Bug 1874684 - Part 4: Prefer const references instead of copying Instant values....
[gecko.git] / netwerk / url-classifier / UrlClassifierFeatureTrackingAnnotation.cpp
blob518bde65ef6d1583485967a33974d6ff9473f2be
1 /* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* vim: set ts=8 sts=2 et sw=2 tw=80: */
3 /* This Source Code Form is subject to the terms of the Mozilla Public
4 * License, v. 2.0. If a copy of the MPL was not distributed with this
5 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
7 #include "UrlClassifierFeatureTrackingAnnotation.h"
9 #include "Classifier.h"
10 #include "mozilla/Logging.h"
11 #include "mozilla/StaticPrefs_privacy.h"
12 #include "mozilla/StaticPtr.h"
13 #include "mozilla/net/UrlClassifierCommon.h"
14 #include "nsIChannel.h"
15 #include "nsIClassifiedChannel.h"
16 #include "nsIWebProgressListener.h"
17 #include "nsContentUtils.h"
19 namespace mozilla {
20 namespace net {
22 namespace {
24 #define TRACKING_ANNOTATION_FEATURE_NAME "tracking-annotation"
26 #define URLCLASSIFIER_ANNOTATION_BLOCKLIST \
27 "urlclassifier.trackingAnnotationTable"
28 #define URLCLASSIFIER_ANNOTATION_BLOCKLIST_TEST_ENTRIES \
29 "urlclassifier.trackingAnnotationTable.testEntries"
30 #define URLCLASSIFIER_ANNOTATION_ENTITYLIST \
31 "urlclassifier.trackingAnnotationWhitelistTable"
32 #define URLCLASSIFIER_ANNOTATION_ENTITYLIST_TEST_ENTRIES \
33 "urlclassifier.trackingAnnotationWhitelistTable.testEntries"
34 #define URLCLASSIFIER_TRACKING_ANNOTATION_EXCEPTION_URLS \
35 "urlclassifier.trackingAnnotationSkipURLs"
36 #define TABLE_ANNOTATION_BLOCKLIST_PREF "annotation-blacklist-pref"
37 #define TABLE_ANNOTATION_ENTITYLIST_PREF "annotation-whitelist-pref"
39 StaticRefPtr<UrlClassifierFeatureTrackingAnnotation> gFeatureTrackingAnnotation;
41 } // namespace
43 UrlClassifierFeatureTrackingAnnotation::UrlClassifierFeatureTrackingAnnotation()
44 : UrlClassifierFeatureAntiTrackingBase(
45 nsLiteralCString(TRACKING_ANNOTATION_FEATURE_NAME),
46 nsLiteralCString(URLCLASSIFIER_ANNOTATION_BLOCKLIST),
47 nsLiteralCString(URLCLASSIFIER_ANNOTATION_ENTITYLIST),
48 nsLiteralCString(URLCLASSIFIER_ANNOTATION_BLOCKLIST_TEST_ENTRIES),
49 nsLiteralCString(URLCLASSIFIER_ANNOTATION_ENTITYLIST_TEST_ENTRIES),
50 nsLiteralCString(TABLE_ANNOTATION_BLOCKLIST_PREF),
51 nsLiteralCString(TABLE_ANNOTATION_ENTITYLIST_PREF),
52 nsLiteralCString(URLCLASSIFIER_TRACKING_ANNOTATION_EXCEPTION_URLS)) {}
54 /* static */ const char* UrlClassifierFeatureTrackingAnnotation::Name() {
55 return TRACKING_ANNOTATION_FEATURE_NAME;
58 /* static */
59 void UrlClassifierFeatureTrackingAnnotation::MaybeInitialize() {
60 MOZ_ASSERT(XRE_IsParentProcess());
61 UC_LOG_LEAK(("UrlClassifierFeatureTrackingAnnotation::MaybeInitialize"));
63 if (!gFeatureTrackingAnnotation) {
64 gFeatureTrackingAnnotation = new UrlClassifierFeatureTrackingAnnotation();
65 gFeatureTrackingAnnotation->InitializePreferences();
69 /* static */
70 void UrlClassifierFeatureTrackingAnnotation::MaybeShutdown() {
71 UC_LOG_LEAK(("UrlClassifierFeatureTrackingAnnotation::MaybeShutdown"));
73 if (gFeatureTrackingAnnotation) {
74 gFeatureTrackingAnnotation->ShutdownPreferences();
75 gFeatureTrackingAnnotation = nullptr;
79 /* static */
