mirror of
https://github.com/Feodor2/Mypal68.git
synced 2025-06-18 14:55:44 -04:00
409 lines
13 KiB
JavaScript
409 lines
13 KiB
JavaScript
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
/* import-globals-from pippki.js */
|
|
"use strict";
|
|
|
|
var gDialog;
|
|
var gSecInfo;
|
|
var gCert;
|
|
var gChecking;
|
|
var gBroken;
|
|
var gNeedReset;
|
|
var gSecHistogram;
|
|
|
|
const { PrivateBrowsingUtils } = ChromeUtils.import(
|
|
"resource://gre/modules/PrivateBrowsingUtils.jsm"
|
|
);
|
|
|
|
function initExceptionDialog() {
|
|
gNeedReset = false;
|
|
gDialog = document.getElementById("exceptiondialog");
|
|
gSecHistogram = Services.telemetry.getHistogramById("SECURITY_UI");
|
|
let warningText = document.getElementById("warningText");
|
|
document.l10n.setAttributes(warningText, "add-exception-branded-warning");
|
|
let confirmButton = gDialog.getButton("extra1");
|
|
let l10nUpdatedElements = [confirmButton, warningText];
|
|
confirmButton.disabled = true;
|
|
|
|
var args = window.arguments;
|
|
if (args && args[0]) {
|
|
if (args[0].location) {
|
|
// We were pre-seeded with a location.
|
|
document.getElementById("locationTextBox").value = args[0].location;
|
|
document.getElementById("checkCertButton").disabled = false;
|
|
|
|
if (args[0].securityInfo) {
|
|
gSecInfo = args[0].securityInfo;
|
|
gCert = gSecInfo.serverCert;
|
|
gBroken = true;
|
|
l10nUpdatedElements = l10nUpdatedElements.concat(updateCertStatus());
|
|
} else if (args[0].prefetchCert) {
|
|
// We can optionally pre-fetch the certificate too. Don't do this
|
|
// synchronously, since it would prevent the window from appearing
|
|
// until the fetch is completed, which could be multiple seconds.
|
|
// Instead, let's use a timer to spawn the actual fetch, but update
|
|
// the dialog to "checking..." state right away, so that the UI
|
|
// is appropriately responsive. Bug 453855
|
|
document.getElementById("checkCertButton").disabled = true;
|
|
gChecking = true;
|
|
l10nUpdatedElements = l10nUpdatedElements.concat(updateCertStatus());
|
|
|
|
window.setTimeout(checkCert, 0);
|
|
}
|
|
}
|
|
|
|
// Set out parameter to false by default
|
|
args[0].exceptionAdded = false;
|
|
}
|
|
|
|
for (let id of [
|
|
"warningSupplemental",
|
|
"certLocationLabel",
|
|
"checkCertButton",
|
|
"statusDescription",
|
|
"statusLongDescription",
|
|
"viewCertButton",
|
|
"permanent",
|
|
]) {
|
|
let element = document.getElementById(id);
|
|
l10nUpdatedElements.push(element);
|
|
}
|
|
|
|
document.l10n
|
|
.translateElements(l10nUpdatedElements)
|
|
.then(() => window.sizeToContent());
|
|
|
|
document.addEventListener("dialogextra1", addException);
|
|
document.addEventListener("dialogextra2", checkCert);
|
|
}
|
|
|
|
/**
|
|
* Helper function for checkCert. Set as the onerror/onload callbacks for an
|
|
* XMLHttpRequest. Sets gSecInfo, gCert, gBroken, and gChecking according to
|
|
* the load information from the request. Probably should not be used directly.
|
|
*
|
|
* @param {XMLHttpRequest} req
|
|
* The XMLHttpRequest created and sent by checkCert.
|
|
* @param {Event} evt
|
|
* The load or error event.
|
|
*/
|
|
function grabCert(req, evt) {
|
|
if (req.channel && req.channel.securityInfo) {
|
|
gSecInfo = req.channel.securityInfo.QueryInterface(
|
|
Ci.nsITransportSecurityInfo
|
|
);
|
|
gCert = gSecInfo ? gSecInfo.serverCert : null;
|
|
}
|
|
gBroken = evt.type == "error";
|
|
gChecking = false;
|
|
document.l10n
|
|
.translateElements(updateCertStatus())
|
|
.then(() => window.sizeToContent());
|
|
}
|
|
|
|
/**
|
|
* Attempt to download the certificate for the location specified, and populate
|
|
* the Certificate Status section with the result.
