Bug 1351835 - Update PrivacyLevel.canSave() calls in SessionCookies.jsm r=mikedeboer

The first change we can make is to simplify the PrivacyLevel.canSave() method
itself as it only takes a single argument, `isHTTPS`. Callers shouldn't be
required to pass an object, they should simply pass a boolean.

The second change here is to cleanup SessionCookies.jsm that still passes the
old `isPinned` argument that's no longer needed. We can remove some house
keeping and simplify the cookie collection code.

SessionCookies.getHostsForWindow() that previously returned a map from hostnames
to a site's pinned status (tab.pinned) can now simply return a Set containing
all hostnames found in a window.
This commit is contained in:
Tim Taubert 2017-03-30 13:57:42 +02:00
Родитель 0d26c7dc74
Коммит 890672d7f9
3 изменённых файлов: 26 добавлений и 72 удалений

Просмотреть файл

@ -61,17 +61,12 @@ var SessionCookiesInternal = {
for (let window of windows) {
let cookies = [];
// Collect all hosts for the current window.
let hosts = this.getHostsForWindow(window, true);
for (let host of Object.keys(hosts)) {
let isPinned = hosts[host];
// Collect all cookies for the current window.
for (let host of this.getHostsForWindow(window, true)) {
for (let cookie of CookieStore.getCookiesForHost(host)) {
// _getCookiesForHost() will only return hosts with the right privacy
// rules, so there is no need to do anything special with this call
// to PrivacyLevel.canSave().
if (PrivacyLevel.canSave({isHttps: cookie.secure, isPinned})) {
// getCookiesForHost() will only return hosts with the right privacy
// rules. Check again here to exclude HTTPS-only cookies if needed.
if (PrivacyLevel.canSave(cookie.secure)) {
cookies.push(cookie);
}
}
@ -94,17 +89,14 @@ var SessionCookiesInternal = {
* A window state object containing tabs with history entries.
* @param checkPrivacy (bool)
* Whether to check the privacy level for each host.
* @return {object} A map of hosts for a given window state object. The keys
* will be hosts, the values are boolean and determine
* whether we will use the deferred privacy level when
* checking how much data to save on quitting.
* @return {set} A set of hosts for a given window state object.
*/
getHostsForWindow(window, checkPrivacy = false) {
let hosts = {};
let hosts = new Set();
for (let tab of window.tabs) {
for (let entry of tab.entries) {
this._extractHostsFromEntry(entry, hosts, checkPrivacy, tab.pinned);
this._extractHostsFromEntry(entry, hosts, checkPrivacy);
}
}
@ -178,67 +170,31 @@ var SessionCookiesInternal = {
* @param entry
* the history entry, serialized
* @param hosts
* the hash that will be used to store hosts eg, { hostname: true }
* the set that will be used to store hosts
* @param checkPrivacy
* should we check the privacy level for https
* @param isPinned
* is the entry we're evaluating for a pinned tab; used only if
* checkPrivacy
*/
_extractHostsFromEntry(entry, hosts, checkPrivacy, isPinned) {
let host = entry._host;
let scheme = entry._scheme;
// If host & scheme aren't defined, then we are likely here in the startup
// process via _splitCookiesFromWindow. In that case, we'll turn entry.url
// into an nsIURI and get host/scheme from that. This will throw for about:
// urls in which case we don't need to do anything.
if (!host && !scheme) {
_extractHostsFromEntry(entry, hosts, checkPrivacy) {
try {
let uri = Utils.makeURI(entry.url);
host = uri.host;
scheme = uri.scheme;
this._extractHostsFromHostScheme(host, scheme, hosts, checkPrivacy, isPinned);
} catch (ex) { }
// It's alright if this throws for about: URIs.
let {host, scheme} = Utils.makeURI(entry.url);
if (scheme == "file") {
hosts.add(host);
} else if (/https?/.test(scheme)) {
if (!checkPrivacy || PrivacyLevel.canSave(scheme == "https")) {
hosts.add(host);
}
}
} catch (ex) { }
if (entry.children) {
for (let child of entry.children) {
this._extractHostsFromEntry(child, hosts, checkPrivacy, isPinned);
this._extractHostsFromEntry(child, hosts, checkPrivacy);
}
}
},
/**
* Add a given host to a given map of hosts if the privacy level allows
* saving cookie data for it.
*
* @param host
* the host of a uri (usually via nsIURI.host)
* @param scheme
* the scheme of a uri (usually via nsIURI.scheme)
* @param hosts
* the hash that will be used to store hosts eg, { hostname: true }
* @param checkPrivacy
* should we check the privacy level for https
* @param isPinned
* is the entry we're evaluating for a pinned tab; used only if
* checkPrivacy
*/
_extractHostsFromHostScheme(host, scheme, hosts, checkPrivacy, isPinned) {
// host and scheme may not be set (for about: urls for example), in which
// case testing scheme will be sufficient.
if (/https?/.test(scheme) && !hosts[host] &&
(!checkPrivacy ||
PrivacyLevel.canSave({isHttps: scheme == "https", isPinned}))) {
// By setting this to true or false, we can determine when looking at
// the host in update() if we should check for privacy.
hosts[host] = isPinned;
} else if (scheme == "file") {
hosts[host] = true;
}
},
/**
* Updates or adds a given cookie to the store.
*/

Просмотреть файл

@ -4375,7 +4375,7 @@ var SessionStoreInternal = {
// By creating a regex we reduce overhead and there is only one loop pass
// through either array (cookieHosts and aWinState.cookies).
let hosts = Object.keys(cookieHosts).join("|").replace(/\./g, "\\.");
let hosts = [...cookieHosts].join("|").replace(/\./g, "\\.");
// If we don't actually have any hosts, then we don't want to do anything.
if (!hosts.length)
return;

Просмотреть файл

@ -35,18 +35,16 @@ var PrivacyLevel = Object.freeze({
* @return bool
*/
check(url) {
return PrivacyLevel.canSave({ isHttps: url.startsWith("https:") });
return PrivacyLevel.canSave(url.startsWith("https:"));
},
/**
* Checks whether we're allowed to save data for a specific site.
*
* @param {isHttps: boolean}
* An object that must have one property: 'isHttps'.
* 'isHttps' tells whether the site us secure communication (HTTPS).
* @param isHttps A boolean that tells whether the site uses TLS.
* @return {bool} Whether we can save data for the specified site.
*/
canSave({isHttps}) {
canSave(isHttps) {
let level = Services.prefs.getIntPref(PREF);
// Never save any data when full privacy is requested.