mirror of
https://github.com/gorhill/uBlock.git
synced 2024-11-12 18:04:16 +01:00
73ce4e6bcf
Related issue: https://github.com/uBlockOrigin/uBlock-issues/issues/3394 When the "No large media elements" per-site switch is toggled on, it will also act to prevent autoplay of video/audio media, regardless of their size. This also works for xhr-based media streaming. If blocking by size is not desirable while blocking autoplay is desired, one can toggle on "No large media elements" switch while setting "Block media elements larger than ..." to a very high value.
226 lines
8.1 KiB
JavaScript
226 lines
8.1 KiB
JavaScript
/*******************************************************************************
|
|
|
|
uBlock Origin - a comprehensive, efficient content blocker
|
|
Copyright (C) 2017-present Raymond Hill
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see {http://www.gnu.org/licenses/}.
|
|
|
|
Home: https://github.com/gorhill/uBlock
|
|
*/
|
|
|
|
/******************************************************************************/
|
|
|
|
// https://github.com/uBlockOrigin/uBlock-issues/issues/1659
|
|
// Chromium fails to dispatch onCreatedNavigationTarget() events sometimes,
|
|
// so we synthetize these missing events when this happens.
|
|
// https://github.com/uBlockOrigin/uAssets/issues/10323
|
|
// Also mind whether the new tab is launched from an external application.
|
|
|
|
vAPI.Tabs = class extends vAPI.Tabs {
|
|
constructor() {
|
|
super();
|
|
this.tabIds = new Set();
|
|
browser.tabs.onCreated.addListener(tab => {
|
|
this.onCreatedHandler(tab);
|
|
});
|
|
}
|
|
|
|
onCreatedHandler(tab) {
|
|
if ( typeof tab.openerTabId === 'number' ) { return; }
|
|
if ( tab.index !== 0 ) { return; }
|
|
if ( tab.url !== '' ) { return; }
|
|
this.tabIds.add(tab.id);
|
|
}
|
|
|
|
onCreatedNavigationTargetHandler(details) {
|
|
this.tabIds.delete(details.tabId);
|
|
super.onCreatedNavigationTargetHandler(details);
|
|
}
|
|
|
|
onCommittedHandler(details) {
|
|
if ( details.frameId === 0 ) {
|
|
this.synthesizeNavigationTargetEvent(details);
|
|
}
|
|
super.onCommittedHandler(details);
|
|
}
|
|
|
|
onRemovedHandler(tabId, details) {
|
|
this.tabIds.delete(tabId);
|
|
super.onRemovedHandler(tabId, details);
|
|
}
|
|
|
|
synthesizeNavigationTargetEvent(details) {
|
|
if ( this.tabIds.has(details.tabId) === false ) { return; }
|
|
this.tabIds.delete(details.tabId);
|
|
const isClientRedirect =
|
|
Array.isArray(details.transitionQualifiers) &&
|
|
details.transitionQualifiers.includes('client_redirect');
|
|
const isStartPage = details.transitionType === 'start_page';
|
|
if ( isClientRedirect === false && isStartPage === false ) { return; }
|
|
this.onCreatedNavigationTargetHandler({
|
|
tabId: details.tabId,
|
|
sourceTabId: details.tabId,
|
|
sourceFrameId: 0,
|
|
url: details.url,
|
|
});
|
|
}
|
|
};
|
|
|
|
/******************************************************************************/
|
|
|
|
{
|
|
const extToTypeMap = new Map([
|
|
['eot','font'],['otf','font'],['svg','font'],['ttf','font'],['woff','font'],['woff2','font'],
|
|
['mp3','media'],['mp4','media'],['webm','media'],
|
|
['gif','image'],['ico','image'],['jpeg','image'],['jpg','image'],['png','image'],['webp','image']
|
|
]);
|
|
|
|
const parsedURL = new URL('https://www.example.org/');
|
|
|
|
