summaryrefslogtreecommitdiffstats
path: root/toolkit/components/search/SearchUtils.sys.mjs
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 19:33:14 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 19:33:14 +0000
commit36d22d82aa202bb199967e9512281e9a53db42c9 (patch)
tree105e8c98ddea1c1e4784a60a5a6410fa416be2de /toolkit/components/search/SearchUtils.sys.mjs
parentInitial commit. (diff)
downloadfirefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.tar.xz
firefox-esr-36d22d82aa202bb199967e9512281e9a53db42c9.zip
Adding upstream version 115.7.0esr.upstream/115.7.0esr
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'toolkit/components/search/SearchUtils.sys.mjs')
-rw-r--r--toolkit/components/search/SearchUtils.sys.mjs388
1 files changed, 388 insertions, 0 deletions
diff --git a/toolkit/components/search/SearchUtils.sys.mjs b/toolkit/components/search/SearchUtils.sys.mjs
new file mode 100644
index 0000000000..53fb84cb09
--- /dev/null
+++ b/toolkit/components/search/SearchUtils.sys.mjs
@@ -0,0 +1,388 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+/* eslint no-shadow: error, mozilla/no-aArgs: error */
+
+import { AppConstants } from "resource://gre/modules/AppConstants.sys.mjs";
+import { XPCOMUtils } from "resource://gre/modules/XPCOMUtils.sys.mjs";
+
+const lazy = {};
+
+XPCOMUtils.defineLazyGetter(lazy, "logConsole", () => {
+ return console.createInstance({
+ prefix: "SearchUtils",
+ maxLogLevel: SearchUtils.loggingEnabled ? "Debug" : "Warn",
+ });
+});
+
+const BROWSER_SEARCH_PREF = "browser.search.";
+
+/**
+ * Load listener
+ */
+class LoadListener {
+ _bytes = [];
+ _callback = null;
+ _channel = null;
+ _countRead = 0;
+ _expectedContentType = null;
+ _stream = null;
+ QueryInterface = ChromeUtils.generateQI([
+ Ci.nsIRequestObserver,
+ Ci.nsIStreamListener,
+ Ci.nsIChannelEventSink,
+ Ci.nsIInterfaceRequestor,
+ Ci.nsIProgressEventSink,
+ ]);
+
+ /**
+ * Constructor
+ *
+ * @param {nsIChannel} channel
+ * The initial channel to load from.
+ * @param {RegExp} expectedContentType
+ * A regular expression to match the expected content type to.
+ * @param {Function} callback
+ * A callback to receive the loaded data. The callback is passed the bytes
+ * (array) and the content type received. The bytes argument may be null if
+ * no data could be loaded.
+ */
+ constructor(channel, expectedContentType, callback) {
+ this._channel = channel;
+ this._callback = callback;
+ this._expectedContentType = expectedContentType;
+ }
+
+ // nsIRequestObserver
+ onStartRequest(request) {
+ lazy.logConsole.debug("loadListener: Starting request:", request.name);
+ this._stream = Cc["@mozilla.org/binaryinputstream;1"].createInstance(
+ Ci.nsIBinaryInputStream
+ );
+ }
+
+ onStopRequest(request, statusCode) {
+ lazy.logConsole.debug("loadListener: Stopping request:", request.name);
+
+ var requestFailed = !Components.isSuccessCode(statusCode);
+ if (!requestFailed && request instanceof Ci.nsIHttpChannel) {
+ requestFailed = !request.requestSucceeded;
+ }
+
+ if (requestFailed || this._countRead == 0) {
+ lazy.logConsole.warn("loadListener: request failed!");
+ // send null so the callback can deal with the failure
+ this._bytes = null;
+ } else if (!this._expectedContentType.test(this._channel.contentType)) {
+ lazy.logConsole.warn(
+ "loadListener: Content type does not match expected",
+ this._channel.contentType
+ );
+ this._bytes = null;
+ }
+ this._callback(this._bytes, this._bytes ? this._channel.contentType : "");
+ this._channel = null;
+ }
+
+ // nsIStreamListener
+ onDataAvailable(request, inputStream, offset, count) {
+ this._stream.setInputStream(inputStream);
+
+ // Get a byte array of the data
+ this._bytes = this._bytes.concat(this._stream.readByteArray(count));
+ this._countRead += count;
+ }
+
+ // nsIChannelEventSink
+ asyncOnChannelRedirect(oldChannel, newChannel, flags, callback) {
+ this._channel = newChannel;
+ callback.onRedirectVerifyCallback(Cr.NS_OK);
+ }
+
+ // nsIInterfaceRequestor
+ getInterface(iid) {
+ return this.QueryInterface(iid);
+ }
+
+ // nsIProgressEventSink
+ onProgress(request, progress, progressMax) {}
+ onStatus(request, status, statusArg) {}
+}
+
+export var SearchUtils = {
+ BROWSER_SEARCH_PREF,
+
+ SETTINGS_KEY: "search-config",
+
+ /**
+ * This is the Remote Settings key that we use to get the ignore lists for
+ * engines.
