summaryrefslogtreecommitdiffstats
path: root/src/js/storage.js
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 16:55:34 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-07 16:55:34 +0000
commit75417f5e3d32645859d94cec82255dc130ec4a2e (patch)
tree5fd46925c6b4a881c9208772ed8e5cc0588bc164 /src/js/storage.js
parentInitial commit. (diff)
downloadprivacybadger-75417f5e3d32645859d94cec82255dc130ec4a2e.tar.xz
privacybadger-75417f5e3d32645859d94cec82255dc130ec4a2e.zip
Adding upstream version 2020.10.7.upstream/2020.10.7upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to '')
-rw-r--r--src/js/storage.js707
1 files changed, 707 insertions, 0 deletions
diff --git a/src/js/storage.js b/src/js/storage.js
new file mode 100644
index 0000000..9074a41
--- /dev/null
+++ b/src/js/storage.js
@@ -0,0 +1,707 @@
+/*
+ * This file is part of Privacy Badger <https://www.eff.org/privacybadger>
+ * Copyright (C) 2014 Electronic Frontier Foundation
+ *
+ * Privacy Badger is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 3 as
+ * published by the Free Software Foundation.
+ *
+ * Privacy Badger is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with Privacy Badger. If not, see <http://www.gnu.org/licenses/>.
+ */
+
+/* globals badger:false, log:false */
+
+var constants = require("constants");
+var utils = require("utils");
+
+require.scopes.storage = (function() {
+
+
+/**
+ * # Storage Objects
+ *
+ * snitch_map is our collection of potential tracking base_domains.
+ * The key is a base domain (ETLD+1) and the value is an array of first
+ * party domains on which this tracker has been seen.
+ * it looks like this:
+ * {
+ * "third-party.com": ["a.com", "b.com", "c.com"],
+ * "eviltracker.net": ["eff.org", "a.com"]
+ * }
+ *
+ * action_map is where we store the action for each domain that we have
+ * decided on an action for. Each subdomain gets its own entry. For example:
+ * {
+ * "google.com": { heuristicAction: "block", dnt: false, userAction: ""}
+ * "fonts.google.com": { heuristicAction: "cookieblock", dnt: false, userAction: ""}
+ * "apis.google.com": { heuristicAction: "cookieblock", dnt: false, userAction: "user_block"}
+ * "widget.eff.org": { heuristicAction: "block", dnt: true, userAction: ""}
+ * }
+ *
+ * cookieblock_list is where we store the current yellowlist as
+ * downloaded from eff.org. The keys are the domains which should be "cookieblocked".
+ * The values are simply 'true'. For example:
+ * {
+ * "maps.google.com": true,
+ * "creativecommons.org": true,
+ * }
+ *
+ */
+
+function BadgerPen(callback) {
+ let self = this;
+
+ if (!callback) {
+ callback = function () {};
+ }
+
+ // initialize from extension local storage
+ chrome.storage.local.get(self.KEYS, function (store) {
+ self.KEYS.forEach(key => {
+ if (store.hasOwnProperty(key)) {
+ self[key] = new BadgerStorage(key, store[key]);
+ } else {
+ let storageObj = new BadgerStorage(key, {});
+ self[key] = storageObj;
+ _syncStorage(storageObj);
+ }
+ });
+
+ if (!chrome.storage.managed) {
+ callback(self);
+ return;
+ }
+
+ // see if we have any enterprise/admin/group policy overrides
+ chrome.storage.managed.get(null, function (managedStore) {
+ if (chrome.runtime.lastError) {
+ // ignore "Managed storage manifest not found" errors in Firefox
+ }
+
+ if (_.isObject(managedStore)) {
+ let settings = {};
+ for (let key in badger.defaultSettings) {
+ if (managedStore.hasOwnProperty(key)) {
+ settings[key] = managedStore[key];
+ }
+ }
+ self.settings_map.merge(settings);
+ }
+
+ callback(self);
+ });
+ });
+}
+
+BadgerPen.prototype = {
+ KEYS: [
+ "snitch_map",
+ "action_map",
+ "cookieblock_list",
+ "dnt_hashes",
+ "settings_map",
+ "private_storage", // misc. utility settings, not for export
+ ],
+
+ getStore: function (key) {
+ if (this.hasOwnProperty(key)) {
+ return this[key];
+ }
+ console.error("Can't initialize cache from getStore. You are using this API improperly");
+ },
+
+ /**
+ * Reset the snitch map and action map, forgetting all data the badger has
+ * learned from browsing.
