Left: | ||
Right: |
OLD | NEW |
---|---|
1 /* | 1 /* |
2 * This file is part of Adblock Plus <https://adblockplus.org/>, | 2 * This file is part of Adblock Plus <https://adblockplus.org/>, |
3 * Copyright (C) 2006-2016 Eyeo GmbH | 3 * Copyright (C) 2006-2016 Eyeo GmbH |
4 * | 4 * |
5 * Adblock Plus is free software: you can redistribute it and/or modify | 5 * Adblock Plus is free software: you can redistribute it and/or modify |
6 * it under the terms of the GNU General Public License version 3 as | 6 * it under the terms of the GNU General Public License version 3 as |
7 * published by the Free Software Foundation. | 7 * published by the Free Software Foundation. |
8 * | 8 * |
9 * Adblock Plus is distributed in the hope that it will be useful, | 9 * Adblock Plus is distributed in the hope that it will be useful, |
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of | 10 * but WITHOUT ANY WARRANTY; without even the implied warranty of |
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | 11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
12 * GNU General Public License for more details. | 12 * GNU General Public License for more details. |
13 * | 13 * |
14 * You should have received a copy of the GNU General Public License | 14 * You should have received a copy of the GNU General Public License |
15 * along with Adblock Plus. If not, see <http://www.gnu.org/licenses/>. | 15 * along with Adblock Plus. If not, see <http://www.gnu.org/licenses/>. |
16 */ | 16 */ |
17 | 17 |
18 /** @module whitelisting */ | 18 /** @module whitelisting */ |
19 | 19 |
20 "use strict"; | 20 "use strict"; |
21 | 21 |
22 let {defaultMatcher} = require("matcher"); | 22 let {defaultMatcher} = require("matcher"); |
23 let {RegExpFilter} = require("filterClasses"); | 23 let {RegExpFilter} = require("filterClasses"); |
24 let {DownloadableSubscription} = require("subscriptionClasses"); | 24 let {DownloadableSubscription} = require("subscriptionClasses"); |
25 let {FilterNotifier} = require("filterNotifier"); | 25 let {FilterNotifier} = require("filterNotifier"); |
26 let {stringifyURL, getDecodedHostname, extractHostFromFrame, isThirdParty} = req uire("url"); | 26 let {stringifyURL, getDecodedHostname, extractHostFromFrame, isThirdParty} = req uire("url"); |
27 let {port} = require("messaging"); | 27 let {port} = require("messaging"); |
28 let devtools = require("devtools"); | 28 let devtools = require("devtools"); |
29 | 29 |
30 let pagesWithKey = new ext.PageMap(); | 30 let sitekeys = new ext.PageMap(); |
31 | 31 |
32 function match(page, url, typeMask, docDomain, sitekey) | 32 function match(page, url, typeMask, docDomain, sitekey) |
33 { | 33 { |
34 let thirdParty = !!docDomain && isThirdParty(url, docDomain); | 34 let thirdParty = !!docDomain && isThirdParty(url, docDomain); |
35 let urlString = stringifyURL(url); | 35 let urlString = stringifyURL(url); |
36 | 36 |
37 if (!docDomain) | 37 if (!docDomain) |
38 docDomain = getDecodedHostname(url); | 38 docDomain = getDecodedHostname(url); |
39 | 39 |
40 let filter = defaultMatcher.whitelist.matchesAny( | 40 let filter = defaultMatcher.whitelist.matchesAny( |
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
77 filter = match(page, frame.url, typeMask, docDomain, sitekey); | 77 filter = match(page, frame.url, typeMask, docDomain, sitekey); |
78 frame = parent; | 78 frame = parent; |
79 } | 79 } |
80 | 80 |
81 return filter; | 81 return filter; |
82 } | 82 } |
83 | 83 |
84 return match(page, page.url, typeMask); | 84 return match(page, page.url, typeMask); |
85 }; | 85 }; |
86 | 86 |
87 port.on("filters.isPageWhitelisted", (message, sender) => | |
Sebastian Noack
2016/03/23 14:02:06
This is unrelated, but I moved this function up he
kzar
2016/03/23 15:36:00
Acknowledged. I can also see an argument for keepi
| |
88 { | |
89 return !!checkWhitelisted(sender.page); | |
90 }); | |
91 | |
87 function revalidateWhitelistingState(page) | 92 function revalidateWhitelistingState(page) |
88 { | 93 { |
89 FilterNotifier.triggerListeners( | 94 FilterNotifier.triggerListeners( |
90 "page.WhitelistingStateRevalidate", | 95 "page.WhitelistingStateRevalidate", |
91 page, checkWhitelisted(page) | 96 page, checkWhitelisted(page) |
92 ); | 97 ); |
93 } | 98 } |
94 | 99 |
95 let revalidating = false; | 100 FilterNotifier.addListener(action => |
96 FilterNotifier.addListener((action, arg) => | |
97 { | 101 { |
98 switch (action) | 102 if (action == "filter.behaviorChanged") |
99 { | 103 ext.pages.query({}, pages => |
100 case "subscription.added": | 104 { |
101 if (arg instanceof DownloadableSubscription && !arg.lastDownload) | 105 for (let page of pages) |
102 break; | 106 revalidateWhitelistingState(page); |
103 case "subscription.removed": | 107 }); |
104 case "subscription.disabled": | |
105 case "subscription.updated": | |
106 case "filter.added": | |
107 case "filter.removed": | |
108 case "filter.disabled": | |
109 case "load": | |
110 if (!revalidating) | |
111 { | |
112 revalidating = true; | |
