summaryrefslogtreecommitdiffstats
path: root/toolkit/components/securityreporter/SecurityReporter.js
diff options
context:
space:
mode:
authorMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
committerMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
commit5f8de423f190bbb79a62f804151bc24824fa32d8 (patch)
tree10027f336435511475e392454359edea8e25895d /toolkit/components/securityreporter/SecurityReporter.js
parent49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff)
downloadUXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip
Add m-esr52 at 52.6.0
Diffstat (limited to 'toolkit/components/securityreporter/SecurityReporter.js')
-rw-r--r--toolkit/components/securityreporter/SecurityReporter.js112
1 files changed, 112 insertions, 0 deletions
diff --git a/toolkit/components/securityreporter/SecurityReporter.js b/toolkit/components/securityreporter/SecurityReporter.js
new file mode 100644
index 000000000..9ca1e5546
--- /dev/null
+++ b/toolkit/components/securityreporter/SecurityReporter.js
@@ -0,0 +1,112 @@
+/* -*- indent-tabs-mode: nil; js-indent-level: 2 -*- */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+const { classes: Cc, interfaces: Ci, utils: Cu} = Components;
+
+Cu.importGlobalProperties(['fetch']);
+
+const { XPCOMUtils } = Cu.import("resource://gre/modules/XPCOMUtils.jsm", {});
+const protocolHandler = Cc["@mozilla.org/network/protocol;1?name=http"]
+ .getService(Ci.nsIHttpProtocolHandler);
+const { Services } = Cu.import("resource://gre/modules/Services.jsm", {});
+
+const TLS_ERROR_REPORT_TELEMETRY_SUCCESS = 6;
+const TLS_ERROR_REPORT_TELEMETRY_FAILURE = 7;
+const HISTOGRAM_ID = "TLS_ERROR_REPORT_UI";
+
+
+XPCOMUtils.defineLazyModuleGetter(this, "UpdateUtils",
+ "resource://gre/modules/UpdateUtils.jsm");
+
+function getDERString(cert)
+{
+ var length = {};
+ var derArray = cert.getRawDER(length);
+ var derString = '';
+ for (var i = 0; i < derArray.length; i++) {
+ derString += String.fromCharCode(derArray[i]);
+ }
+ return derString;
+}
+
+function SecurityReporter() { }
+
+SecurityReporter.prototype = {
+ classDescription: "Security reporter component",
+ classID: Components.ID("{8a997c9a-bea1-11e5-a1fa-be6aBc8e7f8b}"),
+ contractID: "@mozilla.org/securityreporter;1",
+ QueryInterface: XPCOMUtils.generateQI([Ci.nsISecurityReporter]),
+ reportTLSError: function(transportSecurityInfo, hostname, port) {
+ // don't send if there's no transportSecurityInfo (since the report cannot
+ // contain anything of interest)
+ if (!transportSecurityInfo) {
+ return;
+ }
+
+ // don't send a report if the pref is not enabled
+ if (!Services.prefs.getBoolPref("security.ssl.errorReporting.enabled")) {
+ return;
+ }
+
+ // Don't send a report if the host we're connecting to is the report
+ // server (otherwise we'll get loops when this fails)
+ let endpoint =
+ Services.prefs.getCharPref("security.ssl.errorReporting.url");
+ let reportURI = Services.io.newURI(endpoint, null, null);
+
+ if (reportURI.host == hostname) {
+ return;
+ }
+
+ // Convert the nsIX509CertList into a format that can be parsed into
+ // JSON
+ let asciiCertChain = [];
+
+ if (transportSecurityInfo.failedCertChain) {
+ let certs = transportSecurityInfo.failedCertChain.getEnumerator();
+ while (certs.hasMoreElements()) {
+ let cert = certs.getNext();
+ cert.QueryInterface(Ci.nsIX509Cert);
+ asciiCertChain.push(btoa(getDERString(cert)));
+ }
+ }
+
+ let report = {
+ hostname: hostname,
+ port: port,
+ timestamp: Math.round(Date.now() / 1000),
+ errorCode: transportSecurityInfo.errorCode,
+ failedCertChain: asciiCertChain,
+ userAgent: protocolHandler.userAgent,
+ version: 1,
+ build: Services.appinfo.appBuildID,
+ product: Services.appinfo.name,
+ channel: UpdateUtils.UpdateChannel
+ }
+
+ fetch(endpoint, {
+ method: "POST",
+ body: JSON.stringify(report),
+ headers: {
+ 'Content-Type': 'application/json'
+ }
+ }).then(function (aResponse) {
+ if (!aResponse.ok) {
+ // request returned non-success status
+ Services.telemetry.getHistogramById(HISTOGRAM_ID)
+ .add(TLS_ERROR_REPORT_TELEMETRY_FAILURE);
+ } else {
+ Services.telemetry.getHistogramById(HISTOGRAM_ID)
+ .add(TLS_ERROR_REPORT_TELEMETRY_SUCCESS);
+ }
+ }).catch(function (e) {
+ // error making request to reportURL
+ Services.telemetry.getHistogramById(HISTOGRAM_ID)
+ .add(TLS_ERROR_REPORT_TELEMETRY_FAILURE);
+ });
+ }
+};
+
+this.NSGetFactory = XPCOMUtils.generateNSGetFactory([SecurityReporter]);