summaryrefslogtreecommitdiffstats
path: root/browser/actors/BlockedSiteChild.sys.mjs
diff options
context:
space:
mode:
Diffstat (limited to 'browser/actors/BlockedSiteChild.sys.mjs')
-rw-r--r--browser/actors/BlockedSiteChild.sys.mjs187
1 files changed, 187 insertions, 0 deletions
diff --git a/browser/actors/BlockedSiteChild.sys.mjs b/browser/actors/BlockedSiteChild.sys.mjs
new file mode 100644
index 0000000000..cbe37c8688
--- /dev/null
+++ b/browser/actors/BlockedSiteChild.sys.mjs
@@ -0,0 +1,187 @@
+/* -*- indent-tabs-mode: nil; js-indent-level: 2 -*- */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+const lazy = {};
+
+ChromeUtils.defineESModuleGetters(lazy, {
+ SafeBrowsing: "resource://gre/modules/SafeBrowsing.sys.mjs",
+});
+
+function getSiteBlockedErrorDetails(docShell) {
+ let blockedInfo = {};
+ if (docShell.failedChannel) {
+ let classifiedChannel = docShell.failedChannel.QueryInterface(
+ Ci.nsIClassifiedChannel
+ );
+ if (classifiedChannel) {
+ let httpChannel = docShell.failedChannel.QueryInterface(
+ Ci.nsIHttpChannel
+ );
+
+ let reportUri = httpChannel.URI;
+
+ // Remove the query to avoid leaking sensitive data
+ if (reportUri instanceof Ci.nsIURL) {
+ reportUri = reportUri.mutate().setQuery("").finalize();
+ }
+
+ let triggeringPrincipal = docShell.failedChannel.loadInfo
+ ? docShell.failedChannel.loadInfo.triggeringPrincipal
+ : null;
+ blockedInfo = {
+ list: classifiedChannel.matchedList,
+ triggeringPrincipal,
+ provider: classifiedChannel.matchedProvider,
+ uri: reportUri.asciiSpec,
+ };
+ }
+ }
+ return blockedInfo;
+}
+
+export class BlockedSiteChild extends JSWindowActorChild {
+ receiveMessage(msg) {
+ if (msg.name == "DeceptiveBlockedDetails") {
+ return getSiteBlockedErrorDetails(this.docShell);
+ }
+ return null;
+ }
+
+ handleEvent(event) {
+ if (event.type == "AboutBlockedLoaded") {
+ this.onAboutBlockedLoaded(event);
+ } else if (event.type == "click" && event.button == 0) {
+ this.onClick(event);
+ }
+ }
+
+ onAboutBlockedLoaded(aEvent) {
+ let content = aEvent.target.ownerGlobal;
+
+ let blockedInfo = getSiteBlockedErrorDetails(this.docShell);
+ let provider = blockedInfo.provider || "";
+
+ let doc = content.document;
+
+ /**
+ * Set error description link in error details.
+ * For example, the "reported as a deceptive site" link for
+ * blocked phishing pages.
+ */
+ let desc = Services.prefs.getCharPref(
+ "browser.safebrowsing.provider." + provider + ".reportURL",
+ ""
+ );
+ if (desc) {
+ doc
+ .getElementById("error_desc_link")
+ .setAttribute("href", desc + encodeURIComponent(aEvent.detail.url));
+ }
+
+ // Set other links in error details.
+ switch (aEvent.detail.err) {
+ case "malware":
+ doc
+ .getElementById("report_detection")
+ .setAttribute(
+ "href",
+ lazy.SafeBrowsing.getReportURL("MalwareMistake", blockedInfo)
+ );
+ break;
+ case "unwanted":
+ doc
+ .getElementById("learn_more_link")
+ .setAttribute(
+ "href",
+ "https://www.google.com/about/unwanted-software-policy.html"
+ );
+ break;
+ case "phishing":
+ doc
+ .getElementById("report_detection")
+ .setAttribute(
+ "href",
+ lazy.SafeBrowsing.getReportURL("PhishMistake", blockedInfo) ||
+ "https://safebrowsing.google.com/safebrowsing/report_error/?tpl=mozilla"
+ );
+ doc
+ .getElementById("learn_more_link")
+ .setAttribute("href", "https://www.antiphishing.org//");
+ break;
+ }
+
+ // Set the firefox support url.
+ doc
+ .getElementById("firefox_support")
+ .setAttribute(
+ "href",
+ Services.urlFormatter.formatURLPref("app.support.baseURL") +
+ "phishing-malware"
+ );
+
+ // Show safe browsing details on load if the pref is set to true.
+ let showDetails = Services.prefs.getBoolPref(
+ "browser.xul.error_pages.show_safe_browsing_details_on_load"
+ );
+ if (showDetails) {
+ let details = content.document.getElementById(
+ "errorDescriptionContainer"
+ );
+ details.removeAttribute("hidden");
+ }
+
+ // Set safe browsing advisory link.
+ let advisoryUrl = Services.prefs.getCharPref(
+ "browser.safebrowsing.provider." + provider + ".advisoryURL",
+ ""
+ );
+ let advisoryDesc = content.document.getElementById("advisoryDescText");
+ if (!advisoryUrl) {
+ advisoryDesc.remove();
+ return;
+ }
+
+ let advisoryLinkText = Services.prefs.getCharPref(
+ "browser.safebrowsing.provider." + provider + ".advisoryName",
+ ""
+ );
+ if (!advisoryLinkText) {
+ advisoryDesc.remove();
+ return;
+ }
+
+ content.document.l10n.setAttributes(
+ advisoryDesc,
+ "safeb-palm-advisory-desc",
+ { advisoryname: advisoryLinkText }
+ );
+ content.document
+ .getElementById("advisory_provider")
+ .setAttribute("href", advisoryUrl);
+ }
+
+ onClick(event) {
+ let ownerDoc = event.target.ownerDocument;
+ if (!ownerDoc) {
+ return;
+ }
+
+ var reason = "phishing";
+ if (/e=malwareBlocked/.test(ownerDoc.documentURI)) {
+ reason = "malware";
+ } else if (/e=unwantedBlocked/.test(ownerDoc.documentURI)) {
+ reason = "unwanted";
+ } else if (/e=harmfulBlocked/.test(ownerDoc.documentURI)) {
+ reason = "harmful";
+ }
+
+ this.sendAsyncMessage("Browser:SiteBlockedError", {
+ location: ownerDoc.location.href,
+ reason,
+ elementId: event.target.getAttribute("id"),
+ blockedInfo: getSiteBlockedErrorDetails(this.docShell),
+ });
+ }
+}