2014-06-24 00:42:43 +02:00
|
|
|
/*******************************************************************************
|
|
|
|
|
2023-12-04 18:10:34 +01:00
|
|
|
uBlock Origin - a comprehensive, efficient content blocker
|
2018-08-06 18:34:41 +02:00
|
|
|
Copyright (C) 2014-present Raymond Hill
|
2014-06-24 00:42:43 +02:00
|
|
|
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program. If not, see {http://www.gnu.org/licenses/}.
|
|
|
|
|
|
|
|
Home: https://github.com/gorhill/uBlock
|
|
|
|
*/
|
|
|
|
|
2014-08-21 05:19:27 +02:00
|
|
|
/******************************************************************************/
|
|
|
|
|
2021-07-25 16:55:35 +02:00
|
|
|
import {
|
|
|
|
domainFromHostname,
|
|
|
|
hostnameFromURI,
|
|
|
|
originFromURI,
|
|
|
|
} from './uri-utils.js';
|
|
|
|
|
2024-03-23 18:28:18 +01:00
|
|
|
import { FilteringContext } from './filtering-context.js';
|
|
|
|
import logger from './logger.js';
|
|
|
|
import { ubologSet } from './console.js';
|
|
|
|
|
2021-07-25 16:55:35 +02:00
|
|
|
/******************************************************************************/
|
|
|
|
|
2018-04-05 13:29:15 +02:00
|
|
|
// Not all platforms may have properly declared vAPI.webextFlavor.
|
|
|
|
|
|
|
|
if ( vAPI.webextFlavor === undefined ) {
|
2018-04-18 13:11:13 +02:00
|
|
|
vAPI.webextFlavor = { major: 0, soup: new Set([ 'ublock' ]) };
|
2018-04-05 13:29:15 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2021-07-25 16:55:35 +02:00
|
|
|
const hiddenSettingsDefault = {
|
|
|
|
allowGenericProceduralFilters: false,
|
|
|
|
assetFetchTimeout: 30,
|
|
|
|
autoCommentFilterTemplate: '{{date}} {{origin}}',
|
2024-03-02 01:52:55 +01:00
|
|
|
autoUpdateAssetFetchPeriod: 5,
|
|
|
|
autoUpdateDelayAfterLaunch: 37,
|
2023-11-01 15:45:31 +01:00
|
|
|
autoUpdatePeriod: 1,
|
2021-07-25 16:55:35 +02:00
|
|
|
benchmarkDatasetURL: 'unset',
|
|
|
|
blockingProfiles: '11111/#F00 11010/#C0F 11001/#00F 00001',
|
|
|
|
cacheStorageCompression: true,
|
2024-02-27 21:04:05 +01:00
|
|
|
cacheStorageCompressionThreshold: 65536,
|
Redesign cache storage
In uBO, the "cache storage" is used to save resources which can
be safely discarded, though at the cost of having to fetch or
recompute them again.
Extension storage (browser.storage.local) is now always used as
cache storage backend. This has always been the default for
Chromium-based browsers.
For Firefox-based browsers, IndexedDB was used as backend for
cache storage, with fallback to extension storage when using
Firefox in private mode by default.
Extension storage is reliable since it works in all contexts,
though it may not be the most performant one.
To speed-up loading of resources from extension storage, uBO will
now make use of Cache API storage, which will mirror content of
key assets saved to extension storage. Typically loading resources
from Cache API is faster than loading the same resources from
the extension storage.
Only resources which must be loaded in memory as fast as possible
will make use of the Cache API storage layered on top of the
extension storage.
Compiled filter lists and memory snapshot of filtering engines
(aka "selfies") will be mirrored to the Cache API storage, since
these must be loaded into memory as fast as possible, and reloading
filter lists from their compiled counterpart is a common
operation.
This new design makes it now seamless to work in permanent private
mode for Firefox-based browsers, since extension storage now
always contains cache-related assets.
Support for IndexedDB is removed for the time being, except to
support migration of cached assets the first time uBO runs with
the new cache storage design.
