forked from mirrors/gecko-dev
Backed out changeset 36c6a7178a5c (bug 1533074) Backed out changeset 7e6a8fadff5b (bug 1533074) Backed out changeset 2a0494fed543 (bug 1533074) Backed out changeset 38470d2dd98c (bug 1533074) Backed out changeset af4e03d1f5c8 (bug 1533074)
199 lines
6.5 KiB
C++
199 lines
6.5 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "UrlClassifierFeatureCryptominingProtection.h"
|
|
|
|
#include "mozilla/AntiTrackingCommon.h"
|
|
#include "mozilla/net/UrlClassifierCommon.h"
|
|
#include "mozilla/StaticPrefs.h"
|
|
#include "nsContentUtils.h"
|
|
#include "nsNetUtil.h"
|
|
|
|
namespace mozilla {
|
|
namespace net {
|
|
|
|
namespace {
|
|
|
|
#define CRYPTOMINING_FEATURE_NAME "cryptomining"
|
|
|
|
#define URLCLASSIFIER_CRYPTOMINING_BLACKLIST \
|
|
"urlclassifier.features.cryptomining.blacklistTables"
|
|
#define URLCLASSIFIER_CRYPTOMINING_BLACKLIST_TEST_ENTRIES \
|
|
"urlclassifier.features.cryptomining.blacklistHosts"
|
|
#define URLCLASSIFIER_CRYPTOMINING_WHITELIST \
|
|
"urlclassifier.features.cryptomining.whitelistTables"
|
|
#define URLCLASSIFIER_CRYPTOMINING_WHITELIST_TEST_ENTRIES \
|
|
"urlclassifier.features.cryptomining.whitelistHosts"
|
|
#define TABLE_CRYPTOMINING_BLACKLIST_PREF "cryptomining-blacklist-pref"
|
|
#define TABLE_CRYPTOMINING_WHITELIST_PREF "cryptomining-whitelist-pref"
|
|
|
|
StaticRefPtr<UrlClassifierFeatureCryptominingProtection>
|
|
gFeatureCryptominingProtection;
|
|
|
|
} // namespace
|
|
|
|
UrlClassifierFeatureCryptominingProtection::
|
|
UrlClassifierFeatureCryptominingProtection()
|
|
: UrlClassifierFeatureBase(
|
|
NS_LITERAL_CSTRING(CRYPTOMINING_FEATURE_NAME),
|
|
NS_LITERAL_CSTRING(URLCLASSIFIER_CRYPTOMINING_BLACKLIST),
|
|
NS_LITERAL_CSTRING(URLCLASSIFIER_CRYPTOMINING_WHITELIST),
|
|
NS_LITERAL_CSTRING(URLCLASSIFIER_CRYPTOMINING_BLACKLIST_TEST_ENTRIES),
|
|
NS_LITERAL_CSTRING(URLCLASSIFIER_CRYPTOMINING_WHITELIST_TEST_ENTRIES),
|
|
NS_LITERAL_CSTRING(TABLE_CRYPTOMINING_BLACKLIST_PREF),
|
|
NS_LITERAL_CSTRING(TABLE_CRYPTOMINING_WHITELIST_PREF),
|
|
EmptyCString()) {}
|
|
|
|
/* static */ const char* UrlClassifierFeatureCryptominingProtection::Name() {
|
|
return CRYPTOMINING_FEATURE_NAME;
|
|
}
|
|
|
|
/* static */
|
|
void UrlClassifierFeatureCryptominingProtection::MaybeInitialize() {
|
|
UC_LOG(("UrlClassifierFeatureCryptominingProtection: MaybeInitialize"));
|
|
|
|
if (!gFeatureCryptominingProtection) {
|
|
gFeatureCryptominingProtection =
|
|
new UrlClassifierFeatureCryptominingProtection();
|
|
gFeatureCryptominingProtection->InitializePreferences();
|
|
}
|
|
}
|
|
|
|
/* static */
|
|
void UrlClassifierFeatureCryptominingProtection::MaybeShutdown() {
|
|
UC_LOG(("UrlClassifierFeatureCryptominingProtection: MaybeShutdown"));
|
|
|
|
if (gFeatureCryptominingProtection) {
|
|
gFeatureCryptominingProtection->ShutdownPreferences();
|
|
gFeatureCryptominingProtection = nullptr;
|
|
}
|
|
}
|
|
|
|
/* static */
|
|
already_AddRefed<UrlClassifierFeatureCryptominingProtection>
|
|
UrlClassifierFeatureCryptominingProtection::MaybeCreate(nsIChannel* aChannel) {
|
|
MOZ_ASSERT(aChannel);
|
|
|
|
UC_LOG(
|
|
("UrlClassifierFeatureCryptominingProtection: MaybeCreate for channel %p",
|
|
aChannel));
|
|
|
|
if (!StaticPrefs::privacy_trackingprotection_cryptomining_enabled()) {
|
|
return nullptr;
|
|
}
|
|
|
|
nsCOMPtr<nsIURI> chanURI;
|
|
nsresult rv = aChannel->GetURI(getter_AddRefs(chanURI));
