2014-12-17 21:33:53 +01:00
|
|
|
/*******************************************************************************
|
|
|
|
|
|
|
|
µBlock - a browser extension to block requests.
|
|
|
|
Copyright (C) 2014 The µBlock authors
|
|
|
|
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program. If not, see {http://www.gnu.org/licenses/}.
|
|
|
|
|
|
|
|
Home: https://github.com/gorhill/uBlock
|
|
|
|
*/
|
|
|
|
|
2014-12-09 21:56:17 +01:00
|
|
|
'use strict';
|
|
|
|
|
2014-12-17 21:33:53 +01:00
|
|
|
/******************************************************************************/
|
|
|
|
|
2015-10-08 17:15:58 +02:00
|
|
|
// https://github.com/gorhill/uBlock/issues/800
|
2015-03-26 22:00:56 +01:00
|
|
|
this.EXPORTED_SYMBOLS = ['contentObserver', 'LocationChangeListener'];
|
2014-12-09 21:56:17 +01:00
|
|
|
|
2015-01-08 21:18:05 +01:00
|
|
|
const {interfaces: Ci, utils: Cu} = Components;
|
|
|
|
const {Services} = Cu.import('resource://gre/modules/Services.jsm', null);
|
2015-03-26 22:00:56 +01:00
|
|
|
const {XPCOMUtils} = Cu.import('resource://gre/modules/XPCOMUtils.jsm', null);
|
|
|
|
|
2015-01-08 21:18:05 +01:00
|
|
|
const hostName = Services.io.newURI(Components.stack.filename, null, null).host;
|
2015-09-30 15:33:38 +02:00
|
|
|
const rpcEmitterName = hostName + ':child-process-message';
|
2014-12-09 21:56:17 +01:00
|
|
|
|
2016-03-05 20:04:36 +01:00
|
|
|
//Cu.import('resource://gre/modules/Console.jsm'); // Firefox >= 44
|
|
|
|
//Cu.import('resource://gre/modules/devtools/Console.jsm'); // Firefox < 44
|
2015-01-26 20:26:45 +01:00
|
|
|
|
2014-12-17 21:33:53 +01:00
|
|
|
/******************************************************************************/
|
|
|
|
|
2015-01-08 21:18:05 +01:00
|
|
|
const getMessageManager = function(win) {
|
2015-05-22 18:19:17 +02:00
|
|
|
let iface = win
|
2014-12-24 23:11:36 +01:00
|
|
|
.QueryInterface(Ci.nsIInterfaceRequestor)
|
|
|
|
.getInterface(Ci.nsIDocShell)
|
|
|
|
.sameTypeRootTreeItem
|
|
|
|
.QueryInterface(Ci.nsIDocShell)
|
2015-05-22 18:19:17 +02:00
|
|
|
.QueryInterface(Ci.nsIInterfaceRequestor);
|
|
|
|
|
|
|
|
try {
|
|
|
|
return iface.getInterface(Ci.nsIContentFrameMessageManager);
|
|
|
|
} catch (ex) {
|
|
|
|
// This can throw. It appears `shouldLoad` can be called *after* a
|
|
|
|
// tab has been closed. For example, a case where this happens all
|
|
|
|
// the time (FF38):
|
|
|
|
// - Open twitter.com (assuming you have an account and are logged in)
|
|
|
|
// - Close twitter.com
|
|
|
|
// There will be an exception raised when `shouldLoad` is called
|
|
|
|
// to process a XMLHttpRequest with URL `https://twitter.com/i/jot`
|
|
|
|
// fired from `https://twitter.com/`, *after* the tab is closed.
|
|
|
|
// In such case, `win` is `about:blank`.