In order to easily support all choices of storage, a new serializer
has been introduced, which is capable of serializing/deserializing
structure-cloneable data to/from a JS string.
Because of this new serializer, JS data structures can be stored
directly from their native representation, and deserialized
directly to their native representation from uBO's point of view,
since the serialization occurs (if needed) only at the storage
interface level.
This new serializer simplifies many code paths where data
structures such as Set, Map, TypedArray, RegExp, etc. had to be
converted in a disparate manner to be able to persist them to
extension storage.
The new serializer supports workers and LZ4 compression. These
can be configured through advanced settings.
With this new layered design, it's possible to introduce more
storage layers if measured as beneficial (i.e. maybe
browser.storage.session)
References:
- https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/WebExtensions/API/storage/local
- https://developer.mozilla.org/en-US/docs/Web/API/Cache
- https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API/Structured_clone_algorithm
2024-02-26 22:50:11 +01:00
|
|
|
cacheStorageMultithread: 2,
|
2021-07-25 16:55:35 +02:00
|
|
|
cacheControlForFirefox1376932: 'no-cache, no-store, must-revalidate',
|
|
|
|
cloudStorageCompression: true,
|
|
|
|
cnameIgnoreList: 'unset',
|
|
|
|
cnameIgnore1stParty: true,
|
|
|
|
cnameIgnoreExceptions: true,
|
|
|
|
cnameIgnoreRootDocument: true,
|
|
|
|
cnameMaxTTL: 120,
|
|
|
|
cnameReplayFullURL: false,
|
|
|
|
cnameUncloakProxied: false,
|
|
|
|
consoleLogLevel: 'unset',
|
2023-03-23 18:40:51 +01:00
|
|
|
debugAssetsJson: false,
|
2021-07-25 16:55:35 +02:00
|
|
|
debugScriptlets: false,
|
|
|
|
debugScriptletInjector: false,
|
2023-11-01 15:45:31 +01:00
|
|
|
differentialUpdate: true,
|
2021-07-25 16:55:35 +02:00
|
|
|
disableWebAssembly: false,
|
|
|
|
extensionUpdateForceReload: false,
|
|
|
|
filterAuthorMode: false,
|
|
|
|
loggerPopupType: 'popup',
|
|
|
|
manualUpdateAssetFetchPeriod: 500,
|
2021-09-22 15:37:21 +02:00
|
|
|
modifyWebextFlavor: 'unset',
|
2021-07-25 16:55:35 +02:00
|
|
|
popupFontSize: 'unset',
|
|
|
|
popupPanelDisabledSections: 0,
|
|
|
|
popupPanelHeightMode: 0,
|
2024-03-11 18:01:51 +01:00
|
|
|
popupPanelLockedSections: 0,
|
|
|
|
popupPanelOrientation: 'unset',
|
2021-07-25 16:55:35 +02:00
|
|
|
requestJournalProcessPeriod: 1000,
|
2024-03-01 01:53:06 +01:00
|
|
|
requestStatsDisabled: false,
|
2024-03-02 01:52:55 +01:00
|
|
|
selfieDelayInSeconds: 53,
|
2021-07-25 16:55:35 +02:00
|
|
|
strictBlockingBypassDuration: 120,
|
2023-04-14 15:55:06 +02:00
|
|
|
toolbarWarningTimeout: 60,
|
Add ability to control trusted status of filter lists
Related discussion:
https://github.com/uBlockOrigin/uBlock-issues/discussions/2895
Changes:
The _content of the My filters_ pane is now considered untrusted by
default, and only uBO's own lists are now trusted by default.
It has been observed that too many people will readily copy-paste
filters from random sources. Copy-pasting filters which require trust
represents a security risk to users with no understanding of how the
filters work and their potential abuse.
Using a filter which requires trust in a filter list from an untrusted
source will cause the filter to be invalid, i.e. shown as an error.
