forked from mirrors/gecko-dev
In origin telemetry, we want to record the matching statistic of each entry in our tracking tables. To identify which entry a given URL matches, it needs the hash value that matches the safe browsing database. This patch passes the hash value to ProcessChannel so Features can obtain the information and pass it. Note that it is possible that an URL may find multiple matches. If an URL matches hash A of list 1 and hash B of list 2, the parameter in ProcessChannel looks like: aList = [list 1, list2] aHashes = [hash A, hash B] Differential Revision: https://phabricator.services.mozilla.com/D28789 --HG-- extra : moz-landing-system : lando
190 lines
5.9 KiB
C++
190 lines
5.9 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "UrlClassifierFeatureFlash.h"
|
|
#include "mozilla/net/HttpBaseChannel.h"
|
|
#include "nsScriptSecurityManager.h"
|
|
#include "nsQueryObject.h"
|
|
|
|
namespace mozilla {
|
|
namespace net {
|
|
|
|
struct UrlClassifierFeatureFlash::FlashFeature {
|
|
const char* mName;
|
|
const char* mBlacklistPrefTables;
|
|
const char* mWhitelistPrefTables;
|
|
bool mSubdocumentOnly;
|
|
nsIHttpChannel::FlashPluginState mFlashPluginState;
|
|
RefPtr<UrlClassifierFeatureFlash> mFeature;
|
|
};
|
|
|
|
namespace {
|
|
|
|
static UrlClassifierFeatureFlash::FlashFeature sFlashFeaturesMap[] = {
|
|
{"flash-deny", "urlclassifier.flashTable", "urlclassifier.flashExceptTable",
|
|
false, nsIHttpChannel::FlashPluginDenied},
|
|
{"flash-allow", "urlclassifier.flashAllowTable",
|
|
"urlclassifier.flashAllowExceptTable", false,
|
|
nsIHttpChannel::FlashPluginAllowed},
|
|
{"flash-deny-subdoc", "urlclassifier.flashSubDocTable",
|
|
"urlclassifier.flashSubDocExceptTable", true,
|
|
nsIHttpChannel::FlashPluginDeniedInSubdocuments},
|
|
};
|
|
|
|
bool IsInitialized() { return !!sFlashFeaturesMap[0].mFeature; }
|
|
|
|
} // namespace
|
|
|
|
UrlClassifierFeatureFlash::UrlClassifierFeatureFlash(
|
|
const UrlClassifierFeatureFlash::FlashFeature& aFlashFeature)
|
|
: UrlClassifierFeatureBase(
|
|
nsDependentCString(aFlashFeature.mName),
|
|
nsDependentCString(aFlashFeature.mBlacklistPrefTables),
|
|
nsDependentCString(aFlashFeature.mWhitelistPrefTables),
|
|
EmptyCString(), // aPrefBlacklistHosts
|
|
EmptyCString(), // aPrefWhitelistHosts
|
|
EmptyCString(), // aPrefBlacklistTableName
|
|
EmptyCString(), // aPrefWhitelistTableName
|
|
EmptyCString()) // aPrefSkipHosts
|
|
,
|
|
mFlashPluginState(aFlashFeature.mFlashPluginState) {
|
|
static_assert(nsIHttpChannel::FlashPluginDeniedInSubdocuments ==
|
|
nsIHttpChannel::FlashPluginLastValue,
|
|
"nsIHttpChannel::FlashPluginLastValue is out-of-sync!");
|
|
}
|
|
|
|
/* static */
|
|
void UrlClassifierFeatureFlash::GetFeatureNames(nsTArray<nsCString>& aArray) {
|
|
for (const FlashFeature& flashFeature : sFlashFeaturesMap) {
|
|
aArray.AppendElement(nsDependentCString(flashFeature.mName));
|
|
}
|
|
}
|
|
|
|
/* static */
|
|
void UrlClassifierFeatureFlash::MaybeInitialize() {
|
|
MOZ_ASSERT(XRE_IsParentProcess());
|
|
|
|
if (IsInitialized()) {
|
|
return;
|
|
}
|
|
|
|
for (FlashFeature& flashFeature : sFlashFeaturesMap) {
|
|
MOZ_ASSERT(!flashFeature.mFeature);
|
|
flashFeature.mFeature = new UrlClassifierFeatureFlash(flashFeature);
|
|
flashFeature.mFeature->InitializePreferences();
|
|
}
|
|
}
|
|
|
|
/* static */
|
|
void UrlClassifierFeatureFlash::MaybeShutdown() {
|
|
if (!IsInitialized()) {
|
|
return;
|
|
}
|
|
|
|
for (FlashFeature& flashFeature : sFlashFeaturesMap) {
|
|
MOZ_ASSERT(flashFeature.mFeature);
|
|
flashFeature.mFeature->ShutdownPreferences();
|
|
flashFeature.mFeature = nullptr;
|
|
}
|
|
}
|
|
|
|
/* static */
|
|
void UrlClassifierFeatureFlash::MaybeCreate(
|
|
nsIChannel* aChannel,
|
|
nsTArray<nsCOMPtr<nsIUrlClassifierFeature>>& aFeatures) {
|
|
// All disabled.
