summaryrefslogtreecommitdiffstats
path: root/application/basilisk/base/content/browser-safebrowsing.js
diff options
context:
space:
mode:
authorMatt A. Tobin <email@mattatobin.com>2018-02-02 03:32:58 -0500
committerMatt A. Tobin <email@mattatobin.com>2018-02-02 03:32:58 -0500
commite72ef92b5bdc43cd2584198e2e54e951b70299e8 (patch)
tree01ceb4a897c33eca9e7ccf2bc3aefbe530169fe5 /application/basilisk/base/content/browser-safebrowsing.js
parent0d19b77d3eaa5b8d837bf52c19759e68e42a1c4c (diff)
downloadUXP-e72ef92b5bdc43cd2584198e2e54e951b70299e8.tar
UXP-e72ef92b5bdc43cd2584198e2e54e951b70299e8.tar.gz
UXP-e72ef92b5bdc43cd2584198e2e54e951b70299e8.tar.lz
UXP-e72ef92b5bdc43cd2584198e2e54e951b70299e8.tar.xz
UXP-e72ef92b5bdc43cd2584198e2e54e951b70299e8.zip
Add Basilisk
Diffstat (limited to 'application/basilisk/base/content/browser-safebrowsing.js')
-rw-r--r--application/basilisk/base/content/browser-safebrowsing.js48
1 files changed, 48 insertions, 0 deletions
diff --git a/application/basilisk/base/content/browser-safebrowsing.js b/application/basilisk/base/content/browser-safebrowsing.js
new file mode 100644
index 000000000..b8b5976e3
--- /dev/null
+++ b/application/basilisk/base/content/browser-safebrowsing.js
@@ -0,0 +1,48 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+var gSafeBrowsing = {
+
+ setReportPhishingMenu() {
+ // In order to detect whether or not we're at the phishing warning
+ // page, we have to check the documentURI instead of the currentURI.
+ // This is because when the DocShell loads an error page, the
+ // currentURI stays at the original target, while the documentURI
+ // will point to the internal error page we loaded instead.
+ var docURI = gBrowser.selectedBrowser.documentURI;
+ var isPhishingPage =
+ docURI && docURI.spec.startsWith("about:blocked?e=deceptiveBlocked");
+
+ // Show/hide the appropriate menu item.
+ document.getElementById("menu_HelpPopup_reportPhishingtoolmenu")
+ .hidden = isPhishingPage;
+ document.getElementById("menu_HelpPopup_reportPhishingErrortoolmenu")
+ .hidden = !isPhishingPage;
+
+ var broadcasterId = isPhishingPage
+ ? "reportPhishingErrorBroadcaster"
+ : "reportPhishingBroadcaster";
+
+ var broadcaster = document.getElementById(broadcasterId);
+ if (!broadcaster)
+ return;
+
+ // Now look at the currentURI to learn which page we were trying
+ // to browse to.
+ let uri = gBrowser.currentURI;
+ if (uri && (uri.schemeIs("http") || uri.schemeIs("https")))
+ broadcaster.removeAttribute("disabled");
+ else
+ broadcaster.setAttribute("disabled", true);
+ },
+
+ /**
+ * Used to report a phishing page or a false positive
+ * @param name String One of "Phish", "Error", "Malware" or "MalwareError"
+ * @return String the report phishing URL.
+ */
+ getReportURL(name) {
+ return SafeBrowsing.getReportURL(name, gBrowser.currentURI);
+ }
+}