|
|
|
|
}
|
|
|
|
return null;
|
2014-12-24 23:11:36 +01:00
|
|
|
};
|
2014-12-09 21:56:17 +01:00
|
|
|
|
2014-12-17 21:33:53 +01:00
|
|
|
/******************************************************************************/
|
|
|
|
|
2015-11-16 21:12:26 +01:00
|
|
|
const getChildProcessMessageManager = function() {
|
|
|
|
var svc = Services;
|
|
|
|
if ( !svc ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
var cpmm = svc.cpmm;
|
|
|
|
if ( cpmm ) {
|
|
|
|
return cpmm;
|
|
|
|
}
|
|
|
|
cpmm = Components.classes['@mozilla.org/childprocessmessagemanager;1'];
|
|
|
|
if ( cpmm ) {
|
|
|
|
return cpmm.getService(Ci.nsISyncMessageSender);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2015-10-08 17:15:58 +02:00
|
|
|
var contentObserver = {
|
2015-01-08 21:18:05 +01:00
|
|
|
classDescription: 'content-policy for ' + hostName,
|
2015-04-13 01:15:58 +02:00
|
|
|
classID: Components.ID('{7afbd130-cbaf-46c2-b944-f5d24305f484}'),
|
2015-01-08 21:18:05 +01:00
|
|
|
contractID: '@' + hostName + '/content-policy;1',
|
2014-12-09 21:56:17 +01:00
|
|
|
ACCEPT: Ci.nsIContentPolicy.ACCEPT,
|
2015-10-27 15:11:52 +01:00
|
|
|
REJECT: Ci.nsIContentPolicy.REJECT_REQUEST,
|
2015-01-02 18:41:41 +01:00
|
|
|
MAIN_FRAME: Ci.nsIContentPolicy.TYPE_DOCUMENT,
|
2015-05-17 16:32:40 +02:00
|
|
|
SUB_FRAME: Ci.nsIContentPolicy.TYPE_SUBDOCUMENT,
|
2015-01-08 21:18:05 +01:00
|
|
|
contentBaseURI: 'chrome://' + hostName + '/content/js/',
|
|
|
|
cpMessageName: hostName + ':shouldLoad',
|
2015-12-01 21:07:22 +01:00
|
|
|
popupMessageName: hostName + ':shouldLoadPopup',
|
2015-01-28 21:08:24 +01:00
|
|
|
ignoredPopups: new WeakMap(),
|
2015-02-05 18:05:41 +01:00
|
|
|
uniqueSandboxId: 1,
|
2014-12-28 21:26:06 +01:00
|
|
|
|
2014-12-09 21:56:17 +01:00
|
|
|
get componentRegistrar() {
|
|
|
|
return Components.manager.QueryInterface(Ci.nsIComponentRegistrar);
|
|
|
|
},
|
2014-12-28 21:26:06 +01:00
|
|
|
|
2014-12-09 21:56:17 +01:00
|
|
|
get categoryManager() {
|
|
|
|
return Components.classes['@mozilla.org/categorymanager;1']
|
|
|
|
.getService(Ci.nsICategoryManager);
|
|
|
|
},
|
2014-12-28 21:26:06 +01:00
|
|
|
|
2015-03-26 22:00:56 +01:00
|
|
|
QueryInterface: XPCOMUtils.generateQI([
|
2015-01-04 13:58:17 +01:00
|
|
|
Ci.nsIFactory,
|
|
|
|
Ci.nsIObserver,
|
|
|
|
Ci.nsIContentPolicy,
|
|
|
|
Ci.nsISupportsWeakReference
|
2015-03-26 22:00:56 +01:00
|
|
|
]),
|
2014-12-28 21:26:06 +01:00
|
|
|
|
2014-12-09 21:56:17 +01:00
|
|
|
createInstance: function(outer, iid) {
|
2014-12-28 21:26:06 +01:00
|
|
|
if ( outer ) {
|
2014-12-09 21:56:17 +01:00
|
|
|
throw Components.results.NS_ERROR_NO_AGGREGATION;
|
|
|
|
}
|
|
|
|
|
|
|
|
return this.QueryInterface(iid);
|
|
|
|
},
|
2015-01-02 18:41:41 +01:00
|
|
|
|
2014-12-09 21:56:17 +01:00
|
|
|
register: function() {
|
2015-01-02 18:41:41 +01:00
|
|
|
Services.obs.addObserver(this, 'document-element-inserted', true);
|
|
|
|
|
2014-12-09 21:56:17 +01:00
|
|
|
this.componentRegistrar.registerFactory(
|
|
|
|
this.classID,
|
|
|
|
this.classDescription,
|
|
|
|
this.contractID,
|
|
|
|
this
|
|
|
|
);
|
|
|
|
this.categoryManager.addCategoryEntry(
|
|
|
|
'content-policy',
|
|
|
|
this.contractID,
|
|
|
|
