mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-10-22 01:35:35 +00:00
daa17adb9e
In origin telemetry, we want to record the matching statistic of each entry in our tracking tables. To identify which entry a given URL matches, it needs the hash value that matches the safe browsing database. This patch passes the hash value to ProcessChannel so Features can obtain the information and pass it. Note that it is possible that an URL may find multiple matches. If an URL matches hash A of list 1 and hash B of list 2, the parameter in ProcessChannel looks like: aList = [list 1, list2] aHashes = [hash A, hash B] Differential Revision: https://phabricator.services.mozilla.com/D28789 --HG-- extra : moz-landing-system : lando
127 lines
3.9 KiB
C++
127 lines
3.9 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "UrlClassifierFeaturePhishingProtection.h"
|
|
|
|
namespace mozilla {
|
|
namespace net {
|
|
|
|
struct UrlClassifierFeaturePhishingProtection::PhishingProtectionFeature {
|
|
const char* mName;
|
|
const char* mBlacklistPrefTables;
|
|
bool (*mPref)();
|
|
|
|
RefPtr<UrlClassifierFeaturePhishingProtection> mFeature;
|
|
};
|
|
|
|
namespace {
|
|
|
|
struct UrlClassifierFeaturePhishingProtection::PhishingProtectionFeature
|
|
sPhishingProtectionFeaturesMap[] = {
|
|
{"malware", "urlclassifier.malwareTable",
|
|
StaticPrefs::browser_safebrowsing_malware_enabled},
|
|
{"phishing", "urlclassifier.phishTable",
|
|
StaticPrefs::browser_safebrowsing_phishing_enabled},
|
|
{"blockedURIs", "urlclassifier.blockedTable",
|
|
StaticPrefs::browser_safebrowsing_blockedURIs_enabled},
|
|
};
|
|
|
|
} // namespace
|
|
|
|
UrlClassifierFeaturePhishingProtection::UrlClassifierFeaturePhishingProtection(
|
|
const UrlClassifierFeaturePhishingProtection::PhishingProtectionFeature&
|
|
aFeature)
|
|
: UrlClassifierFeatureBase(
|
|
nsDependentCString(aFeature.mName),
|
|
nsDependentCString(aFeature.mBlacklistPrefTables),
|
|
EmptyCString(), // aPrefWhitelistPrefTbles,
|
|
EmptyCString(), // aPrefBlacklistHosts
|
|
EmptyCString(), // aPrefWhitelistHosts
|
|
EmptyCString(), // aPrefBlacklistTableName
|
|
EmptyCString(), // aPrefWhitelistTableName
|
|
EmptyCString()) { // aPrefSkipHosts
|
|
}
|
|
|
|
/* static */
|
|
void UrlClassifierFeaturePhishingProtection::GetFeatureNames(
|
|
nsTArray<nsCString>& aArray) {
|
|
for (const PhishingProtectionFeature& feature :
|
|
sPhishingProtectionFeaturesMap) {
|
|
if (feature.mPref()) {
|
|
aArray.AppendElement(nsDependentCString(feature.mName));
|
|
}
|
|
}
|
|
}
|
|
|
|
/* static */
|
|
void UrlClassifierFeaturePhishingProtection::MaybeInitialize() {
|
|
for (PhishingProtectionFeature& feature : sPhishingProtectionFeaturesMap) {
|
|
if (!feature.mFeature && feature.mPref()) {
|
|
feature.mFeature = new UrlClassifierFeaturePhishingProtection(feature);
|
|
feature.mFeature->InitializePreferences();
|
|
}
|
|
}
|
|
}
|
|
|
|
/* static */
|
|
void UrlClassifierFeaturePhishingProtection::MaybeShutdown() {
|
|
for (PhishingProtectionFeature& feature : sPhishingProtectionFeaturesMap) {
|
|
if (feature.mFeature) {
|
|
feature.mFeature->ShutdownPreferences();
|
|
feature.mFeature = nullptr;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* static */
|
|
void UrlClassifierFeaturePhishingProtection::MaybeCreate(
|
|
nsTArray<RefPtr<nsIUrlClassifierFeature>>& aFeatures) {
|
|
MaybeInitialize();
|
|
|
|
for (const PhishingProtectionFeature& feature :
|
|
sPhishingProtectionFeaturesMap) {
|
|
if (feature.mPref()) {
|
|
MOZ_ASSERT(feature.mFeature);
|
|
aFeatures.AppendElement(feature.mFeature);
|
|
}
|
|
}
|
|
}
|
|
|
|
/* static */
|
|
already_AddRefed<nsIUrlClassifierFeature>
|
|
UrlClassifierFeaturePhishingProtection::GetIfNameMatches(
|
|
const nsACString& aName) {
|
|
MaybeInitialize();
|
|
|
|
for (const PhishingProtectionFeature& feature :
|
|
sPhishingProtectionFeaturesMap) {
|
|
if (feature.mPref() && aName.Equals(feature.mName)) {
|
|
MOZ_ASSERT(feature.mFeature);
|
|
nsCOMPtr<nsIUrlClassifierFeature> self = feature.mFeature.get();
|
|
return self.forget();
|
|
}
|
|
}
|
|
|
|
return nullptr;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
UrlClassifierFeaturePhishingProtection::ProcessChannel(
|
|
nsIChannel* aChannel, const nsTArray<nsCString>& aList,
|
|
const nsTArray<nsCString>& aHashes, bool* aShouldContinue) {
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
UrlClassifierFeaturePhishingProtection::GetURIByListType(
|
|
nsIChannel* aChannel, nsIUrlClassifierFeature::listType aListType,
|
|
nsIURI** aURI) {
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
|
}
|
|
|
|
} // namespace net
|
|
} // namespace mozilla
|