A new advanced setting has been added to control which lists are
considered trustworthy: `trustedListPrefixes`, which is a space-
separated list of tokens. Examples of possible values:
- `ublock-`: trust only uBO lists, exclude everything else including
content of _My filters_ (default value)
- `ublock- user-`: trust uBO lists and content of _My filters_
- `-`: trust no list, essentially disabling all filters requiring
trust (admins or people who don't trust us may want to use this)
One can also decide to trust lists maintained elsewhere. For example,
for stock AdGuard lists add ` adguard-`. To trust stock EasyList lists,
add ` easylist-`.
To trust a specific regional stock list, look-up its token in
assets.json and add to `trustedListPrefixes`.
The matching is made with String.startsWith(), hence why `ublock-`
matches all uBO's own filter lists.
This also allows to trust imported lists, for example add
` https://filters.adtidy.org/extension/ublock/filters/` to trust all
non-stock AdGuard lists.
Add the complete URL of a given imported list to trust only that one
list.
URLs not starting with `https://` or `file:///` will be rejected,
i.e. `http://example.org` will be ignored.
Invalid URLs are rejected.
2023-10-22 01:04:12 +02:00
|
|
|
trustedListPrefixes: 'ublock-',
|
2021-11-28 16:35:50 +01:00
|
|
|
uiPopupConfig: 'unset',
|
2021-07-25 16:55:35 +02:00
|
|
|
uiStyles: 'unset',
|
|
|
|
updateAssetBypassBrowserCache: false,
|
|
|
|
userResourcesLocation: 'unset',
|
|
|
|
};
|
|
|
|
|
2023-10-22 14:53:01 +02:00
|
|
|
if ( vAPI.webextFlavor.soup.has('devbuild') ) {
|
2023-10-22 18:33:10 +02:00
|
|
|
hiddenSettingsDefault.consoleLogLevel = 'info';
|
2024-03-23 18:28:18 +01:00
|
|
|
hiddenSettingsDefault.cacheStorageAPI = 'unset';
|
2023-10-31 00:49:17 +01:00
|
|
|
ubologSet(true);
|
2023-10-22 14:53:01 +02:00
|
|
|
}
|
|
|
|
|
2021-07-25 16:55:35 +02:00
|
|
|
const userSettingsDefault = {
|
|
|
|
advancedUserEnabled: false,
|
|
|
|
alwaysDetachLogger: true,
|
|
|
|
autoUpdate: true,
|
|
|
|
cloudStorageEnabled: false,
|
|
|
|
cnameUncloakEnabled: true,
|
|
|
|
collapseBlocked: true,
|
|
|
|
colorBlindFriendly: false,
|
|
|
|
contextMenuEnabled: true,
|
2022-02-02 21:40:47 +01:00
|
|
|
uiAccentCustom: false,
|
|
|
|
uiAccentCustom0: '#aca0f7',
|
|
|
|
uiTheme: 'auto',
|
2021-07-25 16:55:35 +02:00
|
|
|
externalLists: '',
|
|
|
|
firewallPaneMinimized: true,
|
|
|
|
hyperlinkAuditingDisabled: true,
|
2024-03-02 14:52:42 +01:00
|
|
|
ignoreGenericCosmeticFilters: false,
|
2021-07-25 16:55:35 +02:00
|
|
|
importedLists: [],
|
|
|
|
largeMediaSize: 50,
|
|
|
|
parseAllABPHideFilters: true,
|
|
|
|
popupPanelSections: 0b111,
|
|
|
|
prefetchingDisabled: true,
|
|
|
|
requestLogMaxEntries: 1000,
|
|
|
|
showIconBadge: true,
|
2022-02-13 15:24:57 +01:00
|
|
|
suspendUntilListsAreLoaded: vAPI.Net.canSuspend(),
|
2021-07-25 16:55:35 +02:00
|
|
|
tooltipsDisabled: false,
|
2024-03-11 16:39:31 +01:00
|
|
|
userFiltersTrusted: false,
|
2021-09-15 13:40:32 +02:00
|
|
|
webrtcIPAddressHidden: false,
|
2021-07-25 16:55:35 +02:00
|
|
|
};
|
|
|
|
|
2021-10-13 14:31:04 +02:00