|
|
*/
|
|
async function checkCert() {
|
|
gCert = null;
|
|
gSecInfo = null;
|
|
gChecking = true;
|
|
gBroken = false;
|
|
await document.l10n.translateElements(updateCertStatus());
|
|
window.sizeToContent();
|
|
|
|
let uri = getURI();
|
|
|
|
if (uri) {
|
|
let req = new XMLHttpRequest();
|
|
req.open("GET", uri.prePath);
|
|
req.onerror = grabCert.bind(this, req);
|
|
req.onload = grabCert.bind(this, req);
|
|
req.send(null);
|
|
} else {
|
|
gChecking = false;
|
|
await document.l10n.translateElements(updateCertStatus());
|
|
window.sizeToContent();
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Build and return a URI, based on the information supplied in the
|
|
* Certificate Location fields
|
|
*
|
|
* @returns {nsIURI}
|
|
* URI constructed from the information supplied on success, null
|
|
* otherwise.
|
|
*/
|
|
function getURI() {
|
|
// Use fixup service instead of just ioservice's newURI since it's quite
|
|
// likely that the host will be supplied without a protocol prefix, resulting
|
|
// in malformed uri exceptions being thrown.
|
|
let locationTextBox = document.getElementById("locationTextBox");
|
|
let uri = Services.uriFixup.createFixupURI(locationTextBox.value, 0);
|
|
|
|
if (!uri) {
|
|
return null;
|
|
}
|
|
|
|
let mutator = uri.mutate();
|
|
if (uri.scheme == "http") {
|
|
mutator.setScheme("https");
|
|
}
|
|
|
|
if (uri.port == -1) {
|
|
mutator.setPort(443);
|
|
}
|
|
|
|
return mutator.finalize();
|
|
}
|
|
|
|
function resetDialog() {
|
|
document.getElementById("viewCertButton").disabled = true;
|
|
document.getElementById("permanent").disabled = true;
|
|
gDialog.getButton("extra1").disabled = true;
|
|
setText("headerDescription", "");
|
|
setText("statusDescription", "");
|
|
setText("statusLongDescription", "");
|
|
setText("status2Description", "");
|
|
setText("status2LongDescription", "");
|
|
setText("status3Description", "");
|
|
setText("status3LongDescription", "");
|
|
window.sizeToContent();
|
|
}
|
|
|
|
/**
|
|
* Called by input textboxes to manage UI state
|
|
*/
|
|
function handleTextChange() {
|
|
var checkCertButton = document.getElementById("checkCertButton");
|
|
checkCertButton.disabled = !document.getElementById("locationTextBox").value;
|
|
if (gNeedReset) {
|
|
gNeedReset = false;
|
|
resetDialog();
|
|
}
|
|
}
|
|
|
|
function updateCertStatus() {
|
|
var shortDesc, longDesc;
|
|
var shortDesc2, longDesc2;
|
|
var shortDesc3, longDesc3;
|
|
var use2 = false;
|
|
var use3 = false;
|
|
let bucketId =
|
|
Ci.nsISecurityUITelemetry.WARNING_BAD_CERT_TOP_ADD_EXCEPTION_BASE;
|
|
let l10nUpdatedElements = [];
|
|
if (gCert) {
|
|
if (gBroken) {
|
|
var mms = "add-exception-domain-mismatch-short";
|
|
var mml = "add-exception-domain-mismatch-long";
|
|
var exs = "add-exception-expired-short";
|
|
var exl = "add-exception-expired-long";
|
|
var uts = "add-exception-unverified-or-bad-signature-short";
|
|
var utl = "add-exception-unverified-or-bad-signature-long";
|