this.contractID,
|
|
|
|
false,
|
|
|
|
true
|
|
|
|
);
|
|
|
|
},
|
2014-12-28 21:26:06 +01:00
|
|
|
|
2014-12-09 21:56:17 +01:00
|
|
|
unregister: function() {
|
2015-01-02 18:41:41 +01:00
|
|
|
Services.obs.removeObserver(this, 'document-element-inserted');
|
|
|
|
|
2014-12-09 21:56:17 +01:00
|
|
|
this.componentRegistrar.unregisterFactory(this.classID, this);
|
|
|
|
this.categoryManager.deleteCategoryEntry(
|
|
|
|
'content-policy',
|
|
|
|
this.contractID,
|
|
|
|
false
|
|
|
|
);
|
|
|
|
},
|
2014-12-28 21:26:06 +01:00
|
|
|
|
2015-01-27 16:37:02 +01:00
|
|
|
getFrameId: function(win) {
|
|
|
|
return win
|
|
|
|
.QueryInterface(Ci.nsIInterfaceRequestor)
|
|
|
|
.getInterface(Ci.nsIDOMWindowUtils)
|
|
|
|
.outerWindowID;
|
|
|
|
},
|
|
|
|
|
2016-01-27 17:02:08 +01:00
|
|
|
handlePopup: function(location, origin, context) {
|
2015-12-01 21:07:22 +01:00
|
|
|
let openeeContext = context.contentWindow || context;
|
|
|
|
if (
|
|
|
|
typeof openeeContext.opener !== 'object' ||
|
|
|
|
openeeContext.opener === null ||
|
|
|
|
openeeContext.opener === context ||
|
|
|
|
this.ignoredPopups.has(openeeContext)
|
|
|
|
) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
// https://github.com/gorhill/uBlock/issues/452
|
|
|
|
// Use location of top window, not that of a frame, as this
|
|
|
|
// would cause tab id lookup (necessary for popup blocking) to
|
|
|
|
// always fail.
|
2016-01-27 17:03:30 +01:00
|
|
|
// https://github.com/gorhill/uBlock/issues/1305
|
|
|
|
// Opener could be a dead object, using it would cause a throw.
|
|
|
|
// Repro case:
|
|
|
|
// - Open http://delishows.to/show/chicago-med/season/1/episode/6
|
|
|
|
// - Click anywhere in the background
|
2016-01-27 17:02:08 +01:00
|
|
|
let openerURL = null;
|
|
|
|
try {
|
|
|
|
let opener = openeeContext.opener.top || openeeContext.opener;
|
|
|
|
openerURL = opener.location && opener.location.href;
|
|
|
|
} catch(ex) {
|
|
|
|
}
|
|
|
|
// If no valid opener URL found, use the origin URL.
|
2015-12-01 21:07:22 +01:00
|
|
|
if ( openerURL === null ) {
|
2016-01-27 17:02:08 +01:00
|
|
|
openerURL = origin.asciiSpec;
|
2015-12-01 21:07:22 +01:00
|
|
|
}
|
|
|
|
let messageManager = getMessageManager(openeeContext);
|
|
|
|
if ( messageManager === null ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if ( typeof messageManager.sendRpcMessage === 'function' ) {
|
|
|
|
// https://bugzil.la/1092216
|
|
|
|
messageManager.sendRpcMessage(this.popupMessageName, openerURL);
|
|
|
|
} else {
|
|
|
|
// Compatibility for older versions
|
|
|
|
messageManager.sendSyncMessage(this.popupMessageName, openerURL);
|
|
|
|
}
|
|
|
|
},
|
|
|
|
|
2014-12-24 23:11:36 +01:00
|
|
|
// https://bugzil.la/612921
|
2014-12-09 21:56:17 +01:00
|
|
|
shouldLoad: function(type, location, origin, context) {
|
2015-06-17 23:56:04 +02:00
|
|
|
// For whatever reason, sometimes the global scope is completely
|
|
|
|
// uninitialized at this point. Repro steps:
|
|
|
|
// - Launch FF with uBlock enabled
|
|
|
|
// - Disable uBlock
|
|
|
|
// - Enable uBlock
|
|
|
|
// - Services and all other global variables are undefined
|
|
|
|
// Hopefully will eventually understand why this happens.
