forked from mirrors/gecko-dev
This also avoids sending an engine-update Glean event for the default engine by not handling the engine-icon-update notification in the update tracking code. Differential Revision: https://phabricator.services.mozilla.com/D210838
445 lines
14 KiB
JavaScript
445 lines
14 KiB
JavaScript
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
/* eslint no-shadow: error, mozilla/no-aArgs: error */
|
|
|
|
import { AppConstants } from "resource://gre/modules/AppConstants.sys.mjs";
|
|
import { XPCOMUtils } from "resource://gre/modules/XPCOMUtils.sys.mjs";
|
|
|
|
const lazy = {};
|
|
|
|
ChromeUtils.defineLazyGetter(lazy, "logConsole", () => {
|
|
return console.createInstance({
|
|
prefix: "SearchUtils",
|
|
maxLogLevel: SearchUtils.loggingEnabled ? "Debug" : "Warn",
|
|
});
|
|
});
|
|
|
|
const BROWSER_SEARCH_PREF = "browser.search.";
|
|
|
|
/**
|
|
* Load listener
|
|
*/
|
|
class LoadListener {
|
|
_bytes = [];
|
|
_callback = null;
|
|
_channel = null;
|
|
_countRead = 0;
|
|
_expectedContentType = null;
|
|
_stream = null;
|
|
QueryInterface = ChromeUtils.generateQI([
|
|
Ci.nsIRequestObserver,
|
|
Ci.nsIStreamListener,
|
|
Ci.nsIChannelEventSink,
|
|
Ci.nsIInterfaceRequestor,
|
|
Ci.nsIProgressEventSink,
|
|
]);
|
|
|
|
/**
|
|
* Constructor
|
|
*
|
|
* @param {nsIChannel} channel
|
|
* The initial channel to load from.
|
|
* @param {RegExp} expectedContentType
|
|
* A regular expression to match the expected content type to.
|
|
* @param {Function} callback
|
|
* A callback to receive the loaded data. The callback is passed the bytes
|
|
* (array) and the content type received. The bytes argument may be null if
|
|
* no data could be loaded.
|
|
*/
|
|
constructor(channel, expectedContentType, callback) {
|
|
this._channel = channel;
|
|
this._callback = callback;
|
|
this._expectedContentType = expectedContentType;
|
|
}
|
|
|
|
// nsIRequestObserver
|
|
onStartRequest(request) {
|
|
lazy.logConsole.debug("loadListener: Starting request:", request.name);
|
|
this._stream = Cc["@mozilla.org/binaryinputstream;1"].createInstance(
|
|
Ci.nsIBinaryInputStream
|
|
);
|
|
}
|
|
|
|
onStopRequest(request, statusCode) {
|
|
lazy.logConsole.debug("loadListener: Stopping request:", request.name);
|
|
|
|
var requestFailed = !Components.isSuccessCode(statusCode);
|
|
if (!requestFailed && request instanceof Ci.nsIHttpChannel) {
|
|
requestFailed = !request.requestSucceeded;
|
|
}
|
|
|
|
if (requestFailed || this._countRead == 0) {
|
|
lazy.logConsole.warn("loadListener: request failed!");
|
|
// send null so the callback can deal with the failure
|
|
this._bytes = null;
|
|
} else if (!this._expectedContentType.test(this._channel.contentType)) {
|
|
lazy.logConsole.warn(
|
|
"loadListener: Content type does not match expected",
|
|
this._channel.contentType
|
|
);
|
|
this._bytes = null;
|
|
}
|
|
this._callback(this._bytes, this._bytes ? this._channel.contentType : "");
|
|
this._channel = null;
|
|
}
|
|
|
|
// nsIStreamListener
|
|
onDataAvailable(request, inputStream, offset, count) {
|
|
this._stream.setInputStream(inputStream);
|
|
|
|
// Get a byte array of the data
|
|
this._bytes = this._bytes.concat(this._stream.readByteArray(count));
|
|
this._countRead += count;
|
|
}
|
|
|
|
// nsIChannelEventSink
|
|
asyncOnChannelRedirect(oldChannel, newChannel, flags, callback) {
|
|
this._channel = newChannel;
|
|
callback.onRedirectVerifyCallback(Cr.NS_OK);
|
|
}
|
|
|
|
// nsIInterfaceRequestor
|
|
getInterface(iid) {
|
|
return this.QueryInterface(iid);
|
|
}
|
|
|
|
// nsIProgressEventSink
|
|
onProgress() {}
|
|
onStatus() {}
|
|
}
|
|
|
|
export var SearchUtils = {
|
|
BROWSER_SEARCH_PREF,
|
|
|
|
/**
|
|
* This is the Remote Settings key that we use to get the ignore lists for
|
|
* engines.