|
var use1 = false;
|
|
if (gSecInfo.isDomainMismatch) {
|
|
bucketId +=
|
|
Ci.nsISecurityUITelemetry
|
|
.WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_DOMAIN;
|
|
use1 = true;
|
|
shortDesc = mms;
|
|
longDesc = mml;
|
|
}
|
|
if (gSecInfo.isNotValidAtThisTime) {
|
|
bucketId +=
|
|
Ci.nsISecurityUITelemetry
|
|
.WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_TIME;
|
|
if (!use1) {
|
|
use1 = true;
|
|
shortDesc = exs;
|
|
longDesc = exl;
|
|
} else {
|
|
use2 = true;
|
|
shortDesc2 = exs;
|
|
longDesc2 = exl;
|
|
}
|
|
}
|
|
if (gSecInfo.isUntrusted) {
|
|
bucketId +=
|
|
Ci.nsISecurityUITelemetry
|
|
.WARNING_BAD_CERT_TOP_ADD_EXCEPTION_FLAG_UNTRUSTED;
|
|
if (!use1) {
|
|
use1 = true;
|
|
shortDesc = uts;
|
|
longDesc = utl;
|
|
} else if (!use2) {
|
|
use2 = true;
|
|
shortDesc2 = uts;
|
|
longDesc2 = utl;
|
|
} else {
|
|
use3 = true;
|
|
shortDesc3 = uts;
|
|
longDesc3 = utl;
|
|
}
|
|
}
|
|
gSecHistogram.add(bucketId);
|
|
|
|
// In these cases, we do want to enable the "Add Exception" button
|
|
gDialog.getButton("extra1").disabled = false;
|
|
|
|
// If the Private Browsing service is available and the mode is active,
|
|
// don't store permanent exceptions, since they would persist after
|
|
// private browsing mode was disabled.
|
|
var inPrivateBrowsing = inPrivateBrowsingMode();
|
|
var pe = document.getElementById("permanent");
|
|
pe.disabled = inPrivateBrowsing;
|
|
pe.checked = !inPrivateBrowsing;
|
|
|
|
let headerDescription = document.getElementById("headerDescription");
|
|
document.l10n.setAttributes(
|
|
headerDescription,
|
|
"add-exception-invalid-header"
|
|
);
|
|
l10nUpdatedElements.push(headerDescription);
|
|
} else {
|
|
shortDesc = "add-exception-valid-short";
|
|
longDesc = "add-exception-valid-long";
|
|
gDialog.getButton("extra1").disabled = true;
|
|
document.getElementById("permanent").disabled = true;
|
|
}
|
|
|
|
// We're done checking the certificate, so allow the user to check it again.
|
|
document.getElementById("checkCertButton").disabled = false;
|
|
document.getElementById("viewCertButton").disabled = false;
|
|
|
|
// Notify observers about the availability of the certificate
|
|
Services.obs.notifyObservers(null, "cert-exception-ui-ready");
|
|
} else if (gChecking) {
|
|
shortDesc = "add-exception-checking-short";
|
|
longDesc = "add-exception-checking-long";
|
|
// We're checking the certificate, so we disable the Get Certificate
|
|
// button to make sure that the user can't interrupt the process and
|
|
// trigger another certificate fetch.
|
|
document.getElementById("checkCertButton").disabled = true;
|
|
document.getElementById("viewCertButton").disabled = true;
|
|
gDialog.getButton("extra1").disabled = true;
|
|
document.getElementById("permanent").disabled = true;
|
|
} else {
|
|
shortDesc = "add-exception-no-cert-short";
|
|
longDesc = "add-exception-no-cert-long";
|
|
// We're done checking the certificate, so allow the user to check it again.
