aboutsummaryrefslogtreecommitdiffstats
path: root/lib/FrameModule.jsm
diff options
context:
space:
mode:
authorJesús <heckyel@hyperbola.info>2019-12-30 15:55:13 -0500
committerJesús <heckyel@hyperbola.info>2019-12-30 15:55:13 -0500
commit288df6a7bf8b933e2dc499e38f4915fcf974c14b (patch)
tree77bba994f260c064d3ee7f76c427ddfaa4f91710 /lib/FrameModule.jsm
parenta2c9deaa145b780722e93b3899600f287c8094a4 (diff)
downloadematrix-288df6a7bf8b933e2dc499e38f4915fcf974c14b.tar.lz
ematrix-288df6a7bf8b933e2dc499e38f4915fcf974c14b.tar.xz
ematrix-288df6a7bf8b933e2dc499e38f4915fcf974c14b.zip
backport
- Flush caches on upgrade - Properly handle FrameModule's unloading - Use the new module and remove the old implementation
Diffstat (limited to 'lib/FrameModule.jsm')
-rw-r--r--lib/FrameModule.jsm337
1 files changed, 337 insertions, 0 deletions
diff --git a/lib/FrameModule.jsm b/lib/FrameModule.jsm
new file mode 100644
index 0000000..ef149ae
--- /dev/null
+++ b/lib/FrameModule.jsm
@@ -0,0 +1,337 @@
+/*******************************************************************************
+
+ ηMatrix - a browser extension to black/white list requests.
+ Copyright (C) 2014-2019 The µBlock authors
+ Copyright (C) 2019 Alessio Vanni
+
+ This program is free software: you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation, either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see {http://www.gnu.org/licenses/}.
+
+ Home: https://gitlab.com/vannilla/ematrix
+ uMatrix Home: https://github.com/gorhill/uMatrix
+*/
+
+'use strict';
+
+// https://github.com/gorhill/uBlock/issues/800#issuecomment-146580443
+var EXPORTED_SYMBOLS = ['contentObserver', 'LocationChangeListener'];
+
+const {interfaces: Ci, utils: Cu} = Components;
+Cu.import('resource://gre/modules/Services.jsm');
+Cu.import('resource://gre/modules/XPCOMUtils.jsm');
+
+var hostName = Services.io.newURI(Components.stack.filename, null, null).host;
+
+// Cu.import('resource://gre/modules/Console.jsm');
+
+const getMessageManager = function (win) {
+ let iface = win
+ .QueryInterface(Ci.nsIInterfaceRequestor)
+ .getInterface(Ci.nsIDocShell)
+ .sameTypeRootTreeItem
+ .QueryInterface(Ci.nsIDocShell)
+ .QueryInterface(Ci.nsIInterfaceRequestor);
+
+ try {
+ return iface.getInterface(Ci.nsIContentFrameMessageManager);
+ } catch (ex) {
+ // This can throw. It appears `shouldLoad` can be called *after* a
+ // tab has been closed. For example, a case where this happens all
+ // the time (FF38):
+ // - Open twitter.com (assuming you have an account and are logged in)
+ // - Close twitter.com
+ // There will be an exception raised when `shouldLoad` is called
+ // to process a XMLHttpRequest with URL `https://twitter.com/i/jot`
+ // fired from `https://twitter.com/`, *after* the tab is closed.
+ // In such case, `win` is `about:blank`.