+ */
+ SETTINGS_IGNORELIST_KEY: "hijack-blocklists",
+
+ /**
+ * This is the Remote Settings key that we use to get the allow lists for
+ * overriding the default engines.
+ */
+ SETTINGS_ALLOWLIST_KEY: "search-default-override-allowlist",
+
+ /**
+ * Topic used for events involving the service itself.
+ */
+ TOPIC_SEARCH_SERVICE: "browser-search-service",
+
+ // See documentation in nsISearchService.idl.
+ TOPIC_ENGINE_MODIFIED: "browser-search-engine-modified",
+ MODIFIED_TYPE: {
+ CHANGED: "engine-changed",
+ LOADED: "engine-loaded",
+ REMOVED: "engine-removed",
+ ADDED: "engine-added",
+ DEFAULT: "engine-default",
+ DEFAULT_PRIVATE: "engine-default-private",
+ },
+
+ URL_TYPE: {
+ SUGGEST_JSON: "application/x-suggestions+json",
+ SEARCH: "text/html",
+ OPENSEARCH: "application/opensearchdescription+xml",
+ TRENDING_JSON: "application/x-trending+json",
+ },
+
+ ENGINES_URLS: {
+ "prod-main":
+ "https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/search-config/records",
+ "prod-preview":
+ "https://firefox.settings.services.mozilla.com/v1/buckets/main-preview/collections/search-config/records",
+ "stage-main":
+ "https://firefox.settings.services.allizom.org/v1/buckets/main/collections/search-config/records",
+ "stage-preview":
+ "https://firefox.settings.services.allizom.org/v1/buckets/main-preview/collections/search-config/records",
+ },
+
+ // The following constants are left undocumented in nsISearchService.idl
+ // For the moment, they are meant for testing/debugging purposes only.
+
+ // Set an arbitrary cap on the maximum icon size. Without this, large icons can
+ // cause big delays when loading them at startup.
+ MAX_ICON_SIZE: 20000,
+
+ DEFAULT_QUERY_CHARSET: "UTF-8",
+
+ // A tag to denote when we are using the "default_locale" of an engine.
+ DEFAULT_TAG: "default",
+
+ MOZ_PARAM: {
+ DATE: "moz:date",
+ LOCALE: "moz:locale",
+ },
+
+ // Query parameters can have the property "purpose", whose value
+ // indicates the context that initiated a search. This list contains
+ // defined search contexts.
+ PARAM_PURPOSES: {
+ CONTEXTMENU: "contextmenu",
+ HOMEPAGE: "homepage",
+ KEYWORD: "keyword",
+ NEWTAB: "newtab",
+ SEARCHBAR: "searchbar",
+ },
+
+ LoadListener,
+
+ // This is a list of search engines that we currently consider to be "General"
+ // search, as opposed to a vertical search engine such as one used for
+ // shopping, book search, etc.
+ //
+ // Currently these are a list of hard-coded application provided ones. At some
+ // point in the future we expect to allow WebExtensions to specify by themselves,
+ // however this needs more definition on the "vertical" search terms, and the
+ // effects before we enable it.
+ GENERAL_SEARCH_ENGINE_IDS: new Set([
+ "google@search.mozilla.org",
+ "ddg@search.mozilla.org",
+ "bing@search.mozilla.org",
+ "baidu@search.mozilla.org",
+ "ecosia@search.mozilla.org",
+ "qwant@search.mozilla.org",
+ "yahoo-jp@search.mozilla.org",
+ "yandex@search.mozilla.org",
+ ]),
+
+ /**
+ * Notifies watchers of SEARCH_ENGINE_TOPIC about changes to an engine or to
+ * the state of the search service.
+ *
+ * @param {nsISearchEngine} engine
+ * The engine to which the change applies.
+ * @param {string} verb
+ * A verb describing the change.
+ *
+ * @see nsISearchService.idl
+ */
+ notifyAction(engine, verb) {
+ if (Services.search.isInitialized) {
+ lazy.logConsole.debug("NOTIFY: Engine:", engine.name, "Verb:", verb);
+ Services.obs.notifyObservers(engine, this.TOPIC_ENGINE_MODIFIED, verb);
+ }
+ },
+
+ /**
+ * Wrapper function for nsIIOService::newURI.
+ *
+ * @param {string} urlSpec
+ * The URL string from which to create an nsIURI.
+ * @returns {nsIURI} an nsIURI object, or null if the creation of the URI failed.
+ */
+ makeURI(urlSpec) {
+ try {
+ return Services.io.newURI(urlSpec);
+ } catch (ex) {}
+
+ return null;
+ },
+
+ /**
+ * Wrapper function for nsIIOService::newChannel.
