcom_categories) | |
346 catMan.addCategoryEntry(category, this.contractID, this.contractID, false, true); | |
347 | |
348 Services.obs.addObserver(this, "content-document-global-created", true); | |
349 | |
350 onShutdown.add(() => | |
351 { | |
352 Services.obs.removeObserver(this, "content-document-global-created"); | |
353 | |
354 for (let category of this.xpcom_categories) | |
355 catMan.deleteCategoryEntry(category, this.contractID, false); | |
356 | |
357 registrar.unregisterFactory(this.classID, this); | |
358 }); | |
359 }, | |
360 | |
361 // | |
362 // nsISupports interface implementation | |
363 // | |
364 | |
365 QueryInterface: XPCOMUtils.generateQI([Ci.nsIContentPolicy, Ci.nsIObserver, | |
366 Ci.nsIChannelEventSink, Ci.nsIFactory, Ci.nsISupportsWeakReference]), | |
367 | |
368 // | |
369 // nsIContentPolicy interface implementation | |
370 // | |
371 | |
372 shouldLoad: function(contentType, contentLocation, requestOrigin, node, mimeTy peGuess, extra) | |
373 { | |
374 // Ignore requests without context and top-level documents | |
375 if (!node || contentType == Ci.nsIContentPolicy.TYPE_DOCUMENT) | |
376 return Ci.nsIContentPolicy.ACCEPT; | |
377 | |
378 // Ignore standalone objects | |
379 if (contentType == Ci.nsIContentPolicy.TYPE_OBJECT && node.ownerDocument && !/^text\/|[+\/]xml$/.test(node.ownerDocument.contentType)) | |
380 return Ci.nsIContentPolicy.ACCEPT; | |
381 | |
382 let wnd = Utils.getWindow(node); | |
383 if (!wnd) | |
384 return Ci.nsIContentPolicy.ACCEPT; | |
385 | |
386 // Data loaded by plugins should be associated with the document | |
387 if (contentType == Ci.nsIContentPolicy.TYPE_OBJECT_SUBREQUEST && node instan ceof Ci.nsIDOMElement) | |
388 node = node.ownerDocument; | |
389 | |
390 // Fix type for objects misrepresented as frames or images | |
391 if (contentType != Ci.nsIContentPolicy.TYPE_OBJECT && (node instanceof Ci.ns IDOMHTMLObjectElement || node instanceof Ci.nsIDOMHTMLEmbedElement)) | |
392 contentType = Ci.nsIContentPolicy.TYPE_OBJECT; | |
393 | |
394 let location = Utils.unwrapURL(contentLocation); | |
395 let result = Policy.processNode(wnd, node, types.get(contentType), location. spec, false); | |
396 return (result ? Ci.nsIContentPolicy.ACCEPT : Ci.nsIContentPolicy.REJECT_REQ UEST); | |
397 }, | |
398 | |
399 shouldProcess: function(contentType, contentLocation, requestOrigin, insecNode , mimeType, extra) | |
400 { | |
401 return Ci.nsIContentPolicy.ACCEPT; | |
402 }, | |
403 | |
404 // | |
405 // nsIObserver interface implementation | |
406 // | |
407 observe: function(subject, topic, data, additional) | |
408 { | |
409 switch (topic) | |
410 { | |
411 case "content-document-global-created": | |
412 { | |
413 if (!(subject instanceof Ci.nsIDOMWindow) || !subject.opener) | |
414 return; | |
415 | |
416 let uri = additional || subject.location.href; | |
417 if (!Policy.processNode(subject.opener, subject.opener.document, "POPUP" , uri, false)) | |
418 { | |
419 subject.stop(); | |
420 Utils.runAsync(() => subject.close()); | |
421 } | |
422 else if (uri == "about:blank") | |
423 { | |
424 // An about:blank pop-up most likely means that a load will be | |
425 // initiated asynchronously. Wait for that. | |
426 Utils.runAsync(() => | |
427 { | |
428 let channel = subject.QueryInterface(Ci.nsIInterfaceRequestor) | |
429 .getInterface(Ci.nsIDocShell) | |
430 .QueryInterface(Ci.nsIDocumentLoader) | |
431 .documentChannel; | |
432 if (channel) | |
433 this.observe(subject, topic, data, channel.URI.spec); | |
434 }); | |
435 } | |
436 break; | |
437 } | |
438 } | |
439 }, | |
440 | |
441 // | |
442 // nsIChannelEventSink interface implementation | |
443 // | |
444 | |