|
|
|
|
if ( Services === undefined ) {
|
|
|
|
return this.ACCEPT;
|
|
|
|
}
|
|
|
|
|
2014-12-28 10:56:09 +01:00
|
|
|
if ( !context ) {
|
2015-01-26 20:38:22 +01:00
|
|
|
return this.ACCEPT;
|
2014-12-28 10:56:09 +01:00
|
|
|
}
|
|
|
|
|
2015-12-01 21:07:22 +01:00
|
|
|
if ( type === this.MAIN_FRAME ) {
|
2016-01-27 17:02:08 +01:00
|
|
|
this.handlePopup(location, origin, context);
|
2015-12-01 21:07:22 +01:00
|
|
|
}
|
|
|
|
|
2015-01-15 13:24:35 +01:00
|
|
|
if ( !location.schemeIs('http') && !location.schemeIs('https') ) {
|
2015-01-26 20:26:45 +01:00
|
|
|
return this.ACCEPT;
|
|
|
|
}
|
2015-01-02 18:41:41 +01:00
|
|
|
|
2015-01-26 20:26:45 +01:00
|
|
|
if ( type === this.MAIN_FRAME ) {
|
2015-01-02 18:41:41 +01:00
|
|
|
context = context.contentWindow || context;
|
2015-05-17 16:32:40 +02:00
|
|
|
} else if ( type === this.SUB_FRAME ) {
|
2015-02-15 19:25:11 +01:00
|
|
|
context = context.contentWindow;
|
2015-01-02 18:41:41 +01:00
|
|
|
} else {
|
|
|
|
context = (context.ownerDocument || context).defaultView;
|
2014-12-09 21:56:17 +01:00
|
|
|
}
|
|
|
|
|
2015-01-15 13:24:35 +01:00
|
|
|
// The context for the toolbar popup is an iframe element here,
|
|
|
|
// so check context.top instead of context
|
2015-01-26 20:26:45 +01:00
|
|
|
if ( !context.top || !context.location ) {
|
|
|
|
return this.ACCEPT;
|
|
|
|
}
|
2015-01-16 11:42:34 +01:00
|
|
|
|
2015-02-15 17:16:48 +01:00
|
|
|
let isTopLevel = context === context.top;
|
2015-01-27 16:37:02 +01:00
|
|
|
let parentFrameId;
|
2015-02-15 19:25:11 +01:00
|
|
|
if ( isTopLevel ) {
|
2015-01-27 16:37:02 +01:00
|
|
|
parentFrameId = -1;
|
|
|
|
} else if ( context.parent === context.top ) {
|
|
|
|
parentFrameId = 0;
|
|
|
|
} else {
|
|
|
|
parentFrameId = this.getFrameId(context.parent);
|
|
|
|
}
|
|
|
|
|
2015-01-26 20:26:45 +01:00
|
|
|
let messageManager = getMessageManager(context);
|
2015-05-22 18:19:17 +02:00
|
|
|
if ( messageManager === null ) {
|
|
|
|
return this.ACCEPT;
|
|
|
|
}
|
|
|
|
|
2015-01-26 20:26:45 +01:00
|
|
|
let details = {
|
2015-01-27 17:56:04 +01:00
|
|
|
frameId: isTopLevel ? 0 : this.getFrameId(context),
|
2015-01-27 16:37:02 +01:00
|
|
|
parentFrameId: parentFrameId,
|
2015-05-17 16:32:40 +02:00
|
|
|
rawtype: type,
|
2015-10-27 15:37:02 +01:00
|
|
|
tabId: '',
|
2015-01-26 20:26:45 +01:00
|
|
|
url: location.spec
|
|
|
|
};
|
2015-01-16 11:42:34 +01:00
|
|
|
|
2015-11-06 20:18:40 +01:00
|
|
|