113 ext.pages.query({}, pages => | |
114 { | |
115 revalidating = false; | |
116 for (let page of pages) | |
117 revalidateWhitelistingState(page); | |
118 }); | |
119 } | |
120 } | |
121 }); | 108 }); |
122 | 109 |
123 ext.pages.onLoading.addListener(revalidateWhitelistingState); | 110 ext.pages.onLoading.addListener(revalidateWhitelistingState); |
124 | 111 |
125 let getKey = | 112 let getKey = |
126 /** | 113 /** |
127 * Gets the public key, previously recorded for the given page | 114 * Gets the public key, previously recorded for the given page |
128 * and frame, to be considered for the $sitekey filter option. | 115 * and frame, to be considered for the $sitekey filter option. |
129 * | 116 * |
130 * @param {Page} page | 117 * @param {Page} page |
131 * @param {Frame} frame | 118 * @param {Frame} frame |
132 * @return {string} | 119 * @return {string} |
133 */ | 120 */ |
134 exports.getKey = function(page, frame) | 121 exports.getKey = function(page, frame) |
135 { | 122 { |
136 let urlsWithKey = pagesWithKey.get(page); | 123 let keys = sitekeys.get(page); |
137 if (!urlsWithKey) | 124 if (!keys) |
138 return null; | 125 return null; |
139 | 126 |
140 for (; frame != null; frame = frame.parent) | 127 for (; frame != null; frame = frame.parent) |
141 { | 128 { |
142 let key = urlsWithKey[stringifyURL(frame.url)]; | 129 let key = keys[stringifyURL(frame.url)]; |
143 if (key) | 130 if (key) |
144 return key; | 131 return key; |
145 } | 132 } |
146 | 133 |
147 return null; | 134 return null; |
148 }; | 135 }; |
149 | 136 |
150 function verifyKey(key, signature, url) | 137 function recordKey(token, page, url) |
151 { | 138 { |
152 let params = [ | 139 let parts = token.split("_"); |
153 url.pathname + url.search, // REQUEST_URI | 140 if (parts.length < 2) |
154 url.host, // HTTP_HOST | |
155 window.navigator.userAgent // HTTP_USER_AGENT | |
156 ]; | |
157 | |
158 return verifySignature(key, signature, params.join("\0")); | |
159 } | |
160 | |
161 function recordKey(page, url, key) | |
162 { | |
163 let urlsWithKey = pagesWithKey.get(page); | |
164 | |
165 if (!urlsWithKey) | |
166 { | |
167 urlsWithKey = Object.create(null); | |
168 pagesWithKey.set(page, urlsWithKey); | |
169 } | |
170 | |
171 urlsWithKey[stringifyURL(url)] = key; | |
172 } | |
173 | |
174 let processKey = | |
175 /** | |
176 * Validates signatures given by the "X-Adblock-Key" response | |
177 * header or the "data-adblockkey" attribute of the document | |
178 * element. If the signature is valid, the public key will be | |
179 * recorded and considered for the $sitekey filter option. | |
180 * | |
181 * @param {string} token The base64-encoded public key and | |
182 * signature separated by an underscrore. | |
183 * @param {Page} page | |
184 * @param {Frame} frame | |
185 */ | |
186 exports.processKey = function(token, page, frame) | |
187 { | |
188 if (token.indexOf("_") < 0) | |
189 return; | 141 return; |
190 | 142 |
191 let [key, signature] = token.split("_", 2); | 143 let key = parts[0].replace(/=/g, ""); |
kzar
2016/03/23 15:36:00
Don't we rather want to trim the "="s from the sta
Sebastian Noack
2016/03/23 16:44:48
We want to trim them from the end. However, they c
kzar
2016/03/23 17:18:22
Acknowledged.
| |
192 key = key.replace(/=/g, ""); | 144 let signature = parts[1]; |
145 let data = url.pathname + url.search + "\0" + | |
146 url.host + "\0" + | |
147 window.navigator.userAgent; | |
148 if (!verifySignature(key, signature, data)) | |
149 return; | |
193 | 150 |
194 if (verifyKey(key, signature, frame.url)) | 151 let keys = sitekeys.get(page); |
195 recordKey(page, frame.url, key); | 152 if (!keys) |
196 }; | 153 { |
154 keys = Object.create(null); | |
155 sitekeys.set(page, keys); | |
156 } | |
157 keys[stringifyURL(url)] = key; | |
158 } | |
197 | 159 |
198 port.on("filters.addKey", (message, sender) => | 160 port.on("filters.addKey", (message, sender) => |
199 { | 161 { |
200 processKey(message.token, sender.page, sender.frame); | 162 recordKey(message.token, sender.page, sender.frame.url); |
201 }); | 163 }); |
202 | 164 |
203 port.on("filters.isPageWhitelisted", (message, sender) => | 165 function onHeadersReceived(details) |
204 { | 166 { |
205 return !!checkWhitelisted(sender.page); | 167 let page = new ext.Page({id: details.tabId}); |
206 }); | 168 |
169 for (let header of details.responseHeaders) | |
170 if (header.name.toLowerCase() == "x-adblock-key" && header.value) | |
171 recordKey(header.value, page, new URL(details.url)); | |
172 } | |
173 | |
174 if (typeof chrome == "object") | |
175 chrome.webRequest.onHeadersReceived.addListener( | |
kzar
2016/03/23 15:36:00
I guess this part should be in ext/chrome somewher
Sebastian Noack
2016/03/23 16:44:48
Not really. There is no counterpart for Safari. An
kzar
2016/03/23 17:18:22
Acknowledged.
| |
176 onHeadersReceived, | |
177 { | |
178 urls: ["http://*/*", "https://*/*"], | |
179 types: ["main_frame", "sub_frame"] | |
180 }, | |
181 ["responseHeaders"] | |
182 ); | |
OLD | NEW |