|
|
*/
|
|
SETTINGS_IGNORELIST_KEY: "hijack-blocklists",
|
|
|
|
/**
|
|
* This is the Remote Settings key that we use to get the allow lists for
|
|
* overriding the default engines.
|
|
*/
|
|
SETTINGS_ALLOWLIST_KEY: "search-default-override-allowlist",
|
|
|
|
/**
|
|
* This is the Remote Settings key for getting the older search engine
|
|
* configuration. Tests may use `SETTINGS_KEY` if they want to get the key
|
|
* for the current configuration according to the preference.
|
|
*/
|
|
OLD_SETTINGS_KEY: "search-config",
|
|
|
|
/**
|
|
* This is the Remote Settings key for getting the newer search engine
|
|
* configuration. Tests may use `SETTINGS_KEY` if they want to get the key
|
|
* for the current configuration according to the preference.
|
|
*/
|
|
NEW_SETTINGS_KEY: "search-config-v2",
|
|
|
|
/**
|
|
* This is the Remote Settings key for getting the overrides for the
|
|
* older search engine configuration. Tests may use `SETTINGS_OVERRIDES_KEY`
|
|
* for the current configuration according to the preference.
|
|
*/
|
|
OLD_SETTINGS_OVERRIDES_KEY: "search-config-overrides",
|
|
|
|
/**
|
|
* This is the Remote Settings key for getting the overrides for the
|
|
* newer search engine configuration. Tests may use `SETTINGS_OVERRIDES_KEY`
|
|
* for the current configuration according to the preference.
|
|
*/
|
|
NEW_SETTINGS_OVERRIDES_KEY: "search-config-overrides-v2",
|
|
|
|
/**
|
|
* This is the Remote Settings key that we use to get the search engine
|
|
* configurations.
|
|
*
|
|
* @returns {string}
|
|
*/
|
|
get SETTINGS_KEY() {
|
|
return SearchUtils.newSearchConfigEnabled
|
|
? SearchUtils.NEW_SETTINGS_KEY
|
|
: SearchUtils.OLD_SETTINGS_KEY;
|
|
},
|
|
|
|
/**
|
|
* This is the Remote Settings key that we use to get the search engine
|
|
* configuration overrides.
|
|
*
|
|
* @returns {string}
|
|
*/
|
|
get SETTINGS_OVERRIDES_KEY() {
|
|
return SearchUtils.newSearchConfigEnabled
|
|
? SearchUtils.NEW_SETTINGS_OVERRIDES_KEY
|
|
: SearchUtils.OLD_SETTINGS_OVERRIDES_KEY;
|
|
},
|
|
|
|
/**
|
|
* Topic used for events involving the service itself.
|
|
*/
|
|
TOPIC_SEARCH_SERVICE: "browser-search-service",
|
|
|
|
// See documentation in nsISearchService.idl.
|
|
TOPIC_ENGINE_MODIFIED: "browser-search-engine-modified",
|
|
MODIFIED_TYPE: {
|
|
CHANGED: "engine-changed",
|
|
ICON_CHANGED: "engine-icon-changed",
|
|
REMOVED: "engine-removed",
|
|
ADDED: "engine-added",
|
|
DEFAULT: "engine-default",
|
|
DEFAULT_PRIVATE: "engine-default-private",
|
|
},
|
|
|
|
URL_TYPE: {
|
|
SUGGEST_JSON: "application/x-suggestions+json",
|
|
SEARCH: "text/html",
|
|
OPENSEARCH: "application/opensearchdescription+xml",
|
|
TRENDING_JSON: "application/x-trending+json",
|
|
},
|
|
|
|
ENGINES_URLS: {
|
|
"prod-main":
|
|
"https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/search-config/records",
|
|
"prod-preview":
|
|
"https://firefox.settings.services.mozilla.com/v1/buckets/main-preview/collections/search-config/records",
|
|
"stage-main":
|
|
"https://firefox.settings.services.allizom.org/v1/buckets/main/collections/search-config/records",
|
|
"stage-preview":
|
|
"https://firefox.settings.services.allizom.org/v1/buckets/main-preview/collections/search-config/records",
|
|
},
|
|
|
|
// The following constants are left undocumented in nsISearchService.idl
|
|
// For the moment, they are meant for testing/debugging purposes only.
|
|
|
|
// Set an arbitrary cap on the maximum icon size. Without this, large icons can
|
|
// cause big delays when loading them at startup.
