tony%ponderer.org 2064331add Bug 342196: ordering bug causes some urls to not be inspected on new windows
patch: setup the webprogresslistener immediately (before js load)
r=mmchew


git-svn-id: svn://10.0.0.236/trunk@200530 18797224-902f-48f8-a5cc-f745e15eee43
2006-06-21 20:48:52 +00:00

151 lines
5.4 KiB
JavaScript

/* ***** BEGIN LICENSE BLOCK *****
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
*
* The contents of this file are subject to the Mozilla Public License Version
* 1.1 (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
* http://www.mozilla.org/MPL/
*
* Software distributed under the License is distributed on an "AS IS" basis,
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
* for the specific language governing rights and limitations under the
* License.
*
* The Original Code is Google Safe Browsing.
*
* The Initial Developer of the Original Code is Google Inc.
* Portions created by the Initial Developer are Copyright (C) 2006
* the Initial Developer. All Rights Reserved.
*
* Contributor(s):
* Fritz Schneider <fritz@google.com> (original author)
*
* Alternatively, the contents of this file may be used under the terms of
* either the GNU General Public License Version 2 or later (the "GPL"), or
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
* in which case the provisions of the GPL or the LGPL are applicable instead
* of those above. If you wish to allow use of your version of this file only
* under the terms of either the GPL or the LGPL, and not to allow others to
* use your version of this file under the terms of the MPL, indicate your
* decision by deleting the provisions above and replace them with the notice
* and other provisions required by the GPL or the LGPL. If you do not delete
* the provisions above, a recipient may use your version of this file under
* the terms of any one of the MPL, the GPL or the LGPL.
*
* ***** END LICENSE BLOCK ***** */
/**
* This file is included into the main browser chrome from
* browser/base/content/global-scripts.inc
*/
var safebrowsing = {
controller: null,
phishWarden: null,
// We set up the web progress listener immediately so we don't miss any
// phishing urls. Since the phishing infrastructure isn't loaded yet, we
// just store the urls in a list.
progressListener: null,
progressListenerCallback: {
requests: [],
onDocNavStart: function(request, url) {
this.requests.push({
'request': request,
'url': url
});
}
},
startup: function() {
setTimeout(safebrowsing.deferredStartup, 2000);
// clean up
window.removeEventListener("load", safebrowsing.startup, false);
},
deferredStartup: function() {
var Cc = Components.classes;
var appContext = Cc["@mozilla.org/safebrowsing/application;1"]
.getService().wrappedJSObject;
// Each new browser window needs its own controller.
var contentArea = document.getElementById("content");
var phishWarden = new appContext.PROT_PhishingWarden(
safebrowsing.progressListener);
safebrowsing.phishWarden = phishWarden;
// Register tables
// XXX: move table names to a pref that we originally will download
// from the provider (need to workout protocol details)
phishWarden.registerWhiteTable("goog-white-domain");
phishWarden.registerWhiteTable("goog-white-url");
phishWarden.registerBlackTable("goog-black-url");
// Download/update lists if we're in non-enhanced mode
phishWarden.maybeToggleUpdateChecking();
var tabWatcher = new appContext.G_TabbedBrowserWatcher(
contentArea,
"safebrowsing-watcher",
true /*ignore about:blank*/);
safebrowsing.controller = new appContext.PROT_Controller(
window,
tabWatcher,
phishWarden);
// The initial pages may be a phishing site (e.g., user clicks on a link
// in an email message and it opens a new window with a phishing site),
// so we need to check all requests that fired before deferredStartup.
if (!phishWarden.phishWardenEnabled_) {
safebrowsing.progressListenerCallback.requests = null;
safebrowsing.progressListenerCallback = null;
safebrowsing.progressListener = null;
return;
}
var pendingRequests = safebrowsing.progressListenerCallback.requests;
for (var i = 0; i < pendingRequests.length; ++i) {
var request = pendingRequests[i].request;
var url = pendingRequests[i].url;
phishWarden.onDocNavStart(request, url);
}
// Cleanup
safebrowsing.progressListenerCallback.requests = null;
safebrowsing.progressListenerCallback = null;
safebrowsing.progressListener = null;
},
/**
* Clean up.
*/
shutdown: function() {
if (safebrowsing.controller) {
// If the user shuts down before deferredStartup, there is no controller.
safebrowsing.controller.shutdown();
}
if (safebrowsing.phishWarden) {
safebrowsing.phishWarden.shutdown();
}
window.removeEventListener("unload", safebrowsing.shutdown, false);
}
}
// Set up our request listener immediately so we don't miss
// any url loads. We do the actually checking in the deferredStartup
// method.
safebrowsing.progressListener =
Cc["@mozilla.org/browser/safebrowsing/navstartlistener;1"]
.createInstance(Ci.nsIDocNavStartProgressListener);
safebrowsing.progressListener.callback =
safebrowsing.progressListenerCallback;
safebrowsing.progressListener.enabled = true;
safebrowsing.progressListener.delay = 0;
window.addEventListener("load", safebrowsing.startup, false);
window.addEventListener("unload", safebrowsing.shutdown, false);