+ }
+ return null;
+};
+
+var contentObserver = {
+ classDescription: 'content-policy for ' + hostName,
+ classID: Components.ID('{c84283d4-9975-41b7-b1a4-f106af56b51d}'),
+ contractID: '@' + hostName + '/content-policy;1',
+ ACCEPT: Ci.nsIContentPolicy.ACCEPT,
+ MAIN_FRAME: Ci.nsIContentPolicy.TYPE_DOCUMENT,
+ contentBaseURI: 'chrome://' + hostName + '/content/js/',
+ cpMessageName: hostName + ':shouldLoad',
+ uniqueSandboxId: 1,
+ modernFirefox:
+ (Services.appinfo.ID === '{ec8030f7-c20a-464f-9b0e-13a3a9e97384}'
+ || Services.appinfo.ID === '{92650c4d-4b8e-4d2a-b7eb-24ecf4f6b63a}')
+ && Services.vc.compare(Services.appinfo.version, '44') > 0,
+
+ get componentRegistrar() {
+ return Components.manager.QueryInterface(Ci.nsIComponentRegistrar);
+ },
+
+ get categoryManager() {
+ return Components.classes['@mozilla.org/categorymanager;1']
+ .getService(Ci.nsICategoryManager);
+ },
+
+ QueryInterface: XPCOMUtils.generateQI([
+ Ci.nsIFactory,
+ Ci.nsIObserver,
+ Ci.nsIContentPolicy,
+ Ci.nsISupportsWeakReference
+ ]),
+
+ createInstance: function (outer, iid) {
+ if (outer) {
+ throw Components.results.NS_ERROR_NO_AGGREGATION;
+ }
+
+ return this.QueryInterface(iid);
+ },
+
+ register: function () {
+ Services.obs.addObserver(this, 'document-element-inserted', true);
+
+ if (!this.modernFirefox) {
+ this.componentRegistrar
+ .registerFactory(this.classID,
+ this.classDescription,
+ this.contractID,
+ this);
+ this.categoryManager
+ .addCategoryEntry('content-policy',
+ this.contractID,
+ this.contractID,
+ false,
+ true);
+ }
+ },
+
+ unregister: function () {
+ Services.obs.removeObserver(this, 'document-element-inserted');
+
+ if (!this.modernFirefox) {
+ this.componentRegistrar
+ .unregisterFactory(this.classID,
+ this);
+ this.categoryManager
+ .deleteCategoryEntry('content-policy',
+ this.contractID,
+ false);
+ }
+ },
+
+ // https://developer.mozilla.org/en-US/docs/Mozilla/Tech/XPCOM/Reference/Interface/nsIContentPolicy
+ // https://bugzil.la/612921
+ shouldLoad: function (type, location, origin, context) {
+ if (!context) {
+ return this.ACCEPT;
+ }
+
+ if (!location.schemeIs('http') && !location.schemeIs('https')) {
+ return this.ACCEPT;
+ }
+
+ let contextWindow;
+ if (type === this.MAIN_FRAME) {
+ contextWindow = context.contentWindow || context;
+ } else if (type === this.SUB_FRAME) {
+ contextWindow = context.contentWindow;
+ } else {
+ contextWindow = (context.ownerDocument || context).defaultView;
+ }
+
+ // https://github.com/gorhill/uMatrix/issues/706
+ if (!contextWindow) {
+ return this.ACCEPT;
+ }
+
+ // The context for the toolbar popup is an iframe element here,
+ // so check context.top instead of context
+ if (!contextWindow.top || !contextWindow.location) {
+ return this.ACCEPT;
+ }
+
+ let messageManager = getMessageManager(contextWindow);
+ if (messageManager === null) {
+ return this.ACCEPT;
+ }
+
+ let details = {
+ rawType: type,
+ url: location.asciiSpec
+ };
+
+ if (typeof messageManager.sendRpcMessage === 'function') {
+ // https://bugzil.la/1092216
+ messageManager.sendRpcMessage(this.cpMessageName, details);
+ } else {
+ // Compatibility for older versions
+ messageManager.sendSyncMessage(this.cpMessageName, details);
+ }
+
+ return this.ACCEPT;
+ },
+
+ initContentScripts: function (win, sandbox) {
+ let messager = getMessageManager(win);
+ let sandboxId = hostName + ':sb:' + this.uniqueSandboxId++;
+
+ if (sandbox) {
+ let sandboxName = [
+ win.location.href.slice(0, 100),
+ win.document.title.slice(0, 100)
+ ].join(' | ');
+
+ // https://github.com/gorhill/uMatrix/issues/325