+ */
+ clearTrackerData: function () {
+ let self = this;
+ ['snitch_map', 'action_map'].forEach(key => {
+ self.getStore(key).updateObject({});
+ });
+ },
+
+ /**
+ * Get the current presumed action for a specific fully qualified domain name (FQDN),
+ * ignoring any rules for subdomains below or above it
+ *
+ * @param {(Object|String)} domain domain object from action_map
+ * @param {Boolean} [ignoreDNT] whether to ignore DNT status
+ * @returns {String} the presumed action for this FQDN
+ */
+ getAction: function (domain, ignoreDNT) {
+ if (!badger.isCheckingDNTPolicyEnabled()) {
+ ignoreDNT = true;
+ }
+
+ if (_.isString(domain)) {
+ domain = this.getStore('action_map').getItem(domain) || {};
+ }
+ if (domain.userAction) { return domain.userAction; }
+ if (domain.dnt && !ignoreDNT) { return constants.DNT; }
+ if (domain.heuristicAction) { return domain.heuristicAction; }
+ return constants.NO_TRACKING;
+ },
+
+ touchDNTRecheckTime: function(domain, time) {
+ this._setupDomainAction(domain, time, "nextUpdateTime");
+ },
+
+ getNextUpdateForDomain: function(domain) {
+ var action_map = this.getStore('action_map');
+ if (action_map.hasItem(domain)) {
+ return action_map.getItem(domain).nextUpdateTime;
+ } else {
+ return 0;
+ }
+ },
+
+ /**
+ * Updates the yellowlist to the provided array of domains.
+ *
+ * For each added domain, sets it to be cookieblocked
+ * if its parent domain is set to be blocked.
+ *
+ * @param {Array} newDomains domains to use for the new yellowlist
+ */
+ updateYellowlist: function (newDomains) {
+ let self = this,
+ actionMap = self.getStore('action_map'),
+ ylistStorage = self.getStore('cookieblock_list'),
+ oldDomains = ylistStorage.keys();
+
+ let addedDomains = _.difference(newDomains, oldDomains),
+ removedDomains = _.difference(oldDomains, newDomains);
+
+ log('removing from cookie blocklist:', removedDomains);
+ removedDomains.forEach(function (domain) {
+ ylistStorage.deleteItem(domain);
+
+ const base = window.getBaseDomain(domain);
+ // "subdomains" include the domain itself
+ for (const subdomain of actionMap.keys()) {
+ if (window.getBaseDomain(subdomain) == base) {
+ if (self.getAction(subdomain) != constants.NO_TRACKING) {
+ badger.heuristicBlocking.blocklistOrigin(base, subdomain);
+ }
+ }
+ }
+ });
+
+ log('adding to cookie blocklist:', addedDomains);
+ addedDomains.forEach(function (domain) {
+ ylistStorage.setItem(domain, true);
+
+ const base = window.getBaseDomain(domain);
+ if (actionMap.hasItem(base)) {
+ const action = actionMap.getItem(base).heuristicAction;
+ // if the domain's base domain is marked for blocking
+ if (action == constants.BLOCK || action == constants.COOKIEBLOCK) {
+ // cookieblock the domain
+ self.setupHeuristicAction(domain, constants.COOKIEBLOCK);
+ }
+ }
+ });
+ },
+
+ /**
+ * Update DNT policy hashes
+ */
+ updateDntHashes: function (hashes) {
+ var dnt_hashes = this.getStore('dnt_hashes');
+ dnt_hashes.updateObject(_.invert(hashes));
+ },
+
+ /**
+ * Looks up whether an FQDN would get cookieblocked,
+ * ignoring user overrides and the FQDN's current status.