|
|
MAX_ICON_SIZE: 20000,
|
|
|
|
DEFAULT_QUERY_CHARSET: "UTF-8",
|
|
|
|
// A tag to denote when we are using the "default_locale" of an engine.
|
|
DEFAULT_TAG: "default",
|
|
|
|
// Query parameters can have the property "purpose", whose value
|
|
// indicates the context that initiated a search. This list contains
|
|
// defined search contexts.
|
|
PARAM_PURPOSES: {
|
|
CONTEXTMENU: "contextmenu",
|
|
HOMEPAGE: "homepage",
|
|
KEYWORD: "keyword",
|
|
NEWTAB: "newtab",
|
|
SEARCHBAR: "searchbar",
|
|
},
|
|
|
|
LoadListener,
|
|
|
|
// This is a list of search engines that we currently consider to be "General"
|
|
// search, as opposed to a vertical search engine such as one used for
|
|
// shopping, book search, etc.
|
|
//
|
|
// Currently these are a list of hard-coded application provided ones. At some
|
|
// point in the future we expect to allow WebExtensions to specify by themselves,
|
|
// however this needs more definition on the "vertical" search terms, and the
|
|
// effects before we enable it.
|
|
GENERAL_SEARCH_ENGINE_IDS: new Set([
|
|
"google@search.mozilla.org",
|
|
"ddg@search.mozilla.org",
|
|
"bing@search.mozilla.org",
|
|
"baidu@search.mozilla.org",
|
|
"ecosia@search.mozilla.org",
|
|
"qwant@search.mozilla.org",
|
|
"yahoo-jp@search.mozilla.org",
|
|
"yandex@search.mozilla.org",
|
|
]),
|
|
|
|
/**
|
|
* Notifies watchers of SEARCH_ENGINE_TOPIC about changes to an engine or to
|
|
* the state of the search service.
|
|
*
|
|
* @param {nsISearchEngine} engine
|
|
* The engine to which the change applies.
|
|
* @param {string} verb
|
|
* A verb describing the change.
|
|
*
|
|
* @see nsISearchService.idl
|
|
*/
|
|
notifyAction(engine, verb) {
|
|
if (Services.search.isInitialized) {
|
|
lazy.logConsole.debug("NOTIFY: Engine:", engine.name, "Verb:", verb);
|
|
Services.obs.notifyObservers(engine, this.TOPIC_ENGINE_MODIFIED, verb);
|
|
}
|
|
},
|
|
|
|
/**
|
|
* Wrapper function for nsIIOService::newURI.
|
|
*
|
|
* @param {string} urlSpec
|
|
* The URL string from which to create an nsIURI.
|
|
* @returns {nsIURI} an nsIURI object, or null if the creation of the URI failed.
|
|
*/
|
|
makeURI(urlSpec) {
|
|
try {
|
|
return Services.io.newURI(urlSpec);
|
|
} catch (ex) {}
|
|
|
|
return null;
|
|
},
|
|
|
|
/**
|
|
* Wrapper function for nsIIOService::newChannel.
|
|
*
|
|
* @param {string|nsIURI} url
|
|
* The URL string from which to create an nsIChannel.
|
|
* @param {nsIContentPolicy} contentPolicyType
|
|
* The type of document being loaded.
|
|
* @returns {nsIChannel}
|
|
* an nsIChannel object, or null if the url is invalid.
|
|
*/
|
|
makeChannel(url, contentPolicyType) {
|
|
if (!contentPolicyType) {
|
|
throw new Error("makeChannel called with invalid content policy type");
|
|
}
|
|
try {
|
|
let uri = typeof url == "string" ? Services.io.newURI(url) : url;
|
|
return Services.io.newChannelFromURI(
|
|
uri,
|
|
null /* loadingNode */,
|
|
Services.scriptSecurityManager.createNullPrincipal({}),
|
|
null /* triggeringPrincipal */,
|
|
Ci.nsILoadInfo.SEC_ALLOW_CROSS_ORIGIN_SEC_CONTEXT_IS_NULL,
|
|
contentPolicyType
|
|
);
|
|
} catch (ex) {}
|
|
|
|
return null;
|
|
},
|
|
|
|
/**
|
|
* Tests whether this a partner distribution.
|
|
*
|
|
* @returns {boolean}
|
|
* Whether this is a partner distribution.
|
|
*/
|
|
isPartnerBuild() {
|
|
return SearchUtils.distroID && !SearchUtils.distroID.startsWith("mozilla");
|
|
},
|
|
|
|
/**
|
|
* Current settings version. This should be incremented if the format of the
|
|
* settings file is modified.
