OLD | NEW |
| (Empty) |
1 // Copyright (c) 2009 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "chrome/browser/privacy_blacklist/blacklist.h" | |
6 | |
7 #include <algorithm> | |
8 #include <limits> | |
9 #include <string> | |
10 | |
11 #include "base/file_path.h" | |
12 #include "base/file_util.h" | |
13 #include "base/string_util.h" | |
14 #include "chrome/browser/pref_service.h" | |
15 #include "chrome/browser/profile.h" | |
16 #include "chrome/common/pref_names.h" | |
17 #include "chrome/common/url_constants.h" | |
18 #include "net/http/http_util.h" | |
19 | |
20 namespace { | |
21 | |
22 const char* const cookie_headers[2] = { "cookie", "set-cookie" }; | |
23 | |
24 } // namespace | |
25 | |
26 const unsigned int Blacklist::kBlockAll = 1; | |
27 const unsigned int Blacklist::kBlockCookies = 1 << 1; | |
28 const unsigned int Blacklist::kDontSendReferrer = 1 << 2; | |
29 const unsigned int Blacklist::kDontSendUserAgent = 1 << 3; | |
30 const unsigned int Blacklist::kBlockUnsecure = 1 << 4; | |
31 const unsigned int Blacklist::kBlockRequest = kBlockAll | kBlockUnsecure; | |
32 const unsigned int Blacklist::kModifySentHeaders = | |
33 kBlockCookies | kDontSendUserAgent | kDontSendReferrer; | |
34 const unsigned int Blacklist::kModifyReceivedHeaders = kBlockCookies; | |
35 | |
36 // static | |
37 bool Blacklist::Matches(const std::string& pattern, const std::string& url) { | |
38 if (pattern.size() > url.size()) | |
39 return false; | |
40 | |
41 std::string::size_type p = 0; | |
42 std::string::size_type u = 0; | |
43 | |
44 while (pattern[p] != '\0' && url[u] != '\0') { | |
45 if (pattern[p] == '@') { | |
46 while (pattern[++p] == '@') {} // Consecutive @ are redundant. | |
47 | |
48 if (pattern[p] == '\0') | |
49 return true; // Nothing to match after the @. | |
50 | |
51 // Look for another wildcard to determine pattern-chunk. | |
52 std::string::size_type tp = pattern.find_first_of("@", p); | |
53 | |
54 // If it must match until the end, compare the last characters. | |
55 if (tp == std::string::npos) { | |
56 std::string::size_type ur = url.size() - u; | |
57 std::string::size_type pr = pattern.size() - p; | |
58 return (pr <= ur) && | |
59 (url.compare(url.size() - pr, pr, pattern.c_str() + p) == 0); | |
60 } | |
61 | |
62 // Else find the pattern chunk which is pattern[p:tp] | |
63 std::string::size_type tu = url.find(pattern.c_str() + p, u, tp - p); | |
64 if (tu == std::string::npos) | |
65 return false; // Pattern chunk not found. | |
66 | |
67 // Since tp is strictly greater than p, both u and p always increase. | |
68 u = tu + tp - p; | |
69 p = tp; | |
70 continue; | |
71 } | |
72 | |
73 // Match non-wildcard character. | |
74 if (pattern[p++] != url[u++]) | |
75 return false; | |
76 } | |
77 return pattern[p] == '\0'; | |
78 } | |
79 | |
80 bool Blacklist::Entry::IsBlocked(const GURL& url) const { | |
81 return (attributes_ & kBlockAll) || | |
82 ((attributes_ & kBlockUnsecure) && !url.SchemeIsSecure()); | |
83 } | |
84 | |
85 Blacklist::Entry::Entry(const std::string& pattern, const Provider* provider, | |
86 bool is_exception) | |
87 : attributes_(0), | |
88 is_exception_(is_exception), | |
89 pattern_(pattern), | |
90 provider_(provider) {} | |
91 | |
92 void Blacklist::Entry::AddAttributes(unsigned int attributes) { | |
93 attributes_ |= attributes; | |
94 } | |
95 | |
96 bool Blacklist::Match::IsBlocked(const GURL& url) const { | |
97 return (attributes() & kBlockAll) || | |
98 ((attributes() & kBlockUnsecure) && !url.SchemeIsSecure()); | |
99 } | |
100 | |
101 Blacklist::Match::Match() : matching_attributes_(0), exception_attributes_(0) {} | |
102 | |
103 void Blacklist::Match::AddEntry(const Entry* entry) { | |
104 if (entry->is_exception()) { | |
105 exception_attributes_ |= entry->attributes(); | |
106 exception_entries_.push_back(entry); | |
107 } else { | |
108 matching_attributes_ |= entry->attributes(); | |
109 matching_entries_.push_back(entry); | |
110 } | |
111 } | |
112 | |
113 Blacklist::Blacklist(PrefService* prefs) : prefs_(prefs) { | |
114 LoadPreferences(); | |
115 } | |
116 | |
