| Left: | ||
| Right: |
| LEFT | RIGHT |
|---|---|
| 1 /* | 1 /* |
| 2 * This file is part of Adblock Plus <https://adblockplus.org/>, | 2 * This file is part of Adblock Plus <https://adblockplus.org/>, |
| 3 * Copyright (C) 2006-present eyeo GmbH | 3 * Copyright (C) 2006-present eyeo GmbH |
| 4 * | 4 * |
| 5 * Adblock Plus is free software: you can redistribute it and/or modify | 5 * Adblock Plus is free software: you can redistribute it and/or modify |
| 6 * it under the terms of the GNU General Public License version 3 as | 6 * it under the terms of the GNU General Public License version 3 as |
| 7 * published by the Free Software Foundation. | 7 * published by the Free Software Foundation. |
| 8 * | 8 * |
| 9 * Adblock Plus is distributed in the hope that it will be useful, | 9 * Adblock Plus is distributed in the hope that it will be useful, |
| 10 * but WITHOUT ANY WARRANTY; without even the implied warranty of | 10 * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | 11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 12 * GNU General Public License for more details. | 12 * GNU General Public License for more details. |
| 13 * | 13 * |
| 14 * You should have received a copy of the GNU General Public License | 14 * You should have received a copy of the GNU General Public License |
| 15 * along with Adblock Plus. If not, see <http://www.gnu.org/licenses/>. | 15 * along with Adblock Plus. If not, see <http://www.gnu.org/licenses/>. |
| 16 */ | 16 */ |
| 17 | 17 |
| 18 "use strict"; | 18 "use strict"; |
| 19 | 19 |
| 20 let randomEventName = "abp-request-" + Math.random().toString(36).substr(2); | 20 let randomEventName = "abp-request-" + Math.random().toString(36).substr(2); |
| 21 | 21 |
| 22 // Proxy "should we block?" messages from checkRequest inside the injected | 22 // Proxy "should we block?" messages from checkRequest inside the injected |
| 23 // code to the background page and back again. | 23 // code to the background page and back again. |
| 24 document.addEventListener(randomEventName, event => | 24 document.addEventListener(randomEventName, event => |
| 25 { | 25 { |
| 26 let {url, requestType} = event.detail; | 26 let {url} = event.detail; |
| 27 | 27 |
| 28 browser.runtime.sendMessage({ | 28 browser.runtime.sendMessage({ |
| 29 type: "request.blockedByWrapper", | 29 type: "request.blockedByRTCWrapper", |
| 30 requestType, | |
| 31 url | 30 url |
| 32 }, block => | 31 }, block => |
| 33 { | 32 { |
| 34 document.dispatchEvent(new CustomEvent( | 33 document.dispatchEvent(new CustomEvent( |
| 35 randomEventName + "-" + requestType + "-" + url, {detail: block} | 34 randomEventName + "-" + url, {detail: block} |
| 36 )); | 35 )); |
| 37 }); | 36 }); |
| 38 }); | 37 }); |
| 39 | 38 |
| 40 function injected(eventName, injectedIntoContentWindow) | 39 function injected(eventName, injectedIntoContentWindow) |
| 41 { | 40 { |
| 42 let checkRequest; | 41 let checkRequest; |
| 43 | 42 |
| 44 /* | 43 /* |
| 45 * Frame context wrapper | 44 * Frame context wrapper |
| (...skipping 85 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 131 configurable: true, enumerable: true, get() | 130 configurable: true, enumerable: true, get() |
| 132 { | 131 { |
| 133 let thisShadow = shadowRoot(this); | 132 let thisShadow = shadowRoot(this); |
| 134 return thisShadow == ourShadowRoot ? null : thisShadow; | 133 return thisShadow == ourShadowRoot ? null : thisShadow; |
| 135 } | 134 } |
| 136 }); | 135 }); |
| 137 } | 136 } |
| 138 } | 137 } |
| 139 | 138 |
| 140 /* | 139 /* |
| 141 * Shared request checking code, used by the RTCPeerConnection wrapper. | 140 * RTCPeerConnection wrapper |
|
Sebastian Noack
2018/03/13 17:43:01
Well, it's no longer shared. We probably should ju
Manish Jethani
2018/03/13 18:05:11
Done.