|
|
*
|
|
* @returns {number}
|
|
* The current settings version.
|
|
*/
|
|
get SETTINGS_VERSION() {
|
|
return 9;
|
|
},
|
|
|
|
/**
|
|
* Indicates the channel that the build is on, with added hardening for ESR
|
|
* since some ESR builds may be self-built or not on the same channel.
|
|
*
|
|
* @returns {string}
|
|
* Returns the modified channel, with a focus on ESR if the application
|
|
* version is indicating ESR.
|
|
*/
|
|
get MODIFIED_APP_CHANNEL() {
|
|
return AppConstants.IS_ESR ? "esr" : AppConstants.MOZ_UPDATE_CHANNEL;
|
|
},
|
|
|
|
/**
|
|
* Sanitizes a name so that it can be used as an engine name. If it cannot be
|
|
* sanitized (e.g. no valid characters), then it returns a random name.
|
|
*
|
|
* @param {string} name
|
|
* The name to be sanitized.
|
|
* @returns {string}
|
|
* The sanitized name.
|
|
*/
|
|
sanitizeName(name) {
|
|
const maxLength = 60;
|
|
const minLength = 1;
|
|
var result = name.toLowerCase();
|
|
result = result.replace(/\s+/g, "-");
|
|
result = result.replace(/[^-a-z0-9]/g, "");
|
|
|
|
// Use a random name if our input had no valid characters.
|
|
if (result.length < minLength) {
|
|
result = Math.random().toString(36).replace(/^.*\./, "");
|
|
}
|
|
|
|
// Force max length.
|
|
return result.substring(0, maxLength);
|
|
},
|
|
|
|
getVerificationHash(name) {
|
|
let disclaimer =
|
|
"By modifying this file, I agree that I am doing so " +
|
|
"only within $appName itself, using official, user-driven search " +
|
|
"engine selection processes, and in a way which does not circumvent " +
|
|
"user consent. I acknowledge that any attempt to change this file " +
|
|
"from outside of $appName is a malicious act, and will be responded " +
|
|
"to accordingly.";
|
|
|
|
let salt =
|
|
PathUtils.filename(PathUtils.profileDir) +
|
|
name +
|
|
disclaimer.replace(/\$appName/g, Services.appinfo.name);
|
|
|
|
let data = new TextEncoder().encode(salt);
|
|
let hasher = Cc["@mozilla.org/security/hash;1"].createInstance(
|
|
Ci.nsICryptoHash
|
|
);
|
|
hasher.init(hasher.SHA256);
|
|
hasher.update(data, data.length);
|
|
|
|
return hasher.finish(true);
|
|
},
|
|
|
|
/**
|
|
* Tests whether the given URI is a secure OpenSearch submission URI or a
|
|
* secure OpenSearch update URI.
|
|
*
|
|
* Note: We don't want to count something served via localhost as insecure.
|
|
* We also don't want to count sites with .onion as their top-level domain
|
|
* as insecure because .onion URLs actually can't use https and are secured
|
|
* in other ways.
|
|
*
|
|
* @param {nsIURI} uri
|
|
* The URI to be tested.
|
|
* @returns {boolean}
|
|
* Whether the URI is secure for OpenSearch purposes.
|
|
*/
|
|
isSecureURIForOpenSearch(uri) {
|
|
const loopbackAddresses = ["127.0.0.1", "[::1]", "localhost"];
|
|
|
|
return (
|
|
uri.schemeIs("https") ||
|
|
loopbackAddresses.includes(uri.host) ||
|
|
uri.host.toLowerCase().endsWith(".onion")
|
|
);
|
|
},
|
|
};
|
|
|
|
XPCOMUtils.defineLazyPreferenceGetter(
|
|
SearchUtils,
|
|
"loggingEnabled",
|
|
BROWSER_SEARCH_PREF + "log",
|
|
false
|
|
);
|
|
|
|
ChromeUtils.defineLazyGetter(SearchUtils, "newSearchConfigEnabled", () => {
|
|
return Services.prefs.getBoolPref(
|
|
"browser.search.newSearchConfig.enabled",
|
|
false
|
|
);
|
|
});
|
|
|
|
// Can't use defineLazyPreferenceGetter because we want the value
|
|
// from the default branch
|
|
ChromeUtils.defineLazyGetter(SearchUtils, "distroID", () => {
|
|
return Services.prefs.getDefaultBranch("distribution.").getCharPref("id", "");
|
|
});
|