445 asyncOnChannelRedirect: function(oldChannel, newChannel, flags, callback) | |
446 { | |
447 let result = Cr.NS_OK; | |
448 try | |
449 { | |
450 // nsILoadInfo.contentPolicyType was introduced in Gecko 35, then | |
451 // renamed to nsILoadInfo.externalContentPolicyType in Gecko 44. | |
452 let loadInfo = oldChannel.loadInfo; | |
453 let contentType = ("externalContentPolicyType" in loadInfo ? | |
454 loadInfo.externalContentPolicyType : loadInfo.contentPolicyType); | |
455 if (!contentType) | |
456 return; | |
457 | |
458 let wnd = Utils.getRequestWindow(newChannel); | |
459 if (!wnd) | |
460 return; | |
461 | |
462 if (contentType == Ci.nsIContentPolicy.TYPE_DOCUMENT) | |
463 { | |
464 if (wnd.history.length <= 1 && wnd.opener) | |
465 { | |
466 // Special treatment for pop-up windows - this will close the window | |
467 // rather than preventing the redirect. Note that we might not have | |
468 // seen the original channel yet because the redirect happened before | |
469 // the async code in observe() had a chance to run. | |
470 this.observe(wnd, "content-document-global-created", null, oldChannel. URI.spec); | |
471 this.observe(wnd, "content-document-global-created", null, newChannel. URI.spec); | |
472 } | |
473 return; | |
474 } | |
475 | |
476 if (!Policy.processNode(wnd, wnd.document, types.get(contentType), newChan nel.URI.spec, false)) | |
477 result = Cr.NS_BINDING_ABORTED; | |
478 } | |
479 catch (e) | |
480 { | |
481 // We shouldn't throw exceptions here - this will prevent the redirect. | |
482 Cu.reportError(e); | |
483 } | |
484 finally | |
485 { | |
486 callback.onRedirectVerifyCallback(result); | |
487 } | |
488 }, | |
489 | |
490 // | |
491 // nsIFactory interface implementation | |
492 // | |
493 | |
494 createInstance: function(outer, iid) | |
495 { | |
496 if (outer) | |
497 throw Cr.NS_ERROR_NO_AGGREGATION; | |
498 return this.QueryInterface(iid); | |
499 } | |
500 }; | |
501 PolicyImplementation.init(); | |
502 | |
503 /** | |
504 * Nodes scheduled for post-processing (might be null). | |
505 * @type Node[] | |
506 */ | |
507 let scheduledNodes = null; | |
508 | |
509 /** | |
510 * Schedules a node for post-processing. | |
511 */ | |
512 function schedulePostProcess(/**Element*/ node) | |
513 { | |
514 if (scheduledNodes) | |
515 scheduledNodes.push(node); | |
516 else | |
517 { | |
518 scheduledNodes = [node]; | |
519 Utils.runAsync(postProcessNodes); | |
520 } | |
521 } | |
522 | |
523 /** | |
524 * Processes nodes scheduled for post-processing (typically hides them). | |
525 */ | |
526 function postProcessNodes() | |
527 { | |
528 let nodes = scheduledNodes; | |
529 scheduledNodes = null; | |
530 | |
531 for (let node of nodes) | |
532 { | |
533 // adjust frameset's cols/rows for frames | |
534 let parentNode = node.parentNode; | |
535 if (parentNode && parentNode instanceof Ci.nsIDOMHTMLFrameSetElement) | |
536 { | |
537 let hasCols = (parentNode.cols && parentNode.cols.indexOf(",") > 0); | |
538 let hasRows = (parentNode.rows && parentNode.rows.indexOf(",") > 0); | |
539 if ((hasCols || hasRows) && !(hasCols && hasRows)) | |
540 { | |
541 let index = -1; | |
542 for (let frame = node; frame; frame = frame.previousSibling) | |
543 if (frame instanceof Ci.nsIDOMHTMLFrameElement || frame instanceof Ci. nsIDOMHTMLFrameSetElement) | |
544 index++; | |
545 | |
546 let property = (hasCols ? "cols" : "rows"); | |
547 let weights = parentNode[property].split(","); | |
548 weights[index] = "0"; | |
549 parentNode[property] = weights.join(","); | |
550 } | |
551 } | |
552 else | |
553 node.classList.add(collapsedClass); | |
554 } | |
555 } | |
556 | |
557 /** | |
558 * Extracts the hostname from a URL (might return null). | 290 * Extracts the hostname from a URL (might return null). |