+ *
+ * @param {String} fqdn the FQDN we want to look up
+ *
+ * @return {Boolean}
+ */
+ wouldGetCookieblocked: function (fqdn) {
+ // cookieblock if a "parent" domain of the fqdn is on the yellowlist
+ let set = false,
+ ylistStorage = this.getStore('cookieblock_list'),
+ // ignore base domains when exploding to work around PSL TLDs:
+ // still want to cookieblock somedomain.googleapis.com with only
+ // googleapis.com (and not somedomain.googleapis.com itself) on the ylist
+ subdomains = utils.explodeSubdomains(fqdn, true);
+
+ for (let i = 0; i < subdomains.length; i++) {
+ if (ylistStorage.hasItem(subdomains[i])) {
+ set = true;
+ break;
+ }
+ }
+
+ return set;
+ },
+
+ /**
+ * Find the best action to take for an FQDN, assuming it is third party and
+ * Privacy Badger is enabled. Traverse the action list for the FQDN and each
+ * of its subdomains and then takes the most appropriate action
+ *
+ * @param {String} fqdn the FQDN we want to determine the action for
+ * @returns {String} the best action for the FQDN
+ */
+ getBestAction: function (fqdn) {
+ let best_action = constants.NO_TRACKING;
+ let subdomains = utils.explodeSubdomains(fqdn);
+ let action_map = this.getStore('action_map');
+
+ function getScore(action) {
+ switch (action) {
+ case constants.NO_TRACKING:
+ return 0;
+ case constants.ALLOW:
+ return 1;
+ case constants.BLOCK:
+ return 2;
+ case constants.COOKIEBLOCK:
+ return 3;
+ case constants.DNT:
+ return 4;
+ case constants.USER_ALLOW:
+ case constants.USER_BLOCK:
+ case constants.USER_COOKIEBLOCK:
+ return 5;
+ }
+ }
+
+ // Loop through each subdomain we have a rule for
+ // from least (base domain) to most (FQDN) specific
+ // and keep the one which has the best score.
+ for (let i = subdomains.length; i >= 0; i--) {
+ let domain = subdomains[i];
+ if (action_map.hasItem(domain)) {
+ let action = this.getAction(
+ action_map.getItem(domain),
+ // ignore DNT unless it's directly on the FQDN being checked
+ domain != fqdn
+ );
+ if (getScore(action) >= getScore(best_action)) {
+ best_action = action;
+ }
+ }
+ }
+
+ return best_action;
+ },
+
+ /**
+ * Find every domain in the action_map where the presumed action would be {selector}
+ *
+ * @param {String} selector the action to select by
+ * @return {Array} an array of FQDN strings
+ */
+ getAllDomainsByPresumedAction: function (selector) {
+ var action_map = this.getStore('action_map');
+ var relevantDomains = [];
+ for (var domain in action_map.getItemClones()) {
+ if (selector == this.getAction(domain)) {
+ relevantDomains.push(domain);
+ }
+ }
+ return relevantDomains;
+ },
+
+ /**
+ * Get all tracking domains from action_map.
+ *
+ * @return {Object} An object with domains as keys and actions as values.
+ */
+ getTrackingDomains: function () {
+ let action_map = this.getStore('action_map');
+ let origins = {};
+
+ for (let domain in action_map.getItemClones()) {
+ let action = badger.storage.getBestAction(domain);
+ if (action != constants.NO_TRACKING) {
+ origins[domain] = action;
+ }
+ }
+
+ return origins;
+ },
+
+ /**
+ * Set up an action for a domain of the given action type in action_map
+ *
+ * @param {String} domain the domain to set the action for
+ * @param {String} action the action to take e.g. BLOCK || COOKIEBLOCK || DNT
+ * @param {String} actionType the type of action we are setting, one of "userAction", "heuristicAction", "dnt"
+ * @private
+ */
+ _setupDomainAction: function (domain, action, actionType) {
+ let msg = "action_map['%s'].%s = %s",
+ action_map = this.getStore("action_map"),
+ actionObj = {};
+
+ if (action_map.hasItem(domain)) {
+ actionObj = action_map.getItem(domain);
+ msg = "Updating " + msg;
+ } else {
+ actionObj = _newActionMapObject();
+ msg = "Initializing " + msg;
+ }
+ actionObj[actionType] = action;
+
+ if (window.DEBUG) { // to avoid needless JSON.stringify calls
+ log(msg, domain, actionType, JSON.stringify(action));
+ }
+ action_map.setItem(domain, actionObj);
+ },
+
+ /**
+ * Add a heuristic action for a domain
+ *
+ * @param {String} domain Domain to add
+ * @param {String} action The heuristic action to take
+ */
+ setupHeuristicAction: function(domain, action) {
+ this._setupDomainAction(domain, action, "heuristicAction");
+ },
+
+ /**
+ * Set up a domain for DNT
+ *
+ * @param {String} domain Domain to add
+ */
+ setupDNT: function(domain) {
+ this._setupDomainAction(domain, true, "dnt");
+ },
+
+ /**
+ * Remove DNT setting from a domain*
+ * @param {String} domain FQDN string
+ */
+ revertDNT: function(domain) {
+ this._setupDomainAction(domain, false, "dnt");
+ },
+
+ /**
+ * Add a heuristic action for a domain
+ *
+ * @param {String} domain Domain to add
+ * @param {String} action The heuristic action to take
+ */
+ setupUserAction: function(domain, action) {
+ this._setupDomainAction(domain, action, "userAction");
+ },
+
+ /**
+ * Remove user set action from a domain
+ * @param {String} domain FQDN string
+ */
+ revertUserAction: function(domain) {
+ this._setupDomainAction(domain, "", "userAction");
+
+ // if Privacy Badger never recorded tracking for this domain,
+ // remove the domain's entry from Privacy Badger's database
+ const actionMap = this.getStore("action_map");
+ if (actionMap.getItem(domain).heuristicAction == "") {
+ log("Removing %s from action_map", domain);
+ actionMap.deleteItem(domain);
+ }
+ },
+
+ /**
+ * Removes a base domain and its subdomains from snitch and action maps.
