summaryrefslogtreecommitdiffstats
path: root/application/basilisk/base/content/browser-safebrowsing.js
diff options
context:
space:
mode:
authorMatt A. Tobin <email@mattatobin.com>2019-12-16 13:57:01 -0500
committerMatt A. Tobin <email@mattatobin.com>2019-12-16 13:57:01 -0500
commit06494f307850c576868831bd28a61464eab1f359 (patch)
treef281f5c46c3e0b73c7eabe22f02622dc013b0c35 /application/basilisk/base/content/browser-safebrowsing.js
parente7d4713e0765c79feddf2384d343d10595fa5cb3 (diff)
downloadUXP-06494f307850c576868831bd28a61464eab1f359.tar
UXP-06494f307850c576868831bd28a61464eab1f359.tar.gz
UXP-06494f307850c576868831bd28a61464eab1f359.tar.lz
UXP-06494f307850c576868831bd28a61464eab1f359.tar.xz
UXP-06494f307850c576868831bd28a61464eab1f359.zip
Remove Basilisk from the Unified XUL Platform repository
Development will proceed at https://github.com/MoonchildProductions/Basilisk
Diffstat (limited to 'application/basilisk/base/content/browser-safebrowsing.js')
-rw-r--r--application/basilisk/base/content/browser-safebrowsing.js48
1 files changed, 0 insertions, 48 deletions
diff --git a/application/basilisk/base/content/browser-safebrowsing.js b/application/basilisk/base/content/browser-safebrowsing.js
deleted file mode 100644
index 430d84f13..000000000
--- a/application/basilisk/base/content/browser-safebrowsing.js
+++ /dev/null
@@ -1,48 +0,0 @@
-/* This Source Code Form is subject to the terms of the Mozilla Public
- * License, v. 2.0. If a copy of the MPL was not distributed with this
- * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
-
-var gSafeBrowsing = {
-
- setReportPhishingMenu: function() {
- // In order to detect whether or not we're at the phishing warning
- // page, we have to check the documentURI instead of the currentURI.
- // This is because when the DocShell loads an error page, the
- // currentURI stays at the original target, while the documentURI
- // will point to the internal error page we loaded instead.
- var docURI = gBrowser.selectedBrowser.documentURI;
- var isPhishingPage =
- docURI && docURI.spec.startsWith("about:blocked?e=deceptiveBlocked");
-
- // Show/hide the appropriate menu item.
- document.getElementById("menu_HelpPopup_reportPhishingtoolmenu")
- .hidden = isPhishingPage;
- document.getElementById("menu_HelpPopup_reportPhishingErrortoolmenu")
- .hidden = !isPhishingPage;
-
- var broadcasterId = isPhishingPage
- ? "reportPhishingErrorBroadcaster"
- : "reportPhishingBroadcaster";
-
- var broadcaster = document.getElementById(broadcasterId);
- if (!broadcaster)
- return;
-
- // Now look at the currentURI to learn which page we were trying
- // to browse to.
- let uri = gBrowser.currentURI;
- if (uri && (uri.schemeIs("http") || uri.schemeIs("https")))
- broadcaster.removeAttribute("disabled");
- else
- broadcaster.setAttribute("disabled", true);
- },
-
- /**
- * Used to report a phishing page or a false positive
- * @param name String One of "Phish", "Error", "Malware" or "MalwareError"
- * @return String the report phishing URL.
- */
- getReportURL: function(name) {
- return SafeBrowsing.getReportURL(name, gBrowser.currentURI);
- }
-}