+ *
+ * @param {string|nsIURI} url
+ * The URL string from which to create an nsIChannel.
+ * @returns {nsIChannel}
+ * an nsIChannel object, or null if the url is invalid.
+ */
+ makeChannel(url) {
+ try {
+ let uri = typeof url == "string" ? Services.io.newURI(url) : url;
+ return Services.io.newChannelFromURI(
+ uri,
+ null /* loadingNode */,
+ Services.scriptSecurityManager.getSystemPrincipal(),
+ null /* triggeringPrincipal */,
+ Ci.nsILoadInfo.SEC_ALLOW_CROSS_ORIGIN_SEC_CONTEXT_IS_NULL,
+ Ci.nsIContentPolicy.TYPE_OTHER
+ );
+ } catch (ex) {}
+
+ return null;
+ },
+
+ /**
+ * Tests whether this a partner distribution.
+ *
+ * @returns {boolean}
+ * Whether this is a partner distribution.
+ */
+ isPartnerBuild() {
+ return SearchUtils.distroID && !SearchUtils.distroID.startsWith("mozilla");
+ },
+
+ /**
+ * Current settings version. This should be incremented if the format of the
+ * settings file is modified.
+ *
+ * @returns {number}
+ * The current settings version.
+ */
+ get SETTINGS_VERSION() {
+ return 8;
+ },
+
+ /**
+ * Indicates the channel that the build is on, with added hardening for ESR
+ * since some ESR builds may be self-built or not on the same channel.
+ *
+ * @returns {string}
+ * Returns the modified channel, with a focus on ESR if the application
+ * version is indicating ESR.
+ */
+ get MODIFIED_APP_CHANNEL() {
+ return AppConstants.IS_ESR ? "esr" : AppConstants.MOZ_UPDATE_CHANNEL;
+ },
+
+ /**
+ * Sanitizes a name so that it can be used as an engine name. If it cannot be
+ * sanitized (e.g. no valid characters), then it returns a random name.
+ *
+ * @param {string} name
+ * The name to be sanitized.
+ * @returns {string}
+ * The sanitized name.
+ */
+ sanitizeName(name) {
+ const maxLength = 60;
+ const minLength = 1;
+ var result = name.toLowerCase();
+ result = result.replace(/\s+/g, "-");
+ result = result.replace(/[^-a-z0-9]/g, "");
+
+ // Use a random name if our input had no valid characters.
+ if (result.length < minLength) {
+ result = Math.random().toString(36).replace(/^.*\./, "");
+ }
+
+ // Force max length.
+ return result.substring(0, maxLength);
+ },
+
+ getVerificationHash(name) {
+ let disclaimer =
+ "By modifying this file, I agree that I am doing so " +
+ "only within $appName itself, using official, user-driven search " +
+ "engine selection processes, and in a way which does not circumvent " +
+ "user consent. I acknowledge that any attempt to change this file " +
+ "from outside of $appName is a malicious act, and will be responded " +
+ "to accordingly.";
+
+ let salt =
+ PathUtils.filename(PathUtils.profileDir) +
+ name +
+ disclaimer.replace(/\$appName/g, Services.appinfo.name);
+
+ let data = new TextEncoder().encode(salt);
+ let hasher = Cc["@mozilla.org/security/hash;1"].createInstance(
+ Ci.nsICryptoHash
+ );
+ hasher.init(hasher.SHA256);
+ hasher.update(data, data.length);
+
+ return hasher.finish(true);
+ },
+
+ /**
+ * Tests whether the given URI is a secure OpenSearch submission URI or a
+ * secure OpenSearch update URI.
+ *
+ * Note: We don't want to count something served via localhost as insecure.
+ * We also don't want to count sites with .onion as their top-level domain
+ * as insecure because .onion URLs actually can't use https and are secured
+ * in other ways.
+ *
+ * @param {nsIURI} uri
+ * The URI to be tested.
+ * @returns {boolean}
+ * Whether the URI is secure for OpenSearch purposes.
+ */
+ isSecureURIForOpenSearch(uri) {
+ const loopbackAddresses = ["127.0.0.1", "[::1]", "localhost"];
+
+ return (
+ uri.schemeIs("https") ||
+ loopbackAddresses.includes(uri.host) ||
+ uri.host.toLowerCase().endsWith(".onion")
+ );
+ },
+};
+
+XPCOMUtils.defineLazyPreferenceGetter(
+ SearchUtils,
+ "loggingEnabled",
+ BROWSER_SEARCH_PREF + "log",
+ false
+);
+
+// Can't use defineLazyPreferenceGetter because we want the value
+// from the default branch
+XPCOMUtils.defineLazyGetter(SearchUtils, "distroID", () => {
+ return Services.prefs.getDefaultBranch("distribution.").getCharPref("id", "");
+});