|
|
|
const dynamicFilteringDefault = [
|
|
|
|
'behind-the-scene * * noop',
|
|
|
|
'behind-the-scene * image noop',
|
|
|
|
'behind-the-scene * 3p noop',
|
|
|
|
'behind-the-scene * inline-script noop',
|
|
|
|
'behind-the-scene * 1p-script noop',
|
|
|
|
'behind-the-scene * 3p-script noop',
|
|
|
|
'behind-the-scene * 3p-frame noop',
|
|
|
|
];
|
|
|
|
|
|
|
|
const hostnameSwitchesDefault = [
|
|
|
|
'no-large-media: behind-the-scene false',
|
|
|
|
];
|
|
|
|
// https://github.com/LiCybora/NanoDefenderFirefox/issues/196
|
|
|
|
if ( vAPI.webextFlavor.soup.has('firefox') ) {
|
|
|
|
hostnameSwitchesDefault.push('no-csp-reports: * true');
|
|
|
|
}
|
|
|
|
|
2021-07-25 16:55:35 +02:00
|
|
|
const µBlock = { // jshint ignore:line
|
2024-02-28 19:32:24 +01:00
|
|
|
alarmQueue: [],
|
2023-12-04 21:15:08 +01:00
|
|
|
|
2023-12-03 22:26:05 +01:00
|
|
|
userSettingsDefault,
|
2021-07-25 16:55:35 +02:00
|
|
|
userSettings: Object.assign({}, userSettingsDefault),
|
|
|
|
|
2023-12-03 22:26:05 +01:00
|
|
|
hiddenSettingsDefault,
|
2021-07-25 16:55:35 +02:00
|
|
|
hiddenSettingsAdmin: {},
|
|
|
|
hiddenSettings: Object.assign({}, hiddenSettingsDefault),
|
|
|
|
|
2021-10-13 14:31:04 +02:00
|
|
|
dynamicFilteringDefault,
|
|
|
|
hostnameSwitchesDefault,
|
2021-10-12 17:19:56 +02:00
|
|
|
|
2021-07-25 16:55:35 +02:00
|
|
|
noDashboard: false,
|
|
|
|
|
|
|
|
// Features detection.
|
|
|
|
privacySettingsSupported: vAPI.browserSettings instanceof Object,
|
|
|
|
cloudStorageSupported: vAPI.cloud instanceof Object,
|
|
|
|
canFilterResponseData: typeof browser.webRequest.filterResponseData === 'function',
|
|
|
|
|
|
|
|
// https://github.com/chrisaljoudi/uBlock/issues/180
|
|
|
|
// Whitelist directives need to be loaded once the PSL is available
|
|
|
|
netWhitelist: new Map(),
|
|
|
|
netWhitelistModifyTime: 0,
|
|
|
|
netWhitelistDefault: [
|
|
|
|
'chrome-extension-scheme',
|
|
|
|
'moz-extension-scheme',
|
|
|
|
],
|
|
|
|
|
2024-02-29 17:43:51 +01:00
|
|
|
requestStats: {
|
|
|
|
blockedCount: 0,
|
|
|
|
allowedCount: 0,
|
2021-07-25 16:55:35 +02:00
|
|
|
},
|
|
|
|
|
|
|
|
// Read-only
|
|
|
|
systemSettings: {
|
2023-11-03 23:59:33 +01:00
|
|
|
compiledMagic: 57, // Increase when compiled format changes
|
Redesign cache storage
In uBO, the "cache storage" is used to save resources which can
be safely discarded, though at the cost of having to fetch or
recompute them again.
Extension storage (browser.storage.local) is now always used as
cache storage backend. This has always been the default for
Chromium-based browsers.
For Firefox-based browsers, IndexedDB was used as backend for
cache storage, with fallback to extension storage when using
Firefox in private mode by default.
Extension storage is reliable since it works in all contexts,
though it may not be the most performant one.
To speed-up loading of resources from extension storage, uBO will
now make use of Cache API storage, which will mirror content of
key assets saved to extension storage. Typically loading resources
from Cache API is faster than loading the same resources from
the extension storage.