+ * Preserves action map entries with user overrides.
+ *
+ * @param {String} base_domain
+ */
+ forget: function (base_domain) {
+ let self = this,
+ dot_base = '.' + base_domain,
+ actionMap = self.getStore('action_map'),
+ actions = actionMap.getItemClones(),
+ snitchMap = self.getStore('snitch_map');
+
+ if (snitchMap.getItem(base_domain)) {
+ log("Removing %s from snitch_map", base_domain);
+ badger.storage.getStore("snitch_map").deleteItem(base_domain);
+ }
+
+ for (let domain in actions) {
+ if (domain == base_domain || domain.endsWith(dot_base)) {
+ if (actions[domain].userAction == "") {
+ log("Removing %s from action_map", domain);
+ actionMap.deleteItem(domain);
+ }
+ }
+ }
+ }
+};
+
+/**
+ * @returns {{userAction: null, dnt: null, heuristicAction: null}}
+ * @private
+ */
+var _newActionMapObject = function() {
+ return {
+ userAction: "",
+ dnt: false,
+ heuristicAction: "",
+ nextUpdateTime: 0
+ };
+};
+
+/**
+ * Privacy Badger Storage Object. Has methods for getting, setting and deleting
+ * should be used for all storage needs, transparently handles data presistence
+ * syncing and private browsing.
+ * Usage:
+ * example_map = getStore('example_map');
+ * # instance of BadgerStorage
+ * example_map.setItem('foo', 'bar')
+ * # null
+ * example_map
+ * # { foo: "bar" }
+ * example_map.hasItem('foo')
+ * # true
+ * example_map.getItem('foo');
+ * # 'bar'
+ * example_map.getItem('not_real');
+ * # undefined
+ * example_map.deleteItem('foo');
+ * # null
+ * example_map.hasItem('foo');
+ * # false
+ *
+ */
+
+/**
+ * BadgerStorage constructor
+ * *DO NOT USE DIRECTLY* Instead call `getStore(name)`
+ * @param {String} name - the name of the storage object
+ * @param {Object} seed - the base object which we are instantiating from
+ */
+var BadgerStorage = function(name, seed) {
+ this.name = name;
+ this._store = seed;
+};
+
+BadgerStorage.prototype = {
+ /**
+ * Check if this storage object has an item
+ *
+ * @param {String} key - the key for the item
+ * @return {Boolean}
+ */
+ hasItem: function(key) {
+ var self = this;
+ return self._store.hasOwnProperty(key);
+ },
+
+ /**
+ * Get an item
+ *
+ * @param {String} key - the key for the item
+ * @return {?*} the value for that key or null
+ */
+ getItem: function(key) {
+ var self = this;
+ if (self.hasItem(key)) {
+ return self._store[key];
+ } else {
+ return null;
+ }
+ },
+
+ /**
+ * Get all items in the object as a copy
+ *
+ * @return {*} the items in badgerObject
+ */
+ getItemClones: function() {
+ var self = this;
+ return JSON.parse(JSON.stringify(self._store));
+ },
+
+ /**
+ * Set an item
+ *
+ * @param {String} key - the key for the item
+ * @param {*} value - the new value
+ */
+ setItem: function(key,value) {
+ var self = this;
+ self._store[key] = value;
+ // Async call to syncStorage.
+ setTimeout(function() {
+ _syncStorage(self);
+ }, 0);
+ },
+
+ /**
+ * Delete an item
+ *
+ * @param {String} key - the key for the item
+ */
+ deleteItem: function(key) {
+ var self = this;
+ delete self._store[key];
+ // Async call to syncStorage.
+ setTimeout(function() {
+ _syncStorage(self);
+ }, 0);
+ },
+
+ /**
+ * Update the entire object that this instance is storing
+ */
+ updateObject: function(object) {
+ var self = this;
+ self._store = object;
+ // Async call to syncStorage.
