зеркало из https://github.com/mozilla/gecko-dev.git
Bug 1374731 - Don't use hardcoded test entries for the Flash classification tables. r=bytesized
MozReview-Commit-ID: 1pG11W7PX4R --HG-- extra : rebase_source : a4c77e4b09a78f515d1485c6ef95cf81f27ee783
This commit is contained in:
Родитель
f5e74d23ac
Коммит
a45c6fd314
|
@ -5218,7 +5218,7 @@ pref("urlclassifier.phishTable", "googpub-phish-shavar,test-phish-simple");
|
||||||
pref("urlclassifier.downloadAllowTable", "goog-downloadwhite-proto");
|
pref("urlclassifier.downloadAllowTable", "goog-downloadwhite-proto");
|
||||||
pref("urlclassifier.downloadBlockTable", "goog-badbinurl-proto");
|
pref("urlclassifier.downloadBlockTable", "goog-badbinurl-proto");
|
||||||
|
|
||||||
pref("urlclassifier.disallow_completions", "test-malware-simple,test-phish-simple,test-unwanted-simple,test-track-simple,test-trackwhite-simple,test-block-simple,test-flashallow-simple,testexcept-flashallow-simple,test-flash-simple,testexcept-flash-simple,test-flashsubdoc-simple,testexcept-flashsubdoc-simple,goog-downloadwhite-digest256,base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,except-flashinfobar-digest256");
|
pref("urlclassifier.disallow_completions", "test-malware-simple,test-phish-simple,test-unwanted-simple,test-track-simple,test-trackwhite-simple,test-block-simple,goog-downloadwhite-digest256,base-track-digest256,mozstd-trackwhite-digest256,content-track-digest256,mozplugin-block-digest256,mozplugin2-block-digest256,block-flash-digest256,except-flash-digest256,allow-flashallow-digest256,except-flashallow-digest256,block-flashsubdoc-digest256,except-flashsubdoc-digest256,except-flashinfobar-digest256");
|
||||||
|
|
||||||
// The table and update/gethash URLs for Safebrowsing phishing and malware
|
// The table and update/gethash URLs for Safebrowsing phishing and malware
|
||||||
// checks.
|
// checks.
|
||||||
|
@ -5294,12 +5294,12 @@ pref("browser.safebrowsing.provider.mozilla.lists.base.description", "mozstdDesc
|
||||||
pref("browser.safebrowsing.provider.mozilla.lists.content.name", "mozfullName");
|
pref("browser.safebrowsing.provider.mozilla.lists.content.name", "mozfullName");
|
||||||
pref("browser.safebrowsing.provider.mozilla.lists.content.description", "mozfullDesc");
|
pref("browser.safebrowsing.provider.mozilla.lists.content.description", "mozfullDesc");
|
||||||
|
|
||||||
pref("urlclassifier.flashAllowTable", "test-flashallow-simple,allow-flashallow-digest256");
|
pref("urlclassifier.flashAllowTable", "allow-flashallow-digest256");
|
||||||
pref("urlclassifier.flashAllowExceptTable", "testexcept-flashallow-simple,except-flashallow-digest256");
|
pref("urlclassifier.flashAllowExceptTable", "except-flashallow-digest256");
|
||||||
pref("urlclassifier.flashTable", "test-flash-simple,block-flash-digest256");
|
pref("urlclassifier.flashTable", "block-flash-digest256");
|
||||||
pref("urlclassifier.flashExceptTable", "testexcept-flash-simple,except-flash-digest256");
|
pref("urlclassifier.flashExceptTable", "except-flash-digest256");
|
||||||