//console.log('shouldLoad: type=' + type + ' url=' + location.spec);
|
2015-01-26 20:26:45 +01:00
|
|
|
if ( typeof messageManager.sendRpcMessage === 'function' ) {
|
|
|
|
// https://bugzil.la/1092216
|
2015-11-13 17:53:39 +01:00
|
|
|
messageManager.sendRpcMessage(this.cpMessageName, details);
|
2015-01-26 20:26:45 +01:00
|
|
|
} else {
|
|
|
|
// Compatibility for older versions
|
2015-11-13 17:53:39 +01:00
|
|
|
messageManager.sendSyncMessage(this.cpMessageName, details);
|
2014-12-09 21:56:17 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return this.ACCEPT;
|
2015-01-02 18:41:41 +01:00
|
|
|
},
|
2014-12-28 21:26:06 +01:00
|
|
|
|
2015-07-03 19:32:00 +02:00
|
|
|
initContentScripts: function(win, create) {
|
2014-12-24 23:11:36 +01:00
|
|
|
let messager = getMessageManager(win);
|
2015-02-05 18:05:41 +01:00
|
|
|
let sandboxId = hostName + ':sb:' + this.uniqueSandboxId++;
|
2015-07-03 19:32:00 +02:00
|
|
|
let sandbox;
|
2014-12-09 21:56:17 +01:00
|
|
|
|
2015-07-03 19:32:00 +02:00
|
|
|
if ( create ) {
|
2015-01-08 21:18:05 +01:00
|
|
|
let sandboxName = [
|
|
|
|
win.location.href.slice(0, 100),
|
|
|
|
win.document.title.slice(0, 100)
|
|
|
|
].join(' | ');
|
|
|
|
|
2015-08-15 20:17:50 +02:00
|
|
|
// https://github.com/gorhill/uMatrix/issues/325
|
|
|
|
// "Pass sameZoneAs to sandbox constructor to make GCs cheaper"
|
2015-01-08 21:18:05 +01:00
|
|
|
sandbox = Cu.Sandbox([win], {
|
2015-08-15 20:17:50 +02:00
|
|
|
sameZoneAs: win.top,
|
2015-01-08 21:18:05 +01:00
|
|
|
sandboxName: sandboxId + '[' + sandboxName + ']',
|
2014-12-09 21:56:17 +01:00
|
|
|
sandboxPrototype: win,
|
|
|
|
wantComponents: false,
|
|
|
|
wantXHRConstructor: false
|
|
|
|
});
|
2014-12-16 13:44:34 +01:00
|
|
|
|
2015-11-16 21:12:26 +01:00
|
|
|
if ( getChildProcessMessageManager() ) {
|
2015-09-30 15:33:38 +02:00
|
|
|
sandbox.rpc = function(details) {
|
2015-11-16 21:12:26 +01:00
|
|
|
var cpmm = getChildProcessMessageManager();
|
2015-09-30 15:33:38 +02:00
|
|
|
if ( !cpmm ) { return; }
|
|
|
|
var r = cpmm.sendSyncMessage(rpcEmitterName, details);
|
|
|
|
if ( Array.isArray(r) ) {
|
|
|
|
return r[0];
|
|
|
|
}
|
|
|
|
};
|
|
|
|
} else {
|
|
|
|
sandbox.rpc = function() {};
|
|
|
|
}
|
|
|
|
|
2015-01-27 13:31:17 +01:00
|
|
|
sandbox.injectScript = function(script) {
|
2015-09-30 15:33:38 +02:00
|
|
|
var svc = Services;
|
2015-10-28 14:35:13 +01:00
|
|
|
// Sandbox appears void.
|
|
|
|
// I've seen this happens, need to investigate why.
