зеркало из https://github.com/mozilla/gecko-dev.git
204 строки
6.7 KiB
C++
204 строки
6.7 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "UrlClassifierFeatureFingerprintingProtection.h"
|
|
|
|
#include "mozilla/AntiTrackingCommon.h"
|
|
#include "mozilla/net/UrlClassifierCommon.h"
|
|
#include "mozilla/StaticPrefs.h"
|
|
#include "nsContentUtils.h"
|
|
#include "nsNetUtil.h"
|
|
|
|
namespace mozilla {
|
|
namespace net {
|
|
|
|
namespace {
|
|
|
|
#define FINGERPRINTING_FEATURE_NAME "fingerprinting"
|
|
|
|
#define URLCLASSIFIER_FINGERPRINTING_BLACKLIST \
|
|
"urlclassifier.features.fingerprinting.blacklistTables"
|
|
#define URLCLASSIFIER_FINGERPRINTING_BLACKLIST_TEST_ENTRIES \
|
|
"urlclassifier.features.fingerprinting.blacklistHosts"
|
|
#define URLCLASSIFIER_FINGERPRINTING_WHITELIST \
|
|
"urlclassifier.features.fingerprinting.whitelistTables"
|
|
#define URLCLASSIFIER_FINGERPRINTING_WHITELIST_TEST_ENTRIES \
|
|
"urlclassifier.features.fingerprinting.whitelistHosts"
|
|
#define TABLE_FINGERPRINTING_BLACKLIST_PREF "fingerprinting-blacklist-pref"
|
|
#define TABLE_FINGERPRINTING_WHITELIST_PREF "fingerprinting-whitelist-pref"
|
|
|
|
StaticRefPtr<UrlClassifierFeatureFingerprintingProtection>
|
|
gFeatureFingerprintingProtection;
|
|
|
|
} // namespace
|
|
|
|
UrlClassifierFeatureFingerprintingProtection::
|
|
UrlClassifierFeatureFingerprintingProtection()
|
|
: UrlClassifierFeatureBase(
|
|
NS_LITERAL_CSTRING(FINGERPRINTING_FEATURE_NAME),
|
|
NS_LITERAL_CSTRING(URLCLASSIFIER_FINGERPRINTING_BLACKLIST),
|
|
NS_LITERAL_CSTRING(URLCLASSIFIER_FINGERPRINTING_WHITELIST),
|
|
NS_LITERAL_CSTRING(
|
|
URLCLASSIFIER_FINGERPRINTING_BLACKLIST_TEST_ENTRIES),
|
|
NS_LITERAL_CSTRING(
|
|
URLCLASSIFIER_FINGERPRINTING_WHITELIST_TEST_ENTRIES),
|
|
NS_LITERAL_CSTRING(TABLE_FINGERPRINTING_BLACKLIST_PREF),
|
|
NS_LITERAL_CSTRING(TABLE_FINGERPRINTING_WHITELIST_PREF),
|
|
EmptyCString()) {}
|
|
|
|
/* static */ const char* UrlClassifierFeatureFingerprintingProtection::Name() {
|
|
return FINGERPRINTING_FEATURE_NAME;
|
|
}
|
|
|
|
/* static */
|
|
void UrlClassifierFeatureFingerprintingProtection::MaybeInitialize() {
|
|
UC_LOG(("UrlClassifierFeatureFingerprintingProtection: MaybeInitialize"));
|
|
|
|
if (!gFeatureFingerprintingProtection) {
|
|
gFeatureFingerprintingProtection =
|
|
new UrlClassifierFeatureFingerprintingProtection();
|
|
gFeatureFingerprintingProtection->InitializePreferences();
|
|
}
|
|
}
|
|
|
|
/* static */
|
|
void UrlClassifierFeatureFingerprintingProtection::MaybeShutdown() {
|
|
UC_LOG(("UrlClassifierFeatureFingerprintingProtection: MaybeShutdown"));
|
|
|
|
if (gFeatureFingerprintingProtection) {
|
|
gFeatureFingerprintingProtection->ShutdownPreferences();
|
|
gFeatureFingerprintingProtection = nullptr;
|
|
}
|
|
}
|
|
|
|
/* static */
|
|
already_AddRefed<UrlClassifierFeatureFingerprintingProtection>
|
|
UrlClassifierFeatureFingerprintingProtection::MaybeCreate(
|
|
nsIChannel* aChannel) {
|
|
MOZ_ASSERT(aChannel);
|
|
|
|
UC_LOG(
|
|
("UrlClassifierFeatureFingerprintingProtection: MaybeCreate for channel "
|
|
"%p",
|
|
aChannel));
|
|
|
|
if (!StaticPrefs::privacy_trackingprotection_fingerprinting_enabled()) {
|
|
return nullptr;
|
|
}
|
|
|
|
nsCOMPtr<nsIURI> chanURI;
|
|
nsresult rv = aChannel->GetURI(getter_AddRefs(chanURI));
|
|
if (NS_WARN_IF(NS_FAILED(rv))) {
|
|
return nullptr;
|
|
}
|
|
|
|