117 Blacklist::~Blacklist() { | |
118 } | |
119 | |
120 void Blacklist::AddEntry(Entry* entry) { | |
121 DCHECK(entry); | |
122 blacklist_.push_back(linked_ptr<Entry>(entry)); | |
123 } | |
124 | |
125 void Blacklist::AddProvider(Provider* provider) { | |
126 DCHECK(provider); | |
127 providers_.push_back(linked_ptr<Provider>(provider)); | |
128 } | |
129 | |
130 // Returns a pointer to the Blacklist-owned entry which matches the given | |
131 // URL. If no matching Entry is found, returns null. | |
132 Blacklist::Match* Blacklist::FindMatch(const GURL& url) const { | |
133 // Never match something which is not http, https or ftp. | |
134 // TODO(idanan): Investigate if this would be an inclusion test instead of an | |
135 // exclusion test and if there are other schemes to test for. | |
136 if (!url.SchemeIs(chrome::kHttpScheme) && | |
137 !url.SchemeIs(chrome::kHttpsScheme) && | |
138 !url.SchemeIs(chrome::kFtpScheme)) | |
139 return 0; | |
140 std::string url_spec = GetURLAsLookupString(url); | |
141 Match* match = NULL; | |
142 for (EntryList::const_iterator i = blacklist_.begin(); | |
143 i != blacklist_.end(); ++i) { | |
144 if (Matches((*i)->pattern(), url_spec)) { | |
145 if (!match) | |
146 match = new Match; | |
147 match->AddEntry(i->get()); | |
148 } | |
149 } | |
150 return match; | |
151 } | |
152 | |
153 bool Blacklist::LoadEntryPreference(const ListValue& pref, | |
154 const Provider* provider) { | |
155 EntryList entries; | |
156 for (ListValue::const_iterator i = pref.begin(); i != pref.end(); ++i) { | |
157 if (!(*i)->IsType(Value::TYPE_DICTIONARY)) | |
158 return false; | |
159 const DictionaryValue* entry_pref = static_cast<DictionaryValue*>(*i); | |
160 std::string pattern; | |
161 int attributes; | |
162 bool is_exception; | |
163 if (!(entry_pref->GetString(L"pattern", &pattern) && | |
164 entry_pref->GetInteger(L"attributes", &attributes) && | |
165 entry_pref->GetBoolean(L"exception", &is_exception))) | |
166 return false; | |
167 Entry* entry = new Entry(pattern, provider, is_exception); | |
168 entry->AddAttributes(static_cast<unsigned int>(attributes)); | |
169 entries.push_back(linked_ptr<Entry>(entry)); | |
170 } | |
171 blacklist_.insert(blacklist_.end(), entries.begin(), entries.end()); | |
172 return true; | |
173 } | |
174 | |
175 bool Blacklist::LoadProviderPreference(const DictionaryValue& pref, | |
176 const std::wstring& path) { | |
177 std::string name, url; | |
178 ListValue* entries; | |
179 if (!(pref.GetString(L"name", &name) && pref.GetString(L"url", &url) && | |
180 pref.GetList(L"entries", &entries))) | |
181 return false; | |
182 linked_ptr<Provider> provider(new Provider(name, url, path)); | |
183 if (LoadEntryPreference(*entries, provider.get())) | |
184 providers_.push_back(provider); | |
185 return true; | |
186 return false; | |
187 } | |
188 | |
189 bool Blacklist::LoadPreferences() { | |
190 DCHECK(prefs_); | |
191 const DictionaryValue* blacklist_rules = prefs_->GetDictionary( | |
192 prefs::kPrivacyFilterRules); | |
193 if (!blacklist_rules) | |
194 return false; | |
195 bool result = true; | |
196 for (DictionaryValue::key_iterator key = blacklist_rules->begin_keys(); | |
197 key != blacklist_rules->end_keys(); ++key) { | |
198 DictionaryValue* provider; | |
199 if (!(blacklist_rules->GetDictionaryWithoutPathExpansion(*key, &provider) && | |
200 LoadProviderPreference(*provider, *key))) | |
201 result = false; | |
202 } | |
203 return result; | |
204 } | |
205 | |
206 // static | |
207 std::string Blacklist::GetURLAsLookupString(const GURL& url) { | |
208 std::string url_spec = url.host() + url.path(); | |
209 if (!url.query().empty()) | |
210 url_spec = url_spec + "?" + url.query(); | |
211 | |
212 return url_spec; | |
213 } | |
214 | |
215 // static | |
216 void Blacklist::RegisterUserPrefs(PrefService* user_prefs) { | |
217 user_prefs->RegisterDictionaryPref(prefs::kPrivacyFilterRules); | |
218 } | |
219 | |
220 // static | |
221 std::string Blacklist::StripCookies(const std::string& header) { | |
222 return net::HttpUtil::StripHeaders(header, cookie_headers, 2); | |
223 } | |
OLD | NEW |