|
|
|
|
if ( svc === undefined ) {
|
|
|
|
return;
|
2015-05-28 20:49:36 +02:00
|
|
|
}
|
2015-10-28 14:35:13 +01:00
|
|
|
svc.scriptloader.loadSubScript(script, sandbox);
|
2015-01-27 13:31:17 +01:00
|
|
|
};
|
2015-07-03 19:32:00 +02:00
|
|
|
|
|
|
|
// The goal is to have content scripts removed from web pages. This
|
|
|
|
// helps remove traces of uBlock from memory when disabling/removing
|
|
|
|
// the addon.
|
|
|
|
// For example, this takes care of:
|
|
|
|
// https://github.com/gorhill/uBlock/commit/ea4faff383789053f423498c1f1165c403fde7c7#commitcomment-11964137
|
|
|
|
// > "gets the whole selected tab flashing"
|
|
|
|
sandbox.outerShutdown = function() {
|
|
|
|
sandbox.removeMessageListener();
|
|
|
|
sandbox.addMessageListener =
|
|
|
|
sandbox.injectScript =
|
2015-09-30 15:33:38 +02:00
|
|
|
sandbox.outerShutdown =
|
2015-07-03 19:32:00 +02:00
|
|
|
sandbox.removeMessageListener =
|
2015-09-30 15:33:38 +02:00
|
|
|
sandbox.rpc =
|
|
|
|
sandbox.sendAsyncMessage = function(){};
|
2015-07-03 19:32:00 +02:00
|
|
|
sandbox.vAPI = {};
|
|
|
|
messager = null;
|
|
|
|
};
|
2015-01-08 21:18:05 +01:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
sandbox = win;
|
|
|
|
}
|
2014-12-17 08:46:18 +01:00
|
|
|
|
2015-01-08 21:18:05 +01:00
|
|
|
sandbox._sandboxId_ = sandboxId;
|
|
|
|
sandbox.sendAsyncMessage = messager.sendAsyncMessage;
|
2015-01-26 20:26:45 +01:00
|
|
|
|
2015-01-08 21:18:05 +01:00
|
|
|
sandbox.addMessageListener = function(callback) {
|
2015-01-27 13:31:17 +01:00
|
|
|
if ( sandbox._messageListener_ ) {
|
2015-02-05 18:05:41 +01:00
|
|
|
sandbox.removeMessageListener();
|
2015-01-08 21:18:05 +01:00
|
|
|
}
|
2014-12-09 21:56:17 +01:00
|
|
|
|
2015-01-27 13:31:17 +01:00
|
|
|
sandbox._messageListener_ = function(message) {
|
2015-01-08 21:18:05 +01:00
|
|
|
callback(message.data);
|
|
|
|
};
|
|
|
|
|
|
|
|
messager.addMessageListener(
|
2015-01-27 13:31:17 +01:00
|
|
|
sandbox._sandboxId_,
|
|
|
|
sandbox._messageListener_
|
2015-01-08 21:18:05 +01:00
|
|
|
);
|
|
|
|
messager.addMessageListener(
|
|
|
|
hostName + ':broadcast',
|
2015-01-27 13:31:17 +01:00
|
|
|
sandbox._messageListener_
|
2015-01-08 21:18:05 +01:00
|
|
|
);
|
2015-01-27 13:31:17 +01:00
|
|
|
};
|
2015-01-26 20:26:45 +01:00
|
|
|
|
2015-01-08 21:18:05 +01:00
|
|
|
sandbox.removeMessageListener = function() {
|
2015-07-03 13:00:29 +02:00
|
|
|
if ( !sandbox._messageListener_ ) {
|
|
|
|
return;
|
|
|
|
}
|
2015-01-11 18:41:52 +01:00
|
|
|
try {
|
|
|
|
messager.removeMessageListener(
|
2015-01-27 13:31:17 +01:00
|
|
|
sandbox._sandboxId_,
|
|
|
|
sandbox._messageListener_
|
2015-01-11 18:41:52 +01:00
|
|
|
);
|
|
|
|
messager.removeMessageListener(
|
|
|
|
hostName + ':broadcast',
|
2015-01-27 13:31:17 +01:00
|
|
|
