зеркало из https://github.com/mozilla/gecko-dev.git
164 строки
5.0 KiB
C++
164 строки
5.0 KiB
C++
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
||
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
||
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
||
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
||
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||
|
|
||
|
#include "UrlClassifierFeatureBase.h"
|
||
|
#include "Classifier.h"
|
||
|
#include "mozilla/Preferences.h"
|
||
|
|
||
|
namespace mozilla {
|
||
|
|
||
|
using namespace safebrowsing;
|
||
|
|
||
|
namespace net {
|
||
|
|
||
|
namespace {
|
||
|
|
||
|
void OnPrefsChange(const char* aPrefName, nsTArray<nsCString>* aArray) {
|
||
|
MOZ_ASSERT(aArray);
|
||
|
|
||
|
nsAutoCString value;
|
||
|
Preferences::GetCString(aPrefName, value);
|
||
|
Classifier::SplitTables(value, *aArray);
|
||
|
}
|
||
|
|
||
|
void OnPrefSkipChange(const char* aPrefName, nsCString* aValue) {
|
||
|
MOZ_ASSERT(aValue);
|
||
|
|
||
|
Preferences::GetCString(aPrefName, *aValue);
|
||
|
}
|
||
|
|
||
|
} // namespace
|
||
|
|
||
|
NS_INTERFACE_MAP_BEGIN(UrlClassifierFeatureBase)
|
||
|
NS_INTERFACE_MAP_ENTRY_AMBIGUOUS(nsISupports, nsIUrlClassifierFeature)
|
||
|
NS_INTERFACE_MAP_ENTRY(nsIUrlClassifierFeature)
|
||
|
NS_INTERFACE_MAP_END
|
||
|
|
||
|
NS_IMPL_ADDREF(UrlClassifierFeatureBase)
|
||
|
NS_IMPL_RELEASE(UrlClassifierFeatureBase)
|
||
|
|
||
|
UrlClassifierFeatureBase::UrlClassifierFeatureBase(
|
||
|
const nsACString& aName, const nsACString& aPrefBlacklistTables,
|
||
|
const nsACString& aPrefWhitelistTables,
|
||
|
const nsACString& aPrefBlacklistHosts,
|
||
|
const nsACString& aPrefWhitelistHosts,
|
||
|
const nsACString& aPrefBlacklistTableName,
|
||
|
const nsACString& aPrefWhitelistTableName, const nsACString& aPrefSkipHosts)
|
||
|
: mName(aName), mPrefSkipHosts(aPrefSkipHosts) {
|
||
|
static_assert(nsIUrlClassifierFeature::blacklist == 0,
|
||
|
"nsIUrlClassifierFeature::blacklist must be 0");
|
||
|
static_assert(nsIUrlClassifierFeature::whitelist == 1,
|
||
|
"nsIUrlClassifierFeature::whitelist must be 1");
|
||
|
|
||
|
mPrefTables[nsIUrlClassifierFeature::blacklist] = aPrefBlacklistTables;
|
||
|
mPrefTables[nsIUrlClassifierFeature::whitelist] = aPrefWhitelistTables;
|
||
|
|
||
|
mPrefHosts[nsIUrlClassifierFeature::blacklist] = aPrefBlacklistHosts;
|
||
|
mPrefHosts[nsIUrlClassifierFeature::whitelist] = aPrefWhitelistHosts;
|
||
|
|
||
|
mPrefTableNames[nsIUrlClassifierFeature::blacklist] = aPrefBlacklistTableName;
|
||
|
mPrefTableNames[nsIUrlClassifierFeature::whitelist] = aPrefWhitelistTableName;
|
||
|
}
|
||
|
|
||
|
UrlClassifierFeatureBase::~UrlClassifierFeatureBase() = default;
|
||
|
|
||
|
void UrlClassifierFeatureBase::InitializePreferences() {
|
||
|
for (uint32_t i = 0; i < 2; ++i) {
|
||
|
if (!mPrefTables[i].IsEmpty()) {
|
||
|