Only resources which must be loaded in memory as fast as possible
will make use of the Cache API storage layered on top of the
extension storage.
Compiled filter lists and memory snapshot of filtering engines
(aka "selfies") will be mirrored to the Cache API storage, since
these must be loaded into memory as fast as possible, and reloading
filter lists from their compiled counterpart is a common
operation.
This new design makes it now seamless to work in permanent private
mode for Firefox-based browsers, since extension storage now
always contains cache-related assets.
Support for IndexedDB is removed for the time being, except to
support migration of cached assets the first time uBO runs with
the new cache storage design.
In order to easily support all choices of storage, a new serializer
has been introduced, which is capable of serializing/deserializing
structure-cloneable data to/from a JS string.
Because of this new serializer, JS data structures can be stored
directly from their native representation, and deserialized
directly to their native representation from uBO's point of view,
since the serialization occurs (if needed) only at the storage
interface level.
This new serializer simplifies many code paths where data
structures such as Set, Map, TypedArray, RegExp, etc. had to be
converted in a disparate manner to be able to persist them to
extension storage.
The new serializer supports workers and LZ4 compression. These
can be configured through advanced settings.
With this new layered design, it's possible to introduce more
storage layers if measured as beneficial (i.e. maybe
browser.storage.session)
References:
- https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/WebExtensions/API/storage/local
- https://developer.mozilla.org/en-US/docs/Web/API/Cache
- https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API/Structured_clone_algorithm
2024-02-26 22:50:11 +01:00
|
|
|
selfieMagic: 58, // Increase when selfie format changes
|
2021-07-25 16:55:35 +02:00
|
|
|
},
|
|
|
|
|
|
|
|
// https://github.com/uBlockOrigin/uBlock-issues/issues/759#issuecomment-546654501
|
|
|
|
// The assumption is that cache storage state reflects whether
|
|
|
|
// compiled or selfie assets are available or not. The properties
|
|
|
|
// below is to no longer rely on this assumption -- though it's still
|
|
|
|
// not clear how the assumption could be wrong, and it's still not
|
|
|
|
// clear whether relying on those properties will really solve the
|
|
|
|
// issue. It's just an attempt at hardening.
|
|
|
|
compiledFormatChanged: false,
|
|
|
|
selfieIsInvalid: false,
|
|
|
|
|
|
|
|
restoreBackupSettings: {
|
|
|
|
lastRestoreFile: '',
|
|
|
|
lastRestoreTime: 0,
|
|
|
|
lastBackupFile: '',
|
|
|
|
lastBackupTime: 0,
|
|
|
|
},
|
|
|
|
|
|
|
|
commandShortcuts: new Map(),
|
|
|
|
|
|
|
|
// Allows to fully customize uBO's assets, typically set through admin
|
|
|
|
// settings. The content of 'assets.json' will also tell which filter
|
|
|
|
// lists to enable by default when uBO is first installed.
|
|
|
|
assetsBootstrapLocation: undefined,
|
|
|
|
|
2023-05-05 01:20:18 +02:00
|
|
|
assetsJsonPath: vAPI.webextFlavor.soup.has('devbuild')
|
|
|
|
? '/assets/assets.dev.json'
|
2024-03-14 15:20:25 +01:00
|
|
|
: '/assets/assets.json',
|
2021-07-25 16:55:35 +02:00
|
|
|
userFiltersPath: 'user-filters',
|
|
|
|
pslAssetKey: 'public_suffix_list.dat',
|
|
|
|
|
|
|
|
selectedFilterLists: [],
|
|
|
|
availableFilterLists: {},
|
|
|
|
badLists: new Map(),
|
|
|
|
|
2022-12-14 22:04:45 +01:00
|
|
|
inMemoryFilters: [],
|
|
|
|
inMemoryFiltersCompiled: '',
|
|
|
|
|
2021-07-25 16:55:35 +02:00
|
|
|
// https://github.com/uBlockOrigin/uBlock-issues/issues/974
|
|
|
|
// This can be used to defer filtering decision-making.