+ // "Pass sameZoneAs to sandbox constructor to make GCs cheaper"
+ sandbox = Cu.Sandbox([win], {
+ sameZoneAs: win.top,
+ sandboxName: sandboxId + '[' + sandboxName + ']',
+ sandboxPrototype: win,
+ wantComponents: false,
+ wantXHRConstructor: false
+ });
+
+ sandbox.injectScript = function (script) {
+ Services.scriptloader.loadSubScript(script, sandbox);
+ };
+ }
+ else {
+ sandbox = win;
+ }
+
+ sandbox._sandboxId_ = sandboxId;
+ sandbox.sendAsyncMessage = messager.sendAsyncMessage;
+
+ sandbox.addMessageListener = function (callback) {
+ if (sandbox._messageListener_) {
+ sandbox.removeMessageListener();
+ }
+
+ sandbox._messageListener_ = function (message) {
+ callback(message.data);
+ };
+
+ messager.addMessageListener(sandbox._sandboxId_,
+ sandbox._messageListener_);
+ messager.addMessageListener(hostName + ':broadcast',
+ sandbox._messageListener_);
+ };
+
+ sandbox.removeMessageListener = function () {
+ try {
+ messager.removeMessageListener(sandbox._sandboxId_,
+ sandbox._messageListener_);
+ messager.removeMessageListener(hostName + ':broadcast',
+ sandbox._messageListener_);
+ } catch (ex) {
+ // It throws sometimes, mostly when the popup closes
+ }
+
+ sandbox._messageListener_ = null;
+ };
+
+ return sandbox;
+ },
+
+ observe: function (doc) {
+ let win = doc.defaultView;
+ if (!win) {
+ return;
+ }
+
+ let loc = win.location;
+ if (!loc) {
+ return;
+ }
+
+ // https://github.com/gorhill/uBlock/issues/260
+ // TODO: We may have to skip more types, for now let's be
+ // conservative, i.e. let's not test against `text/html`.
+ if (doc.contentType.lastIndexOf('image/', 0) === 0) {
+ return;
+ }
+
+ if (loc.protocol !== 'http:'
+ && loc.protocol !== 'https:'
+ && loc.protocol !== 'file:') {
+ if (loc.protocol === 'chrome:' && loc.host === hostName) {
+ this.initContentScripts(win);
+ }
+
+ // What about data: and about:blank?
+ return;
+ }
+
+ let lss = Services.scriptloader.loadSubScript;
+ let sandbox = this.initContentScripts(win, true);
+
+ // Can throw with attempts at injecting into non-HTML document.
+ // Example: https://a.pomf.se/avonjf.webm
+ try {
+ lss(this.contentBaseURI + 'vapi-client.js', sandbox);
+ lss(this.contentBaseURI + 'contentscript-start.js', sandbox);
+ } catch (ex) {
+ return; // don't further try to inject anything
+ }
+
+ let docReady = (e) => {
+ let doc = e.target;
+ doc.removeEventListener(e.type, docReady, true);
+ lss(this.contentBaseURI + 'contentscript.js', sandbox);
+ };
+
+ if (doc.readyState === 'loading') {
+ doc.addEventListener('DOMContentLoaded', docReady, true);
+ } else {
+ docReady({
+ target: doc,
+ type: 'DOMContentLoaded',
+ });
+ }
+ }
+};
+
+var locationChangedMessageName = hostName + ':locationChanged';
+
+var LocationChangeListener = function (docShell) {
+ if (!docShell) {
+ return;
+ }
+
+ var requestor = docShell.QueryInterface(Ci.nsIInterfaceRequestor);
+ var ds = requestor.getInterface(Ci.nsIWebProgress);
+ var mm = requestor.getInterface(Ci.nsIContentFrameMessageManager);
+
+ if (ds && mm && typeof mm.sendAsyncMessage === 'function') {
+ this.docShell = ds;
+ this.messageManager = mm;
+ ds.addProgressListener(this, Ci.nsIWebProgress.NOTIFY_LOCATION);
+ }
+};
+
+LocationChangeListener.prototype.QueryInterface = XPCOMUtils.generateQI([
+ 'nsIWebProgressListener',
+ 'nsISupportsWeakReference'
+]);
+
+LocationChangeListener.prototype.onLocationChange =
+ function (webProgress, request, location, flags) {
+ if (!webProgress.isTopLevel) {
+ return;
+ }
+ this.messageManager.sendAsyncMessage(locationChangedMessageName, {
+ url: location.asciiSpec,
+ flags: flags,
+ });
+ };
+
+contentObserver.register();