|
|
document.getElementById("checkCertButton").disabled = false;
|
|
document.getElementById("viewCertButton").disabled = true;
|
|
gDialog.getButton("extra1").disabled = true;
|
|
document.getElementById("permanent").disabled = true;
|
|
}
|
|
let statusDescription = document.getElementById("statusDescription");
|
|
let statusLongDescription = document.getElementById("statusLongDescription");
|
|
document.l10n.setAttributes(statusDescription, shortDesc);
|
|
document.l10n.setAttributes(statusLongDescription, longDesc);
|
|
l10nUpdatedElements.push(statusDescription);
|
|
l10nUpdatedElements.push(statusLongDescription);
|
|
|
|
if (use2) {
|
|
let status2Description = document.getElementById("status2Description");
|
|
let status2LongDescription = document.getElementById(
|
|
"status2LongDescription"
|
|
);
|
|
document.l10n.setAttributes(status2Description, shortDesc2);
|
|
document.l10n.setAttributes(status2LongDescription, longDesc2);
|
|
l10nUpdatedElements.push(status2Description);
|
|
l10nUpdatedElements.push(status2LongDescription);
|
|
}
|
|
|
|
if (use3) {
|
|
let status3Description = document.getElementById("status3Description");
|
|
let status3LongDescription = document.getElementById(
|
|
"status3LongDescription"
|
|
);
|
|
document.l10n.setAttributes(status3Description, shortDesc3);
|
|
document.l10n.setAttributes(status3LongDescription, longDesc3);
|
|
l10nUpdatedElements.push(status3Description);
|
|
l10nUpdatedElements.push(status3LongDescription);
|
|
}
|
|
|
|
gNeedReset = true;
|
|
return l10nUpdatedElements;
|
|
}
|
|
|
|
/**
|
|
* Handle user request to display certificate details
|
|
*/
|
|
function viewCertButtonClick() {
|
|
gSecHistogram.add(
|
|
Ci.nsISecurityUITelemetry.WARNING_BAD_CERT_TOP_CLICK_VIEW_CERT
|
|
);
|
|
if (gCert) {
|
|
viewCertHelper(this, gCert);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Handle user request to add an exception for the specified cert
|
|
*/
|
|
function addException() {
|
|
if (!gCert || !gSecInfo) {
|
|
return;
|
|
}
|
|
|
|
var overrideService = Cc["@mozilla.org/security/certoverride;1"].getService(
|
|
Ci.nsICertOverrideService
|
|
);
|
|
var flags = 0;
|
|
let confirmBucketId =
|
|
Ci.nsISecurityUITelemetry.WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_BASE;
|
|
if (gSecInfo.isUntrusted) {
|
|
flags |= overrideService.ERROR_UNTRUSTED;
|
|
confirmBucketId +=
|
|
Ci.nsISecurityUITelemetry
|
|
.WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_UNTRUSTED;
|
|
}
|
|
if (gSecInfo.isDomainMismatch) {
|
|
flags |= overrideService.ERROR_MISMATCH;
|
|
confirmBucketId +=
|
|
Ci.nsISecurityUITelemetry
|
|
.WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_DOMAIN;
|
|
}
|
|
if (gSecInfo.isNotValidAtThisTime) {
|
|
flags |= overrideService.ERROR_TIME;
|
|
confirmBucketId +=
|
|
Ci.nsISecurityUITelemetry
|
|
.WARNING_BAD_CERT_TOP_CONFIRM_ADD_EXCEPTION_FLAG_TIME;
|
|
}
|
|
|
|
var permanentCheckbox = document.getElementById("permanent");
|
|
var shouldStorePermanently =
|
|
permanentCheckbox.checked && !inPrivateBrowsingMode();
|
|
if (!permanentCheckbox.checked) {
|
|
gSecHistogram.add(
|
|
Ci.nsISecurityUITelemetry.WARNING_BAD_CERT_TOP_DONT_REMEMBER_EXCEPTION
|
|
);
|
|
}
|
|
|
|
gSecHistogram.add(confirmBucketId);
|
|
var uri = getURI();
|
|
overrideService.rememberValidityOverride(
|
|
uri.asciiHost,
|
|
uri.port,
|
|
gCert,
|
|
flags,
|
|
!shouldStorePermanently
|
|
);
|
|
|
|
let args = window.arguments;
|
|
if (args && args[0]) {
|
|
args[0].exceptionAdded = true;
|
|
}
|
|
|
|
gDialog.acceptDialog();
|
|
}
|
|
|
|
/**
|
|
* @returns {Boolean} Whether this dialog is in private browsing mode.
|
|
*/
|
|
function inPrivateBrowsingMode() {
|
|
return PrivateBrowsingUtils.isWindowPrivate(window);
|
|
}
|