|
|
|
|
readyToFilter: false,
|
|
|
|
|
2021-11-15 16:46:29 +01:00
|
|
|
supportStats: {
|
2023-03-08 15:36:09 +01:00
|
|
|
allReadyAfter: '?',
|
|
|
|
maxAssetCacheWait: '?',
|
2021-11-15 16:46:29 +01:00
|
|
|
},
|
|
|
|
|
2021-07-25 16:55:35 +02:00
|
|
|
pageStores: new Map(),
|
|
|
|
pageStoresToken: 0,
|
|
|
|
|
|
|
|
storageQuota: vAPI.storage.QUOTA_BYTES,
|
|
|
|
storageUsed: 0,
|
|
|
|
|
|
|
|
noopFunc: function(){},
|
|
|
|
|
|
|
|
apiErrorCount: 0,
|
|
|
|
|
|
|
|
maybeGoodPopup: {
|
|
|
|
tabId: 0,
|
|
|
|
url: '',
|
|
|
|
},
|
|
|
|
|
|
|
|
epickerArgs: {
|
|
|
|
eprom: null,
|
|
|
|
mouse: false,
|
|
|
|
target: '',
|
|
|
|
zap: false,
|
|
|
|
},
|
|
|
|
|
|
|
|
scriptlets: {},
|
|
|
|
|
|
|
|
cspNoInlineScript: "script-src 'unsafe-eval' * blob: data:",
|
|
|
|
cspNoScripting: 'script-src http: https:',
|
|
|
|
cspNoInlineFont: 'font-src *',
|
|
|
|
|
|
|
|
liveBlockingProfiles: [],
|
|
|
|
blockingProfileColorCache: new Map(),
|
Add ability to control trusted status of filter lists
Related discussion:
https://github.com/uBlockOrigin/uBlock-issues/discussions/2895
Changes:
The _content of the My filters_ pane is now considered untrusted by
default, and only uBO's own lists are now trusted by default.
It has been observed that too many people will readily copy-paste
filters from random sources. Copy-pasting filters which require trust
represents a security risk to users with no understanding of how the
filters work and their potential abuse.
Using a filter which requires trust in a filter list from an untrusted
source will cause the filter to be invalid, i.e. shown as an error.
A new advanced setting has been added to control which lists are
considered trustworthy: `trustedListPrefixes`, which is a space-
separated list of tokens. Examples of possible values:
- `ublock-`: trust only uBO lists, exclude everything else including
content of _My filters_ (default value)
- `ublock- user-`: trust uBO lists and content of _My filters_
- `-`: trust no list, essentially disabling all filters requiring
trust (admins or people who don't trust us may want to use this)
One can also decide to trust lists maintained elsewhere. For example,
for stock AdGuard lists add ` adguard-`. To trust stock EasyList lists,
add ` easylist-`.
To trust a specific regional stock list, look-up its token in
assets.json and add to `trustedListPrefixes`.
The matching is made with String.startsWith(), hence why `ublock-`
matches all uBO's own filter lists.
This also allows to trust imported lists, for example add
` https://filters.adtidy.org/extension/ublock/filters/` to trust all
non-stock AdGuard lists.
Add the complete URL of a given imported list to trust only that one
list.
URLs not starting with `https://` or `file:///` will be rejected,
i.e. `http://example.org` will be ignored.
Invalid URLs are rejected.