pref("urlclassifier.flashSubDocTable", "test-flashsubdoc-simple,block-flashsubdoc-digest256");
|
pref("urlclassifier.flashSubDocTable", "block-flashsubdoc-digest256");
|
||||||
pref("urlclassifier.flashSubDocExceptTable", "testexcept-flashsubdoc-simple,except-flashsubdoc-digest256");
|
pref("urlclassifier.flashSubDocExceptTable", "except-flashsubdoc-digest256");
|
||||||
pref("urlclassifier.flashInfobarTable", "except-flashinfobar-digest256");
|
pref("urlclassifier.flashInfobarTable", "except-flashinfobar-digest256");
|
||||||
|
|
||||||
pref("plugins.http_https_only", true);
|
pref("plugins.http_https_only", true);
|
||||||
|
|
|
@ -400,13 +400,6 @@ this.SafeBrowsing = {
|
||||||
const whitelistURL = "itisatrap.org/?resource=itisatracker.org";
|
const whitelistURL = "itisatrap.org/?resource=itisatracker.org";
|
||||||
const blockedURL = "itisatrap.org/firefox/blocked.html";
|
const blockedURL = "itisatrap.org/firefox/blocked.html";
|
||||||
|
|
||||||
const flashDenyURL = "flashblock.itisatrap.org/";
|
|
||||||
const flashDenyExceptURL = "except.flashblock.itisatrap.org/";
|
|
||||||
const flashAllowURL = "flashallow.itisatrap.org/";
|
|
||||||
const flashAllowExceptURL = "except.flashallow.itisatrap.org/";
|
|
||||||
const flashSubDocURL = "flashsubdoc.itisatrap.org/";
|
|
||||||
const flashSubDocExceptURL = "except.flashsubdoc.itisatrap.org/";
|
|
||||||
|
|
||||||
let update = "n:1000\ni:test-malware-simple\nad:1\n" +
|
let update = "n:1000\ni:test-malware-simple\nad:1\n" +
|
||||||
"a:1:32:" + malwareURL.length + "\n" +
|
"a:1:32:" + malwareURL.length + "\n" +
|
||||||
malwareURL + "\n";
|
malwareURL + "\n";
|
||||||
|
@ -428,24 +421,6 @@ this.SafeBrowsing = {
|
||||||
update += "n:1000\ni:test-block-simple\nad:1\n" +
|
update += "n:1000\ni:test-block-simple\nad:1\n" +
|
||||||
"a:1:32:" + blockedURL.length + "\n" +
|
"a:1:32:" + blockedURL.length + "\n" +
|
||||||
blockedURL;
|
blockedURL;
|
||||||
update += "n:1000\ni:test-flash-simple\nad:1\n" +
|
|
||||||
"a:1:32:" + flashDenyURL.length + "\n" +
|
|
||||||
flashDenyURL;
|
|
||||||
update += "n:1000\ni:testexcept-flash-simple\nad:1\n" +
|
|
||||||
"a:1:32:" + flashDenyExceptURL.length + "\n" +
|
|
||||||
flashDenyExceptURL;
|
|
||||||
update += "n:1000\ni:test-flashallow-simple\nad:1\n" +
|
|
||||||
"a:1:32:" + flashAllowURL.length + "\n" +
|
|
||||||
flashAllowURL;
|
|
||||||
update += "n:1000\ni:testexcept-flashallow-simple\nad:1\n" +
|
|
||||||
"a:1:32:" + flashAllowExceptURL.length + "\n" +
|
|
||||||
flashAllowExceptURL;
|
|
||||||
update += "n:1000\ni:test-flashsubdoc-simple\nad:1\n" +
|
|
||||||
"a:1:32:" + flashSubDocURL.length + "\n" +
|
|
||||||
flashSubDocURL;
|
|
||||||
update += "n:1000\ni:testexcept-flashsubdoc-simple\nad:1\n" +
|
|
||||||
"a:1:32:" + flashSubDocExceptURL.length + "\n" +
|
|
||||||
flashSubDocExceptURL;
|
|
||||||
log("addMozEntries:", update);
|
log("addMozEntries:", update);
|
||||||
|
|
||||||
let db = Cc["@mozilla.org/url-classifier/dbservice;1"].
|
let db = Cc["@mozilla.org/url-classifier/dbservice;1"].