+ setTimeout(function() {
+ _syncStorage(self);
+ }, 0);
+ },
+
+ /**
+ * @returns {Array} this storage object's store keys
+ */
+ keys: function () {
+ return Object.keys(this._store);
+ },
+
+ /**
+ * When a user imports a tracker and settings list via the Import function,
+ * we want to overwrite any existing settings, while simultaneously merging
+ * in any new information (i.e. the list of disabled site domains). In order
+ * to do this, we need different logic for each of the storage maps based on
+ * their internal structure. The three cases in this function handle each of
+ * the three storage maps that can be exported.
+ *
+ * @param {Object} mapData The object containing storage map data to merge
+ */
+ merge: function (mapData) {
+ const self = this;
+
+ if (self.name == "settings_map") {
+ for (let prop in mapData) {
+ // combine array settings via intersection/union
+ if (prop == "disabledSites" || prop == "widgetReplacementExceptions") {
+ self._store[prop] = _.union(self._store[prop], mapData[prop]);
+
+ // string/array map
+ } else if (prop == "widgetSiteAllowlist") {
+ // for every site host in the import
+ for (let site in mapData[prop]) {
+ // combine exception arrays
+ self._store[prop][site] = _.union(
+ self._store[prop][site],
+ mapData[prop][site]
+ );
+ }
+
+ // default: overwrite existing setting with setting from import
+ } else {
+ if (prop != "isFirstRun") {
+ self._store[prop] = mapData[prop];
+ }
+ }
+ }
+
+ } else if (self.name == "action_map") {
+ for (let domain in mapData) {
+ let action = mapData[domain];
+
+ // Copy over any user settings from the merged-in data
+ if (action.userAction) {
+ if (self._store.hasOwnProperty(domain)) {
+ self._store[domain].userAction = action.userAction;
+ } else {
+ self._store[domain] = Object.assign(_newActionMapObject(), action);
+ }
+ }
+
+ // handle Do Not Track
+ if (self._store.hasOwnProperty(domain)) {
+ // Merge DNT settings if the imported data has a more recent update
+ if (action.nextUpdateTime > self._store[domain].nextUpdateTime) {
+ self._store[domain].nextUpdateTime = action.nextUpdateTime;
+ self._store[domain].dnt = action.dnt;
+ }
+ } else {
+ // Import action map entries for new DNT-compliant domains
+ if (action.dnt) {
+ self._store[domain] = Object.assign(_newActionMapObject(), action);
+ }
+ }
+ }
+
+ } else if (self.name == "snitch_map") {
+ for (let tracker_origin in mapData) {
+ let firstPartyOrigins = mapData[tracker_origin];
+ for (let i = 0; i < firstPartyOrigins.length; i++) {
+ badger.heuristicBlocking.updateTrackerPrevalence(
+ tracker_origin,
+ tracker_origin,
+ firstPartyOrigins[i]
+ );
+ }
+ }
+ }
+
+ // Async call to syncStorage.
+ setTimeout(function () {
+ _syncStorage(self);
+ }, 0);
+ }
+};
+
+var _syncStorage = (function () {
+ var debouncedFuncs = {};
+
+ function cb() {
+ if (chrome.runtime.lastError) {
+ let err = chrome.runtime.lastError.message;
+ if (!err.startsWith("IO error:") && !err.startsWith("Corruption:")
+ && !err.startsWith("InvalidStateError:") && !err.startsWith("AbortError:")
+ && !err.startsWith("QuotaExceededError:")
+ ) {
+ badger.criticalError = err;
+ }
+ console.error("Error writing to chrome.storage.local:", err);
+ }
+ }
+
+ function sync(badgerStorage) {
+ var obj = {};
+ obj[badgerStorage.name] = badgerStorage._store;
+ chrome.storage.local.set(obj, cb);
+ }
+
+ // Creates debounced versions of "sync" function,
+ // one for each distinct badgerStorage value.
+ return function (badgerStorage) {
+ if (!debouncedFuncs.hasOwnProperty(badgerStorage.name)) {
+ // call sync at most once every two seconds
+ debouncedFuncs[badgerStorage.name] = _.debounce(function () {
+ sync(badgerStorage);
+ }, 2000);
+ }
+ debouncedFuncs[badgerStorage.name]();
+ };
+}());
+
+/************************************** exports */
+var exports = {};
+
+exports.BadgerPen = BadgerPen;
+
+return exports;
+/************************************** exports */
+}());