2023-10-22 01:04:12 +02:00
|
|
|
parsedTrustedListPrefixes: [],
|
2022-02-03 12:14:04 +01:00
|
|
|
uiAccentStylesheet: '',
|
2021-07-25 16:55:35 +02:00
|
|
|
};
|
|
|
|
|
2023-12-10 18:33:51 +01:00
|
|
|
µBlock.isReadyPromise = new Promise(resolve => {
|
|
|
|
µBlock.isReadyResolve = resolve;
|
|
|
|
});
|
|
|
|
|
2021-07-25 16:55:35 +02:00
|
|
|
µBlock.domainFromHostname = domainFromHostname;
|
|
|
|
µBlock.hostnameFromURI = hostnameFromURI;
|
|
|
|
|
|
|
|
µBlock.FilteringContext = class extends FilteringContext {
|
|
|
|
duplicate() {
|
|
|
|
return (new µBlock.FilteringContext(this));
|
|
|
|
}
|
|
|
|
|
|
|
|
fromTabId(tabId) {
|
|
|
|
const tabContext = µBlock.tabContextManager.mustLookup(tabId);
|
|
|
|
this.tabOrigin = tabContext.origin;
|
|
|
|
this.tabHostname = tabContext.rootHostname;
|
|
|
|
this.tabDomain = tabContext.rootDomain;
|
|
|
|
this.tabId = tabContext.tabId;
|
|
|
|
return this;
|
|
|
|
}
|
|
|
|
|
2023-01-28 17:38:53 +01:00
|
|
|
maybeFromDocumentURL(documentUrl) {
|
|
|
|
if ( documentUrl === undefined ) { return; }
|
|
|
|
if ( documentUrl.startsWith(this.tabOrigin) ) { return; }
|
|
|
|
this.tabOrigin = originFromURI(µBlock.normalizeTabURL(0, documentUrl));
|
|
|
|
this.tabHostname = hostnameFromURI(this.tabOrigin);
|
|
|
|
this.tabDomain = domainFromHostname(this.tabHostname);
|
|
|
|
}
|
|
|
|
|
2021-07-25 16:55:35 +02:00
|
|
|
// https://github.com/uBlockOrigin/uBlock-issues/issues/459
|
|
|
|
// In case of a request for frame and if ever no context is specified,
|
|
|
|
// assume the origin of the context is the same as the request itself.
|
|
|
|
fromWebrequestDetails(details) {
|
|
|
|
const tabId = details.tabId;
|
|
|
|
this.type = details.type;
|
2023-01-28 17:38:53 +01:00
|
|
|
const isMainFrame = this.itype === this.MAIN_FRAME;
|
|
|
|
if ( isMainFrame && tabId > 0 ) {
|
2021-07-25 16:55:35 +02:00
|
|
|
µBlock.tabContextManager.push(tabId, details.url);
|
|
|
|
}
|
|
|
|
this.fromTabId(tabId); // Must be called AFTER tab context management
|
|
|
|
this.realm = '';
|
2022-12-18 21:36:59 +01:00
|
|
|
this.setMethod(details.method);
|
2021-07-25 16:55:35 +02:00
|
|
|
this.setURL(details.url);
|
|
|
|
this.aliasURL = details.aliasURL || undefined;
|
2023-01-28 17:38:53 +01:00
|
|
|
this.redirectURL = undefined;
|
|
|
|
this.filter = undefined;
|
2021-07-25 16:55:35 +02:00
|
|
|
if ( this.itype !== this.SUB_FRAME ) {
|
|
|
|
this.docId = details.frameId;
|
|
|
|
this.frameId = -1;
|
|
|
|
} else {
|
|
|
|
this.docId = details.parentFrameId;
|
|
|
|
this.frameId = details.frameId;
|
|
|
|
}
|
|
|
|
if ( this.tabId > 0 ) {
|
|
|
|
if ( this.docId === 0 ) {
|
2023-01-28 17:38:53 +01:00
|
|
|
if ( isMainFrame === false ) {
|
|
|
|
this.maybeFromDocumentURL(details.documentUrl);
|
|
|
|
}
|
2021-07-25 16:55:35 +02:00
|
|
|
this.docOrigin = this.tabOrigin;
|
|
|
|
this.docHostname = this.tabHostname;
|
|
|
|
this.docDomain = this.tabDomain;
|
2023-01-28 17:38:53 +01:00
|
|
|
return this;
|
|
|
|
}
|
|
|
|
