forked from mirrors/gecko-dev
MozReview-Commit-ID: JKW8IsaFY10 --HG-- extra : rebase_source : 45ffa07c34739adf4de681fec1370645b0f74985
70 lines
2.5 KiB
JavaScript
70 lines
2.5 KiB
JavaScript
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
// This file is loaded into the browser window scope.
|
|
/* eslint-env mozilla/browser-window */
|
|
|
|
var gSafeBrowsing = {
|
|
|
|
setReportPhishingMenu() {
|
|
// In order to detect whether or not we're at the phishing warning
|
|
// page, we have to check the documentURI instead of the currentURI.
|
|
// This is because when the DocShell loads an error page, the
|
|
// currentURI stays at the original target, while the documentURI
|
|
// will point to the internal error page we loaded instead.
|
|
var docURI = gBrowser.selectedBrowser.documentURI;
|
|
var isPhishingPage =
|
|
docURI && docURI.spec.startsWith("about:blocked?e=deceptiveBlocked");
|
|
|
|
// Show/hide the appropriate menu item.
|
|
document.getElementById("menu_HelpPopup_reportPhishingtoolmenu")
|
|
.hidden = isPhishingPage;
|
|
document.getElementById("menu_HelpPopup_reportPhishingErrortoolmenu")
|
|
.hidden = !isPhishingPage;
|
|
|
|
var broadcasterId = isPhishingPage
|
|
? "reportPhishingErrorBroadcaster"
|
|
: "reportPhishingBroadcaster";
|
|
|
|
var broadcaster = document.getElementById(broadcasterId);
|
|
if (!broadcaster)
|
|
return;
|
|
|
|
// Now look at the currentURI to learn which page we were trying
|
|
// to browse to.
|
|
let uri = gBrowser.currentURI;
|
|
if (uri && (uri.schemeIs("http") || uri.schemeIs("https")))
|
|
broadcaster.removeAttribute("disabled");
|
|
else
|
|
broadcaster.setAttribute("disabled", true);
|
|
},
|
|
|
|
/**
|
|
* Used to report a phishing page or a false positive
|
|
*
|
|
* @param name
|
|
* String One of "PhishMistake", "MalwareMistake", or "Phish"
|
|
* @param info
|
|
* Information about the reasons for blocking the resource.
|
|
* In the case false positive, it may contain SafeBrowsing
|
|
* matching list and provider of the list
|
|
* @return String the report phishing URL.
|
|
*/
|
|
getReportURL(name, info) {
|
|
let reportInfo = info;
|
|
if (!reportInfo) {
|
|
let pageUri = gBrowser.currentURI.clone();
|
|
|
|
// Remove the query to avoid including potentially sensitive data
|
|
if (pageUri instanceof Ci.nsIURL) {
|
|
pageUri = pageUri.mutate()
|
|
.setQuery("")
|
|
.finalize();
|
|
}
|
|
|
|
reportInfo = { uri: pageUri.asciiSpec };
|
|
}
|
|
return SafeBrowsing.getReportURL(name, reportInfo);
|
|
}
|
|
};
|