80 already_AddRefed<UrlClassifierFeatureTrackingAnnotation>
81 UrlClassifierFeatureTrackingAnnotation::MaybeCreate(nsIChannel* aChannel) {
82 MOZ_ASSERT(aChannel);
84 UC_LOG_LEAK(
85 ("UrlClassifierFeatureTrackingAnnotation::MaybeCreate - channel %p",
86 aChannel));
88 if (!StaticPrefs::privacy_trackingprotection_annotate_channels()) {
89 return nullptr;
92 MaybeInitialize();
93 MOZ_ASSERT(gFeatureTrackingAnnotation);
95 RefPtr<UrlClassifierFeatureTrackingAnnotation> self =
96 gFeatureTrackingAnnotation;
97 return self.forget();
100 /* static */
101 already_AddRefed<nsIUrlClassifierFeature>
102 UrlClassifierFeatureTrackingAnnotation::GetIfNameMatches(
103 const nsACString& aName) {
104 if (!aName.EqualsLiteral(TRACKING_ANNOTATION_FEATURE_NAME)) {
105 return nullptr;
108 MaybeInitialize();
109 MOZ_ASSERT(gFeatureTrackingAnnotation);
111 RefPtr<UrlClassifierFeatureTrackingAnnotation> self =
112 gFeatureTrackingAnnotation;
113 return self.forget();
116 NS_IMETHODIMP
117 UrlClassifierFeatureTrackingAnnotation::ProcessChannel(
118 nsIChannel* aChannel, const nsTArray<nsCString>& aList,
119 const nsTArray<nsCString>& aHashes, bool* aShouldContinue) {
120 NS_ENSURE_ARG_POINTER(aChannel);
121 NS_ENSURE_ARG_POINTER(aShouldContinue);
123 // This is not a blocking feature.
124 *aShouldContinue = true;
126 UC_LOG(
127 ("UrlClassifierFeatureTrackingAnnotation::ProcessChannel - "
128 "annotating channel %p",
129 aChannel));
131 static std::vector<UrlClassifierCommon::ClassificationData>
132 sClassificationData = {
133 {"ads-track-"_ns,
134 nsIClassifiedChannel::ClassificationFlags::CLASSIFIED_TRACKING_AD},
135 {"analytics-track-"_ns, nsIClassifiedChannel::ClassificationFlags::
136 CLASSIFIED_TRACKING_ANALYTICS},
137 {"social-track-"_ns, nsIClassifiedChannel::ClassificationFlags::
138 CLASSIFIED_TRACKING_SOCIAL},
139 {"content-track-"_ns, nsIClassifiedChannel::ClassificationFlags::
140 CLASSIFIED_TRACKING_CONTENT},
143 uint32_t flags = UrlClassifierCommon::TablesToClassificationFlags(
144 aList, sClassificationData,
145 nsIClassifiedChannel::ClassificationFlags::CLASSIFIED_TRACKING);
147 UrlClassifierCommon::SetTrackingInfo(aChannel, aList, aHashes);
149 uint32_t notification =
150 ((flags & nsIClassifiedChannel::ClassificationFlags::
151 CLASSIFIED_TRACKING_CONTENT) != 0)
152 ? nsIWebProgressListener::STATE_LOADED_LEVEL_2_TRACKING_CONTENT
153 : nsIWebProgressListener::STATE_LOADED_LEVEL_1_TRACKING_CONTENT;
155 UrlClassifierCommon::AnnotateChannel(aChannel, flags, notification);
157 return NS_OK;
160 NS_IMETHODIMP
161 UrlClassifierFeatureTrackingAnnotation::GetURIByListType(
162 nsIChannel* aChannel, nsIUrlClassifierFeature::listType aListType,
163 nsIUrlClassifierFeature::URIType* aURIType, nsIURI** aURI) {
164 NS_ENSURE_ARG_POINTER(aChannel);
165 NS_ENSURE_ARG_POINTER(aURIType);
166 NS_ENSURE_ARG_POINTER(aURI);
168 if (aListType == nsIUrlClassifierFeature::blocklist) {
169 *aURIType = nsIUrlClassifierFeature::blocklistURI;
170 return aChannel->GetURI(aURI);
173 MOZ_ASSERT(aListType == nsIUrlClassifierFeature::entitylist);
175 *aURIType = nsIUrlClassifierFeature::pairwiseEntitylistURI;
176 return UrlClassifierCommon::CreatePairwiseEntityListURI(aChannel, aURI);
179 } // namespace net
180 } // namespace mozilla