sandbox._messageListener_
|
2015-01-11 18:41:52 +01:00
|
|
|
);
|
|
|
|
} catch (ex) {
|
|
|
|
// It throws sometimes, mostly when the popup closes
|
|
|
|
}
|
|
|
|
|
2015-01-27 13:31:17 +01:00
|
|
|
sandbox._messageListener_ = null;
|
|
|
|
};
|
2015-01-08 21:18:05 +01:00
|
|
|
|
|
|
|
return sandbox;
|
2014-12-09 21:56:17 +01:00
|
|
|
},
|
2014-12-28 21:26:06 +01:00
|
|
|
|
2015-01-28 21:08:24 +01:00
|
|
|
ignorePopup: function(e) {
|
|
|
|
if ( e.isTrusted === false ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
let contObs = contentObserver;
|
|
|
|
contObs.ignoredPopups.set(this, true);
|
|
|
|
this.removeEventListener('keydown', contObs.ignorePopup, true);
|
|
|
|
this.removeEventListener('mousedown', contObs.ignorePopup, true);
|
|
|
|
},
|
|
|
|
|
2015-03-10 13:06:59 +01:00
|
|
|
observe: function(doc) {
|
2015-06-17 23:56:04 +02:00
|
|
|
// For whatever reason, sometimes the global scope is completely
|
|
|
|
// uninitialized at this point. Repro steps:
|
|
|
|
// - Launch FF with uBlock enabled
|
|
|
|
// - Disable uBlock
|
|
|
|
// - Enable uBlock
|
|
|
|
// - Services and all other global variables are undefined
|
|
|
|
// Hopefully will eventually understand why this happens.
|
|
|
|
if ( Services === undefined ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-08-18 17:44:24 +02:00
|
|
|
let win = doc.defaultView || null;
|
|
|
|
if ( win === null ) {
|
2014-12-09 21:56:17 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-01-28 21:08:24 +01:00
|
|
|
if ( win.opener && this.ignoredPopups.has(win) === false ) {
|
|
|
|
win.addEventListener('keydown', this.ignorePopup, true);
|
|
|
|
win.addEventListener('mousedown', this.ignorePopup, true);
|
|
|
|
}
|
|
|
|
|
2015-05-29 22:40:59 +02:00
|
|
|
// https://github.com/gorhill/uBlock/issues/260
|
|
|
|
// https://developer.mozilla.org/en-US/docs/Web/API/Document/contentType
|
|
|
|
// "Non-standard, only supported by Gecko. To be used in
|
|
|
|
// "chrome code (i.e. Extensions and XUL applications)."
|
|
|
|
// TODO: We may have to exclude more types, for now let's be
|
|
|
|
// conservative and focus only on the one issue reported, i.e. let's
|
|
|
|
// not test against 'text/html'.
|
|
|
|
if ( doc.contentType.startsWith('image/') ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-12-28 10:56:09 +01:00
|
|
|
let loc = win.location;
|
|
|
|
|
2015-04-02 14:54:06 +02:00
|
|
|
if ( loc.protocol !== 'http:' && loc.protocol !== 'https:' && loc.protocol !== 'file:' ) {
|
2015-01-08 21:18:05 +01:00
|
|
|
if ( loc.protocol === 'chrome:' && loc.host === hostName ) {
|
2015-01-02 18:41:41 +01:00
|
|
|
this.initContentScripts(win);
|
2014-12-09 21:56:17 +01:00
|
|
|
}
|
|
|
|
|
2015-01-04 13:58:17 +01:00
|
|
|
// What about data: and about:blank?