559 */ | 291 */ |
560 function getHostname(/**String*/ url) /**String*/ | 292 function getHostname(/**String*/ url) /**String*/ |
561 { | 293 { |
562 try | 294 try |
563 { | 295 { |
564 return Utils.unwrapURL(url).host; | 296 return Utils.unwrapURL(url).host; |
565 } | 297 } |
566 catch(e) | 298 catch(e) |
567 { | 299 { |
568 return null; | 300 return null; |
569 } | 301 } |
570 } | 302 } |
571 | 303 |
572 /** | 304 /** |
573 * Retrieves the sitekey of a window. | 305 * Retrieves and validates the sitekey for a frame structure. |
574 */ | 306 */ |
575 function getSitekey(wnd) | 307 function getSitekey(frames) |
576 { | 308 { |
577 let sitekey = null; | 309 for (let frame of frames) |
310 { | |
311 if (frame.sitekey && frame.sitekey.indexOf("_") >= 0) | |
312 { | |
313 let [key, signature] = frame.sitekey.split("_", 2); | |
314 key = key.replace(/=/g, ""); | |
578 | 315 |
579 while (true) | 316 // Website specifies a key but is the signature valid? |
580 { | 317 let uri = Services.io.newURI(frame.location, null, null); |
581 if (wnd.document && wnd.document.documentElement) | 318 let host = uri.asciiHost; |
582 { | 319 if (uri.port > 0) |
583 let keydata = wnd.document.documentElement.getAttribute("data-adblockkey") ; | 320 host += ":" + uri.port; |
584 if (keydata && keydata.indexOf("_") >= 0) | 321 let params = [ |
585 { | 322 uri.path.replace(/#.*/, ""), // REQUEST_URI |
586 let [key, signature] = keydata.split("_", 2); | 323 host, // HTTP_HOST |
587 key = key.replace(/=/g, ""); | 324 Utils.httpProtocol.userAgent // HTTP_USER_AGENT |
588 | 325 ]; |
589 // Website specifies a key but is the signature valid? | 326 if (Utils.verifySignature(key, signature, params.join("\0"))) |
590 let uri = Services.io.newURI(getWindowLocation(wnd), null, null); | 327 return [key, frame]; |
591 let host = uri.asciiHost; | |
592 if (uri.port > 0) | |
593 host += ":" + uri.port; | |
594 let params = [ | |
595 uri.path.replace(/#.*/, ""), // REQUEST_URI | |
596 host, // HTTP_HOST | |
597 Utils.httpProtocol.userAgent // HTTP_USER_AGENT | |
598 ]; | |
599 if (Utils.verifySignature(key, signature, params.join("\0"))) | |
600 return [key, wnd]; | |
601 } | |
602 } | 328 } |
603 | |
604 if (wnd === wnd.parent) | |
605 break; | |
606 | |
607 wnd = wnd.parent; | |
608 } | 329 } |
609 | 330 |
610 return [sitekey, wnd]; | 331 return [null, null]; |
611 } | 332 } |
612 | 333 |
613 /** | 334 /** |
614 * Retrieves the location of a window. | 335 * Retrieves the location of a window. |
615 * @param wnd {nsIDOMWindow} | 336 * @param wnd {nsIDOMWindow} |
616 * @return {String} window location or null on failure | 337 * @return {String} window location or null on failure |
617 */ | 338 */ |
618 function getWindowLocation(wnd) | 339 function getWindowLocation(wnd) |
619 { | 340 { |
620 if ("name" in wnd && wnd.name == "messagepane") | 341 if ("name" in wnd && wnd.name == "messagepane") |
(...skipping 65 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
686 if (!wnd || wnd.closed) | 407 if (!wnd || wnd.closed) |
687 return; | 408 return; |
688 | 409 |
689 if (entry.type == "OBJECT") | 410 if (entry.type == "OBJECT") |
690 { | 411 { |
691 node.removeEventListener("mouseover", objectMouseEventHander, true); | 412 node.removeEventListener("mouseover", objectMouseEventHander, true); |
692 node.removeEventListener("mouseout", objectMouseEventHander, true); | 413 node.removeEventListener("mouseout", objectMouseEventHander, true); |
693 } | 414 } |
694 Policy.processNode(wnd, node, entry.type, entry.location, true); | 415 Policy.processNode(wnd, node, entry.type, entry.location, true); |
695 } | 416 } |
OLD | NEW |