| |
| 141 * | |
| 142 * The webRequest API in Chrome does not yet allow the blocking of | |
| 143 * WebRTC connections. | |
| 144 * See https://bugs.chromium.org/p/chromium/issues/detail?id=707683 | |
| 142 */ | 145 */ |
| 143 let RealCustomEvent = window.CustomEvent; | 146 let RealCustomEvent = window.CustomEvent; |
| 144 | 147 |
| 145 // If we've been injected into a frame via contentWindow then we can simply | 148 // If we've been injected into a frame via contentWindow then we can simply |
| 146 // grab the copy of checkRequest left for us by the parent document. Otherwise | 149 // grab the copy of checkRequest left for us by the parent document. Otherwise |
| 147 // we need to set it up now, along with the event handling functions. | 150 // we need to set it up now, along with the event handling functions. |
| 148 if (injectedIntoContentWindow) | 151 if (injectedIntoContentWindow) |
| 149 checkRequest = window[eventName]; | 152 checkRequest = window[eventName]; |
| 150 else | 153 else |
| 151 { | 154 { |
| 152 let addEventListener = document.addEventListener.bind(document); | 155 let addEventListener = document.addEventListener.bind(document); |
| 153 let dispatchEvent = document.dispatchEvent.bind(document); | 156 let dispatchEvent = document.dispatchEvent.bind(document); |
| 154 let removeEventListener = document.removeEventListener.bind(document); | 157 let removeEventListener = document.removeEventListener.bind(document); |
| 155 checkRequest = (requestType, url, callback) => | 158 checkRequest = (url, callback) => |
| 156 { | 159 { |
| 157 let incomingEventName = eventName + "-" + requestType + "-" + url; | 160 let incomingEventName = eventName + "-" + url; |
| 158 | 161 |
| 159 function listener(event) | 162 function listener(event) |
| 160 { | 163 { |
| 161 callback(event.detail); | 164 callback(event.detail); |
| 162 removeEventListener(incomingEventName, listener); | 165 removeEventListener(incomingEventName, listener); |
| 163 } | 166 } |
| 164 addEventListener(incomingEventName, listener); | 167 addEventListener(incomingEventName, listener); |
| 165 | 168 |
| 166 dispatchEvent(new RealCustomEvent(eventName, | 169 dispatchEvent(new RealCustomEvent(eventName, {detail: {url}})); |
| 167 {detail: {url, requestType}})); | |
| 168 }; | 170 }; |
| 169 } | 171 } |
| 170 | 172 |
| 171 // Only to be called before the page's code, not hardened. | 173 // Only to be called before the page's code, not hardened. |
| 172 function copyProperties(src, dest, properties) | 174 function copyProperties(src, dest, properties) |
| 173 { | 175 { |
| 174 for (let name of properties) | 176 for (let name of properties) |
| 175 { | 177 { |
| 176 if (src.hasOwnProperty(name)) | 178 if (src.hasOwnProperty(name)) |
| 177 { | 179 { |
| 178 Object.defineProperty(dest, name, | 180 Object.defineProperty(dest, name, |
| 179 Object.getOwnPropertyDescriptor(src, name)); | 181 Object.getOwnPropertyDescriptor(src, name)); |
| 180 } | 182 } |
| 181 } | 183 } |
| 182 } | 184 } |
| 183 | 185 |
| 184 /* | |
| 185 * RTCPeerConnection wrapper | |
| 186 * | |
| 187 * The webRequest API in Chrome does not yet allow the blocking of | |
| 188 * WebRTC connections. | |
| 189 * See https://bugs.chromium.org/p/chromium/issues/detail?id=707683 | |
| 190 */ | |
| 191 let RealRTCPeerConnection = window.RTCPeerConnection || | 186 let RealRTCPeerConnection = window.RTCPeerConnection || |
| 192 window.webkitRTCPeerConnection; | 187 window.webkitRTCPeerConnection; |
| 193 | 188 |
| 194 // Firefox has the option (media.peerconnection.enabled) to disable WebRTC | 189 // Firefox has the option (media.peerconnection.enabled) to disable WebRTC |
| 195 // in which case RealRTCPeerConnection is undefined. | 190 // in which case RealRTCPeerConnection is undefined. |
| 196 if (typeof RealRTCPeerConnection != "undefined") | 191 if (typeof RealRTCPeerConnection != "undefined") |
| 197 { | 192 { |
| 198 let closeRTCPeerConnection = Function.prototype.call.bind( | 193 let closeRTCPeerConnection = Function.prototype.call.bind( |
| 199 RealRTCPeerConnection.prototype.close | 194 RealRTCPeerConnection.prototype.close |
| 200 ); | 195 ); |
| 201 let RealArray = Array; | 196 let RealArray = Array; |
| 202 let RealString = String; | 197 let RealString = String; |
| (...skipping 60 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 263 return createObject(configuration, { | 258 return createObject(configuration, { |
| 264 iceServers: { | 259 iceServers: { |
| 265 configurable: false, enumerable: false, writable: false, | 260 configurable: false, enumerable: false, writable: false, |
| 266 value: iceServers | 261 value: iceServers |
| 267 } | 262 } |
| 268 }); | 263 }); |
| 269 }; | 264 }; |
| 270 | 265 |
| 271 let checkUrl = (peerconnection, url) => | 266 let checkUrl = (peerconnection, url) => |
| 272 { | 267 { |
| 273 checkRequest("webrtc", url, blocked => | 268 checkRequest(url, blocked => |
| 274 { | 269 { |
| 275 if (blocked) | 270 if (blocked) |
| 276 { | 271 { |
| 277 // Calling .close() throws if already closed. | 272 // Calling .close() throws if already closed. |
| 278 try | 273 try |
| 279 { | 274 { |
| 280 closeRTCPeerConnection(peerconnection); | 275 closeRTCPeerConnection(peerconnection); |
| 281 } | 276 } |
| 282 catch (e) {} | 277 catch (e) {} |
| 283 } | 278 } |
| (...skipping 89 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 373 // Firefox 58 only bypasses site CSPs when assigning to 'src'. | 368 // Firefox 58 only bypasses site CSPs when assigning to 'src'. |
| 374 let url = URL.createObjectURL(new Blob([ | 369 let url = URL.createObjectURL(new Blob([ |
| 375 "(" + injected + ")('" + randomEventName + "');" | 370 "(" + injected + ")('" + randomEventName + "');" |
| 376 ])); | 371 ])); |
| 377 script.src = url; | 372 script.src = url; |
| 378 document.documentElement.appendChild(script); | 373 document.documentElement.appendChild(script); |
| 379 document.documentElement.removeChild(script); | 374 document.documentElement.removeChild(script); |
| 380 URL.revokeObjectURL(url); | 375 URL.revokeObjectURL(url); |
| 381 } | 376 } |
| 382 } | 377 } |
| LEFT | RIGHT |