bool isThirdParty =
|
|
nsContentUtils::IsThirdPartyWindowOrChannel(nullptr, aChannel, chanURI);
|
|
if (!isThirdParty) {
|
|
if (UC_LOG_ENABLED()) {
|
|
nsCString spec = chanURI->GetSpecOrDefault();
|
|
spec.Truncate(
|
|
std::min(spec.Length(), UrlClassifierCommon::sMaxSpecLength));
|
|
UC_LOG(
|
|
("UrlClassifierFeatureFingerprintingProtection: Skipping "
|
|
"fingerprinting checks "
|
|
"for first party or top-level load channel[%p] "
|
|
"with uri %s",
|
|
aChannel, spec.get()));
|
|
}
|
|
|
|
return nullptr;
|
|
}
|
|
|
|
if (!UrlClassifierCommon::ShouldEnableClassifier(aChannel)) {
|
|
return nullptr;
|
|
}
|
|
|
|
MaybeInitialize();
|
|
MOZ_ASSERT(gFeatureFingerprintingProtection);
|
|
|
|
RefPtr<UrlClassifierFeatureFingerprintingProtection> self =
|
|
gFeatureFingerprintingProtection;
|
|
return self.forget();
|
|
}
|
|
|
|
/* static */
|
|
already_AddRefed<nsIUrlClassifierFeature>
|
|
UrlClassifierFeatureFingerprintingProtection::GetIfNameMatches(
|
|
const nsACString& aName) {
|
|
if (!aName.EqualsLiteral(FINGERPRINTING_FEATURE_NAME)) {
|
|
return nullptr;
|
|
}
|
|
|
|
MaybeInitialize();
|
|
MOZ_ASSERT(gFeatureFingerprintingProtection);
|
|
|
|
RefPtr<UrlClassifierFeatureFingerprintingProtection> self =
|
|
gFeatureFingerprintingProtection;
|
|
return self.forget();
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
UrlClassifierFeatureFingerprintingProtection::ProcessChannel(
|
|
nsIChannel* aChannel, const nsACString& aList, bool* aShouldContinue) {
|
|
NS_ENSURE_ARG_POINTER(aChannel);
|
|
NS_ENSURE_ARG_POINTER(aShouldContinue);
|
|
|
|
bool isAllowListed =
|
|
IsAllowListed(aChannel, AntiTrackingCommon::eFingerprinting);
|
|
|
|
// This is a blocking feature.
|
|
*aShouldContinue = isAllowListed;
|
|
|
|
if (isAllowListed) {
|
|
// Even with fingerprinting blocking disabled, we still want to show the
|
|
// user that there are unblocked trackers on the site, so notify the UI that
|
|
// we loaded tracking content. UI code can treat this notification
|
|
// differently depending on whether fingerprinting blocking is enabled or
|
|
// not.
|
|
UrlClassifierCommon::NotifyChannelClassifierProtectionDisabled(
|
|
aChannel, nsIWebProgressListener::STATE_LOADED_FINGERPRINTING_CONTENT);
|
|
} else {
|
|
UrlClassifierCommon::SetBlockedContent(aChannel,
|
|
NS_ERROR_FINGERPRINTING_URI, aList,
|
|
EmptyCString(), EmptyCString());
|
|
|
|
UC_LOG(
|
|
("UrlClassifierFeatureFingerprintingProtection::ProcessChannel, "
|
|
"cancelling "
|
|
"channel[%p]",
|
|
aChannel));
|
|
nsCOMPtr<nsIHttpChannelInternal> httpChannel = do_QueryInterface(aChannel);
|
|
|
|
if (httpChannel) {
|
|
Unused << httpChannel->CancelByChannelClassifier(
|
|
NS_ERROR_FINGERPRINTING_URI);
|
|
} else {
|
|
Unused << aChannel->Cancel(NS_ERROR_FINGERPRINTING_URI);
|
|
}
|
|
}
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
UrlClassifierFeatureFingerprintingProtection::GetURIByListType(
|
|
nsIChannel* aChannel, nsIUrlClassifierFeature::listType aListType,
|
|
nsIURI** aURI) {
|
|
NS_ENSURE_ARG_POINTER(aChannel);
|
|
NS_ENSURE_ARG_POINTER(aURI);
|
|
|
|
if (aListType == nsIUrlClassifierFeature::blacklist) {
|
|
return aChannel->GetURI(aURI);
|
|
}
|
|
|
|
MOZ_ASSERT(aListType == nsIUrlClassifierFeature::whitelist);
|
|
return UrlClassifierCommon::CreatePairwiseWhiteListURI(aChannel, aURI);
|
|
}
|
|
|
|
} // namespace net
|
|
} // namespace mozilla
|