if ( details.documentUrl !== undefined ) {
|
2021-07-25 16:55:35 +02:00
|
|
|
this.setDocOriginFromURL(details.documentUrl);
|
2023-01-28 17:38:53 +01:00
|
|
|
return this;
|
|
|
|
}
|
|
|
|
const pageStore = µBlock.pageStoreFromTabId(this.tabId);
|
|
|
|
const docStore = pageStore && pageStore.getFrameStore(this.docId);
|
|
|
|
if ( docStore ) {
|
|
|
|
this.setDocOriginFromURL(docStore.rawURL);
|
2021-07-25 16:55:35 +02:00
|
|
|
} else {
|
2023-01-28 17:38:53 +01:00
|
|
|
this.setDocOrigin(this.tabOrigin);
|
2021-07-25 16:55:35 +02:00
|
|
|
}
|
2023-01-28 17:38:53 +01:00
|
|
|
return this;
|
|
|
|
}
|
|
|
|
if ( details.documentUrl !== undefined ) {
|
2021-07-25 16:55:35 +02:00
|
|
|
const origin = originFromURI(
|
|
|
|
µBlock.normalizeTabURL(0, details.documentUrl)
|
|
|
|
);
|
|
|
|
this.setDocOrigin(origin).setTabOrigin(origin);
|
2023-01-28 17:38:53 +01:00
|
|
|
return this;
|
2021-07-25 16:55:35 +02:00
|
|
|
}
|
2023-03-01 02:08:31 +01:00
|
|
|
const origin = (this.itype & this.FRAME_ANY) !== 0
|
|
|
|
? originFromURI(this.url)
|
|
|
|
: this.tabOrigin;
|
2023-01-28 17:38:53 +01:00
|
|
|
this.setDocOrigin(origin).setTabOrigin(origin);
|
2021-07-25 16:55:35 +02:00
|
|
|
return this;
|
|
|
|
}
|
|
|
|
|
|
|
|
getTabOrigin() {
|
|
|
|
if ( this.tabOrigin === undefined ) {
|
|
|
|
const tabContext = µBlock.tabContextManager.mustLookup(this.tabId);
|
|
|
|
this.tabOrigin = tabContext.origin;
|
|
|
|
this.tabHostname = tabContext.rootHostname;
|
|
|
|
this.tabDomain = tabContext.rootDomain;
|
|
|
|
}
|
|
|
|
return super.getTabOrigin();
|
|
|
|
}
|
|
|
|
|
|
|
|
toLogger() {
|
2022-12-18 21:36:59 +01:00
|
|
|
const details = {
|
2024-01-25 18:20:38 +01:00
|
|
|
tstamp: 0,
|
2022-12-18 21:36:59 +01:00
|
|
|
realm: this.realm,
|
|
|
|
method: this.getMethodName(),
|
|
|
|
type: this.stype,
|
|
|
|
tabId: this.tabId,
|
|
|
|
tabDomain: this.getTabDomain(),
|
|
|
|
tabHostname: this.getTabHostname(),
|
|
|
|
docDomain: this.getDocDomain(),
|
|
|
|
docHostname: this.getDocHostname(),
|
|
|
|
domain: this.getDomain(),
|
|
|
|
hostname: this.getHostname(),
|
|
|
|
url: this.url,
|
|
|
|
aliasURL: this.aliasURL,
|
|
|
|
filter: undefined,
|
|
|
|
};
|
2021-07-25 16:55:35 +02:00
|
|
|
// Many filters may have been applied to the current context
|
2022-12-18 21:36:59 +01:00
|
|
|
if ( Array.isArray(this.filter) === false ) {
|
|
|
|
details.filter = this.filter;
|
|
|
|
return logger.writeOne(details);
|
2021-07-25 16:55:35 +02:00
|
|
|
}
|
2022-12-18 21:36:59 +01:00
|
|
|
for ( const filter of this.filter ) {
|
|
|
|
details.filter = filter;
|
|
|
|
logger.writeOne(details);
|
2021-07-25 16:55:35 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
µBlock.filteringContext = new µBlock.FilteringContext();
|
|
|
|
|
2021-08-23 16:28:44 +02:00
|
|
|
self.µBlock = µBlock;
|
2014-06-24 00:42:43 +02:00
|
|
|
|
|
|
|
/******************************************************************************/
|
2021-07-25 16:55:35 +02:00
|
|
|
|
|
|
|
export default µBlock;
|