Preferences::RegisterCallbackAndCall(OnPrefsChange, mPrefTables[i],
|
||
|
&mTables[i]);
|
||
|
}
|
||
|
|
||
|
if (!mPrefHosts[i].IsEmpty()) {
|
||
|
Preferences::RegisterCallbackAndCall(OnPrefsChange, mPrefHosts[i],
|
||
|
&mHosts[i]);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
if (!mPrefSkipHosts.IsEmpty()) {
|
||
|
Preferences::RegisterCallbackAndCall(OnPrefSkipChange, mPrefSkipHosts,
|
||
|
&mSkipHosts);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
void UrlClassifierFeatureBase::ShutdownPreferences() {
|
||
|
for (uint32_t i = 0; i < 2; ++i) {
|
||
|
if (!mPrefTables[i].IsEmpty()) {
|
||
|
Preferences::UnregisterCallback(OnPrefsChange, mPrefTables[i],
|
||
|
&mTables[i]);
|
||
|
}
|
||
|
|
||
|
if (!mPrefHosts[i].IsEmpty()) {
|
||
|
Preferences::UnregisterCallback(OnPrefsChange, mPrefHosts[i], &mHosts[i]);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
if (!mPrefSkipHosts.IsEmpty()) {
|
||
|
Preferences::UnregisterCallback(OnPrefSkipChange, mPrefSkipHosts,
|
||
|
&mSkipHosts);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
NS_IMETHODIMP
|
||
|
UrlClassifierFeatureBase::GetName(nsACString& aName) {
|
||
|
aName = mName;
|
||
|
return NS_OK;
|
||
|
}
|
||
|
|
||
|
NS_IMETHODIMP
|
||
|
UrlClassifierFeatureBase::GetTables(nsIUrlClassifierFeature::listType aListType,
|
||
|
nsTArray<nsCString>& aTables) {
|
||
|
if (aListType != nsIUrlClassifierFeature::blacklist &&
|
||
|
aListType != nsIUrlClassifierFeature::whitelist) {
|
||
|
return NS_ERROR_INVALID_ARG;
|
||
|
}
|
||
|
|
||
|
aTables = mTables[aListType];
|
||
|
return NS_OK;
|
||
|
}
|
||
|
|
||
|
NS_IMETHODIMP
|
||
|
UrlClassifierFeatureBase::HasTable(const nsACString& aTable,
|
||
|
nsIUrlClassifierFeature::listType aListType,
|
||
|
bool* aResult) {
|
||
|
NS_ENSURE_ARG_POINTER(aResult);
|
||
|
|
||
|
if (aListType != nsIUrlClassifierFeature::blacklist &&
|
||
|
aListType != nsIUrlClassifierFeature::whitelist) {
|
||
|
return NS_ERROR_INVALID_ARG;
|
||
|
}
|
||
|
|
||
|
*aResult = mTables[aListType].Contains(aTable);
|
||
|
return NS_OK;
|
||
|
}
|
||
|
|
||
|
NS_IMETHODIMP
|
||
|
UrlClassifierFeatureBase::HasHostInPreferences(
|
||
|
const nsACString& aHost, nsIUrlClassifierFeature::listType aListType,
|
||
|
nsACString& aPrefTableName, bool* aResult) {
|
||
|
NS_ENSURE_ARG_POINTER(aResult);
|
||
|
|
||
|
if (aListType != nsIUrlClassifierFeature::blacklist &&
|
||
|
aListType != nsIUrlClassifierFeature::whitelist) {
|
||
|
return NS_ERROR_INVALID_ARG;
|
||
|
}
|
||
|
|
||
|
*aResult = mHosts[aListType].Contains(aHost);
|
||
|
if (*aResult) {
|
||
|
aPrefTableName = mPrefTableNames[aListType];
|
||
|
}
|
||
|
return NS_OK;
|
||
|
}
|
||
|
|
||
|
NS_IMETHODIMP
|
||
|
UrlClassifierFeatureBase::GetSkipHostList(nsACString& aList) {
|
||
|
aList = mSkipHosts;
|
||
|
return NS_OK;
|
||
|
}
|
||
|
|
||
|
} // namespace net
|
||
|
} // namespace mozilla
|