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return nullptr;
|
|
}
|
|
|
|
bool isThirdParty =
|
|
nsContentUtils::IsThirdPartyWindowOrChannel(nullptr, aChannel, chanURI);
|
|
if (!isThirdParty) {
|
|
if (UC_LOG_ENABLED()) {
|
|
nsCString spec = chanURI->GetSpecOrDefault();
|
|
spec.Truncate(
|
|
std::min(spec.Length(), UrlClassifierCommon::sMaxSpecLength));
|
|
UC_LOG(
|
|
("UrlClassifierFeatureCryptominingProtection: Skipping cryptomining "
|
|
"checks "
|
|
"for first party or top-level load channel[%p] "
|
|
"with uri %s",
|
|
aChannel, spec.get()));
|
|
}
|
|
|
|
return nullptr;
|
|
}
|
|
|
|
if (!UrlClassifierCommon::ShouldEnableClassifier(aChannel)) {
|
|
return nullptr;
|
|
}
|
|
|
|
MaybeInitialize();
|
|
MOZ_ASSERT(gFeatureCryptominingProtection);
|
|
|
|
RefPtr<UrlClassifierFeatureCryptominingProtection> self =
|
|
gFeatureCryptominingProtection;
|
|
return self.forget();
|
|
}
|
|
|
|
/* static */
|
|
already_AddRefed<nsIUrlClassifierFeature>
|
|
UrlClassifierFeatureCryptominingProtection::GetIfNameMatches(
|
|
const nsACString& aName) {
|
|
if (!aName.EqualsLiteral(CRYPTOMINING_FEATURE_NAME)) {
|
|
return nullptr;
|
|
}
|
|
|
|
MaybeInitialize();
|
|
MOZ_ASSERT(gFeatureCryptominingProtection);
|
|
|
|
RefPtr<UrlClassifierFeatureCryptominingProtection> self =
|
|
gFeatureCryptominingProtection;
|
|
return self.forget();
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
UrlClassifierFeatureCryptominingProtection::ProcessChannel(
|
|
nsIChannel* aChannel, const nsACString& aList, bool* aShouldContinue) {
|
|
NS_ENSURE_ARG_POINTER(aChannel);
|
|
NS_ENSURE_ARG_POINTER(aShouldContinue);
|
|
|
|
bool isAllowListed =
|
|
IsAllowListed(aChannel, AntiTrackingCommon::eCryptomining);
|
|
|
|
// This is a blocking feature.
|
|
*aShouldContinue = isAllowListed;
|
|
|
|
if (isAllowListed) {
|
|
// Even with cryptomining blocking disabled, we still want to show the user
|
|
// that there are unblocked cryptominers on the site, so notify the UI that
|
|
// we loaded cryptomining content. UI code can treat this notification
|
|
// differently depending on whether cryptomining blocking is enabled or
|
|
// disabled.
|
|
UrlClassifierCommon::NotifyChannelClassifierProtectionDisabled(
|
|
aChannel, nsIWebProgressListener::STATE_LOADED_CRYPTOMINING_CONTENT);
|
|
} else {
|
|
UrlClassifierCommon::SetBlockedContent(aChannel, NS_ERROR_CRYPTOMINING_URI,
|
|
aList, EmptyCString(),
|
|
EmptyCString());
|
|
|
|
UC_LOG(
|
|
("UrlClassifierFeatureCryptominingProtection::ProcessChannel, "
|
|
"cancelling "
|
|
"channel[%p]",
|
|
aChannel));
|
|
nsCOMPtr<nsIHttpChannelInternal> httpChannel = do_QueryInterface(aChannel);
|
|
|
|
if (httpChannel) {
|
|
Unused << httpChannel->CancelByChannelClassifier(
|
|
NS_ERROR_CRYPTOMINING_URI);
|
|
} else {
|
|
Unused << aChannel->Cancel(NS_ERROR_CRYPTOMINING_URI);
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
UrlClassifierFeatureCryptominingProtection::GetURIByListType(
|
|
nsIChannel* aChannel, nsIUrlClassifierFeature::listType aListType,
|
|
nsIURI** aURI) {
|
|
NS_ENSURE_ARG_POINTER(aChannel);
|
|
NS_ENSURE_ARG_POINTER(aURI);
|
|
|
|
if (aListType == nsIUrlClassifierFeature::blacklist) {
|
|
return aChannel->GetURI(aURI);
|
|
}
|
|
|
|
MOZ_ASSERT(aListType == nsIUrlClassifierFeature::whitelist);
|
|
return UrlClassifierCommon::CreatePairwiseWhiteListURI(aChannel, aURI);
|
|
}
|
|
|
|
} // namespace net
|
|
} // namespace mozilla
|