|
2014-12-09 21:56:17 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
let lss = Services.scriptloader.loadSubScript;
|
2015-01-08 21:18:05 +01:00
|
|
|
let sandbox = this.initContentScripts(win, true);
|
2014-12-09 21:56:17 +01:00
|
|
|
|
2015-05-16 22:31:44 +02:00
|
|
|
try {
|
|
|
|
lss(this.contentBaseURI + 'vapi-client.js', sandbox);
|
|
|
|
lss(this.contentBaseURI + 'contentscript-start.js', sandbox);
|
|
|
|
} catch (ex) {
|
2015-06-04 15:37:53 +02:00
|
|
|
//console.exception(ex.msg, ex.stack);
|
2015-05-16 22:31:44 +02:00
|
|
|
return;
|
|
|
|
}
|
2014-12-09 21:56:17 +01:00
|
|
|
|
2015-03-10 13:06:59 +01:00
|
|
|
let docReady = (e) => {
|
|
|
|
let doc = e.target;
|
|
|
|
doc.removeEventListener(e.type, docReady, true);
|
|
|
|
lss(this.contentBaseURI + 'contentscript-end.js', sandbox);
|
2015-03-09 17:57:52 +01:00
|
|
|
|
2015-06-30 07:59:22 +02:00
|
|
|
if (
|
2015-11-20 14:47:29 +01:00
|
|
|
doc.querySelector('a[href^="abp:"],a[href^="https://subscribe.adblockplus.org/?"]') ||
|
2015-06-30 07:59:22 +02:00
|
|
|
loc.href === 'https://github.com/gorhill/uBlock/wiki/Filter-lists-from-around-the-web'
|
|
|
|
) {
|
2015-11-20 14:47:29 +01:00
|
|
|
lss(this.contentBaseURI + 'scriptlets/subscriber.js', sandbox);
|
2015-03-10 13:06:59 +01:00
|
|
|
}
|
2015-03-09 17:57:52 +01:00
|
|
|
};
|
|
|
|
|
2015-03-12 18:20:48 +01:00
|
|
|
if ( doc.readyState === 'loading') {
|
|
|
|
doc.addEventListener('DOMContentLoaded', docReady, true);
|
|
|
|
} else {
|
|
|
|
docReady({ target: doc, type: 'DOMContentLoaded' });
|
|
|
|
}
|
2014-12-09 21:56:17 +01:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2014-12-17 21:33:53 +01:00
|
|
|
/******************************************************************************/
|
|
|
|
|
2016-03-07 01:49:27 +01:00
|
|
|
var LocationChangeListener = function(docShell, webProgress) {
|
|
|
|
var mm = docShell.QueryInterface(Ci.nsIInterfaceRequestor)
|
|
|
|
.getInterface(Ci.nsIContentFrameMessageManager);
|
|
|
|
if ( !mm || typeof mm.sendAsyncMessage !== 'function' ) {
|
2015-05-18 00:27:53 +02:00
|
|
|
return;
|
|
|
|
}
|
2015-09-30 15:33:38 +02:00
|
|
|
this.messageManager = mm;
|
2016-03-07 01:49:27 +01:00
|
|
|
webProgress.addProgressListener(this, Ci.nsIWebProgress.NOTIFY_LOCATION);
|
2015-03-31 13:03:35 +02:00
|
|
|
};
|
2015-03-26 22:00:56 +01:00
|
|
|
|
2016-03-07 01:49:27 +01:00
|
|
|
LocationChangeListener.prototype.messageName = hostName + ':locationChanged';
|
|
|
|
|
2015-05-18 00:27:53 +02:00
|
|
|
LocationChangeListener.prototype.QueryInterface = XPCOMUtils.generateQI([
|
|
|
|
'nsIWebProgressListener',
|
|
|
|
'nsISupportsWeakReference'
|
|
|
|
]);
|
2015-03-26 22:00:56 +01:00
|
|
|
|
|
|
|
LocationChangeListener.prototype.onLocationChange = function(webProgress, request, location, flags) {
|
|
|
|
if ( !webProgress.isTopLevel ) {
|
|
|
|
return;
|
|
|
|
}
|
2016-03-07 01:49:27 +01:00
|
|
|
this.messageManager.sendAsyncMessage(this.messageName, {
|
2015-03-26 22:00:56 +01:00
|
|
|
url: location.asciiSpec,
|
2015-09-14 17:28:33 +02:00
|
|
|
flags: flags
|
2015-03-26 22:00:56 +01:00
|
|
|
});
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2015-01-02 18:41:41 +01:00
|
|
|
contentObserver.register();
|
2014-12-17 21:33:53 +01:00
|
|
|
|
|
|
|
/******************************************************************************/
|