|
|
if (!StaticPrefs::plugins_flashBlock_enabled()) {
|
|
return;
|
|
}
|
|
|
|
// We use Flash feature just for document loading.
|
|
nsCOMPtr<nsILoadInfo> loadInfo = aChannel->LoadInfo();
|
|
nsContentPolicyType contentPolicyType =
|
|
loadInfo->GetExternalContentPolicyType();
|
|
|
|
if (contentPolicyType != nsIContentPolicy::TYPE_DOCUMENT &&
|
|
contentPolicyType != nsIContentPolicy::TYPE_SUBDOCUMENT) {
|
|
return;
|
|
}
|
|
|
|
// Only allow plugins for documents from an HTTP/HTTPS origin.
|
|
if (StaticPrefs::plugins_http_https_only()) {
|
|
nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(aChannel);
|
|
if (!httpChannel) {
|
|
return;
|
|
}
|
|
}
|
|
|
|
MaybeInitialize();
|
|
|
|
for (const FlashFeature& flashFeature : sFlashFeaturesMap) {
|
|
MOZ_ASSERT(flashFeature.mFeature);
|
|
if (!flashFeature.mSubdocumentOnly ||
|
|
contentPolicyType == nsIContentPolicy::TYPE_SUBDOCUMENT) {
|
|
aFeatures.AppendElement(flashFeature.mFeature);
|
|
}
|
|
}
|
|
}
|
|
|
|
/* static */
|
|
already_AddRefed<nsIUrlClassifierFeature>
|
|
UrlClassifierFeatureFlash::GetIfNameMatches(const nsACString& aName) {
|
|
MaybeInitialize();
|
|
|
|
for (const FlashFeature& flashFeature : sFlashFeaturesMap) {
|
|
MOZ_ASSERT(flashFeature.mFeature);
|
|
if (aName.Equals(flashFeature.mName)) {
|
|
nsCOMPtr<nsIUrlClassifierFeature> self = flashFeature.mFeature.get();
|
|
return self.forget();
|
|
}
|
|
}
|
|
|
|
return nullptr;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
UrlClassifierFeatureFlash::ProcessChannel(nsIChannel* aChannel,
|
|
const nsTArray<nsCString>& aList,
|
|
const nsTArray<nsCString>& aHashes,
|
|
bool* aShouldContinue) {
|
|
NS_ENSURE_ARG_POINTER(aChannel);
|
|
NS_ENSURE_ARG_POINTER(aShouldContinue);
|
|
|
|
// This is not a blocking feature.
|
|
*aShouldContinue = true;
|
|
|
|
UC_LOG(("UrlClassifierFeatureFlash::ProcessChannel, annotating channel[%p]",
|
|
aChannel));
|
|
|
|
nsCOMPtr<nsIParentChannel> parentChannel;
|
|
NS_QueryNotificationCallbacks(aChannel, parentChannel);
|
|
if (parentChannel) {
|
|
// This channel is a parent-process proxy for a child process
|
|
// request. We should notify the child process as well.
|
|
parentChannel->NotifyFlashPluginStateChanged(mFlashPluginState);
|
|
}
|
|
|
|
RefPtr<HttpBaseChannel> httpChannel = do_QueryObject(aChannel);
|
|
if (httpChannel) {
|
|
httpChannel->SetFlashPluginState(mFlashPluginState);
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
UrlClassifierFeatureFlash::GetURIByListType(
|
|
nsIChannel* aChannel, nsIUrlClassifierFeature::listType aListType,
|
|
nsIURI** aURI) {
|
|
NS_ENSURE_ARG_POINTER(aChannel);
|
|
NS_ENSURE_ARG_POINTER(aURI);
|
|
|
|
// Here we return the channel's URI always.
|
|
return aChannel->GetURI(aURI);
|
|
}
|
|
|
|
} // namespace net
|
|
} // namespace mozilla
|