mirror of
https://github.com/kremalicious/metamask-extension.git
synced 2024-12-23 09:52:26 +01:00
Add ability to whitelist a blacklisted domain at runtime
This commit is contained in:
parent
343ae7c143
commit
4dd6c8168f
@ -29,6 +29,7 @@ class BlacklistController {
|
|||||||
constructor (opts = {}) {
|
constructor (opts = {}) {
|
||||||
const initState = extend({
|
const initState = extend({
|
||||||
phishing: PHISHING_DETECTION_CONFIG,
|
phishing: PHISHING_DETECTION_CONFIG,
|
||||||
|
whitelist: [],
|
||||||
}, opts.initState)
|
}, opts.initState)
|
||||||
this.store = new ObservableStore(initState)
|
this.store = new ObservableStore(initState)
|
||||||
// phishing detector
|
// phishing detector
|
||||||
@ -38,6 +39,21 @@ class BlacklistController {
|
|||||||
this._phishingUpdateIntervalRef = null
|
this._phishingUpdateIntervalRef = null
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Adds the given hostname to the runtime whitelist
|
||||||
|
* @param {string} hostname the hostname to whitelist
|
||||||
|
*/
|
||||||
|
whitelistDomain (hostname) {
|
||||||
|
if (!hostname) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
const { whitelist } = this.store.getState()
|
||||||
|
this.store.updateState({
|
||||||
|
whitelist: [...new Set([hostname, ...whitelist])],
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Given a url, returns the result of checking if that url is in the store.phishing blacklist
|
* Given a url, returns the result of checking if that url is in the store.phishing blacklist
|
||||||
*
|
*
|
||||||
@ -48,6 +64,12 @@ class BlacklistController {
|
|||||||
*/
|
*/
|
||||||
checkForPhishing (hostname) {
|
checkForPhishing (hostname) {
|
||||||
if (!hostname) return false
|
if (!hostname) return false
|
||||||
|
|
||||||
|
const { whitelist } = this.store.getState()
|
||||||
|
if (whitelist.some((e) => e === hostname)) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
const { result } = this._phishingDetector.check(hostname)
|
const { result } = this._phishingDetector.check(hostname)
|
||||||
return result
|
return result
|
||||||
}
|
}
|
||||||
|
@ -8,6 +8,16 @@ describe('blacklist controller', function () {
|
|||||||
blacklistController = new BlacklistController()
|
blacklistController = new BlacklistController()
|
||||||
})
|
})
|
||||||
|
|
||||||
|
describe('whitelistDomain', function () {
|
||||||
|
it('should add hostname to the runtime whitelist', function () {
|
||||||
|
blacklistController.whitelistDomain('foo.com')
|
||||||
|
assert.deepEqual(blacklistController.store.getState().whitelist, ['foo.com'])
|
||||||
|
|
||||||
|
blacklistController.whitelistDomain('bar.com')
|
||||||
|
assert.deepEqual(blacklistController.store.getState().whitelist, ['bar.com', 'foo.com'])
|
||||||
|
})
|
||||||
|
})
|
||||||
|
|
||||||
describe('checkForPhishing', function () {
|
describe('checkForPhishing', function () {
|
||||||
it('should not flag whitelisted values', function () {
|
it('should not flag whitelisted values', function () {
|
||||||
const result = blacklistController.checkForPhishing('www.metamask.io')
|
const result = blacklistController.checkForPhishing('www.metamask.io')
|
||||||
@ -37,5 +47,10 @@ describe('blacklist controller', function () {
|
|||||||
const result = blacklistController.checkForPhishing('zero-faucet.metamask.io')
|
const result = blacklistController.checkForPhishing('zero-faucet.metamask.io')
|
||||||
assert.equal(result, false)
|
assert.equal(result, false)
|
||||||
})
|
})
|
||||||
|
it('should not flag whitelisted domain', function () {
|
||||||
|
blacklistController.whitelistDomain('metamask.com')
|
||||||
|
const result = blacklistController.checkForPhishing('metamask.com')
|
||||||
|
assert.equal(result, false)
|
||||||
|
})
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
Loading…
Reference in New Issue
Block a user