|
||||||
|
@ -466,7 +441,7 @@ this.SafeBrowsing = {
|
||||||
};
|
};
|
||||||
|
|
||||||
try {
|
try {
|
||||||
let tables = "test-malware-simple,test-phish-simple,test-unwanted-simple,test-track-simple,test-trackwhite-simple,test-block-simple,test-flash-simple,testexcept-flash-simple,test-flashallow-simple,testexcept-flashallow-simple,test-flashsubdoc-simple,testexcept-flashsubdoc-simple";
|
let tables = "test-malware-simple,test-phish-simple,test-unwanted-simple,test-track-simple,test-trackwhite-simple,test-block-simple";
|
||||||
db.beginUpdate(dummyListener, tables, "");
|
db.beginUpdate(dummyListener, tables, "");
|
||||||
db.beginStream("", "");
|
db.beginStream("", "");
|
||||||
db.updateStream(update);
|
db.updateStream(update);
|
||||||
|
|
|
@ -9,6 +9,7 @@ var classifierTester = {
|
||||||
IFRAME_ID: "testFrame",
|
IFRAME_ID: "testFrame",
|
||||||
FLASHBLOCK_ENABLE_PREF: "plugins.flashBlock.enabled",
|
FLASHBLOCK_ENABLE_PREF: "plugins.flashBlock.enabled",
|
||||||
FLASH_PLUGIN_USER_SETTING_PREF: "plugin.state.flash",
|
FLASH_PLUGIN_USER_SETTING_PREF: "plugin.state.flash",
|
||||||
|
URLCLASSIFIER_DISALLOW_COMPLETIONS_PREF: "urlclassifier.disallow_completions",
|
||||||
NEVER_ACTIVATE_PREF_VALUE: 0,
|
NEVER_ACTIVATE_PREF_VALUE: 0,
|
||||||
ASK_TO_ACTIVATE_PREF_VALUE: 1,
|
ASK_TO_ACTIVATE_PREF_VALUE: 1,
|
||||||
ALWAYS_ACTIVATE_PREF_VALUE: 2,
|
ALWAYS_ACTIVATE_PREF_VALUE: 2,
|
||||||
|
@ -38,21 +39,29 @@ var classifierTester = {
|
||||||
{
|
{
|
||||||
url: "subdocument.example.com/",
|
url: "subdocument.example.com/",
|
||||||
db: "test-flashsubdoc-simple",
|
db: "test-flashsubdoc-simple",
|
||||||
pref: "urlclassifier.flashThirdPartyTable"
|
pref: "urlclassifier.flashSubDocTable"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
url: "exception.subdocument.example.com/",
|
url: "exception.subdocument.example.com/",
|
||||||
db: "testexcept-flashsubdoc-simple",
|
db: "testexcept-flashsubdoc-simple",
|
||||||
pref: "urlclassifier.flashThirdPartyExceptTable"
|
pref: "urlclassifier.flashSubDocExceptTable"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
|
||||||
setPrefs: function ({setDBs = true, flashBlockEnable = true, flashSetting = classifierTester.ALWAYS_ACTIVATE_PREF_VALUE} = {}) {
|
setPrefs: function ({setDBs = true, flashBlockEnable = true, flashSetting = classifierTester.ALWAYS_ACTIVATE_PREF_VALUE} = {}) {
|
||||||
if (setDBs) {
|
if (setDBs) {
|
||||||
|
let DBs = [];
|
||||||
|
|
||||||
for (let dbData of classifierTester.dbUrls) {
|
for (let dbData of classifierTester.dbUrls) {
|
||||||
Services.prefs.setCharPref(dbData.pref, dbData.db);
|
Services.prefs.setCharPref(dbData.pref, dbData.db);
|
||||||
|
DBs.push(dbData.db);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
let completions = Services.prefs.getCharPref(classifierTester.URLCLASSIFIER_DISALLOW_COMPLETIONS_PREF);
|
||||||
|
completions += "," + DBs.join(",");
|
||||||
|
Services.prefs.setCharPref(classifierTester.URLCLASSIFIER_DISALLOW_COMPLETIONS_PREF, completions);
|
||||||
}
|
}
|
||||||
|
|
||||||
Services.prefs.setBoolPref(classifierTester.FLASHBLOCK_ENABLE_PREF,
|
Services.prefs.setBoolPref(classifierTester.FLASHBLOCK_ENABLE_PREF,
|
||||||
flashBlockEnable);
|
flashBlockEnable);
|
||||||
Services.prefs.setIntPref(classifierTester.FLASH_PLUGIN_USER_SETTING_PREF,
|
Services.prefs.setIntPref(classifierTester.FLASH_PLUGIN_USER_SETTING_PREF,
|
||||||
|
@ -64,6 +73,8 @@ var classifierTester = {
|
||||||
for (let dbData of classifierTester.dbUrls) {
|
for (let dbData of classifierTester.dbUrls) {
|
||||||
Services.prefs.clearUserPref(dbData.pref);
|
Services.prefs.clearUserPref(dbData.pref);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Services.prefs.clearUserPref(classifierTester.URLCLASSIFIER_DISALLOW_COMPLETIONS_PREF);
|
||||||
Services.prefs.clearUserPref(classifierTester.FLASHBLOCK_ENABLE_PREF);
|
Services.prefs.clearUserPref(classifierTester.FLASHBLOCK_ENABLE_PREF);
|
||||||
Services.prefs.clearUserPref(classifierTester.FLASH_PLUGIN_USER_SETTING_PREF);
|
Services.prefs.clearUserPref(classifierTester.FLASH_PLUGIN_USER_SETTING_PREF);
|
||||||
Services.prefs.clearUserPref(classifierTester.ALLOW_CTA_PREF);
|
Services.prefs.clearUserPref(classifierTester.ALLOW_CTA_PREF);
|
||||||
|
|
Загрузка…
Ссылка в новой задаче