// Extend base class to normalize as per platform
|
|
|
|
vAPI.Net = class extends vAPI.Net {
|
|
normalizeDetails(details) {
|
|
// Chromium 63+ supports the `initiator` property, which contains
|
|
// the URL of the origin from which the network request was made
|
|
if ( details.initiator && details.initiator !== 'null' ) {
|
|
details.documentUrl = details.initiator;
|
|
}
|
|
const type = details.type;
|
|
if ( type === 'imageset' ) {
|
|
details.type = 'image';
|
|
return;
|
|
}
|
|
if ( type !== 'other' ) { return; }
|
|
// Try to map known "extension" part of URL to request type
|
|
if ( details.responseHeaders === undefined ) {
|
|
parsedURL.href = details.url;
|
|
const path = parsedURL.pathname;
|
|
const pos = path.indexOf('.', path.length - 6);
|
|
if ( pos !== -1 ) {
|
|
details.type = extToTypeMap.get(path.slice(pos + 1)) || type;
|
|
}
|
|
return;
|
|
}
|
|
// Try to extract type from response headers
|
|
const ctype = this.headerValue(details.responseHeaders, 'content-type');
|
|
if ( ctype.startsWith('font/') ) {
|
|
details.type = 'font';
|
|
} else if ( ctype.startsWith('image/') ) {
|
|
details.type = 'image';
|
|
} else if ( ctype.startsWith('audio/') || ctype.startsWith('video/') ) {
|
|
details.type = 'media';
|
|
}
|
|
}
|
|
|
|
// https://www.reddit.com/r/uBlockOrigin/comments/9vcrk3/
|
|
// Some types can be mapped from 'other', thus include 'other' if and
|
|
// only if the caller is interested in at least one of those types
|
|
denormalizeTypes(types) {
|
|
if ( types.length === 0 ) {
|
|
return Array.from(this.validTypes);
|
|
}
|
|
const out = new Set();
|
|
for ( const type of types ) {
|
|
if ( this.validTypes.has(type) ) {
|
|
out.add(type);
|
|
}
|
|
}
|
|
if ( out.has('other') === false ) {
|
|
for ( const type of extToTypeMap.values() ) {
|
|
if ( out.has(type) ) {
|
|
out.add('other');
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
return Array.from(out);
|
|
}
|
|
|
|
// https://github.com/uBlockOrigin/uBlock-issues/issues/2063
|
|
// Do not interfere with root document
|
|
suspendOneRequest(details) {
|
|
this.onBeforeSuspendableRequest(details);
|
|
if ( details.type === 'main_frame' ) { return; }
|
|
return { cancel: true };
|
|
}
|
|
|
|
unsuspendAllRequests(discard = false) {
|
|
if ( discard === true ) { return; }
|
|
const toReload = [];
|
|
for ( const tabId of this.unprocessedTabs.keys() ) {
|
|
toReload.push(tabId);
|
|
}
|
|
this.removeUnprocessedRequest();
|
|
for ( const tabId of toReload ) {
|
|
vAPI.tabs.reload(tabId);
|
|
}
|
|
}
|
|
};
|
|
}
|
|
|
|
/******************************************************************************/
|
|
|
|
// https://github.com/uBlockOrigin/uBlock-issues/issues/548
|
|
// Use `X-DNS-Prefetch-Control` to workaround Chromium's disregard of the
|
|
// setting "Predict network actions to improve page load performance".
|
|
|
|
vAPI.prefetching = (( ) => {
|
|
let listening = false;
|
|
|
|
const onHeadersReceived = function(details) {
|
|
details.responseHeaders.push({
|
|
name: 'X-DNS-Prefetch-Control',
|
|
value: 'off'
|
|
});
|
|
return { responseHeaders: details.responseHeaders };
|
|
};
|
|
|
|
return state => {
|
|
const wr = chrome.webRequest;
|
|
if ( state && listening ) {
|
|
wr.onHeadersReceived.removeListener(onHeadersReceived);
|
|
listening = false;
|
|
} else if ( !state && !listening ) {
|
|
wr.onHeadersReceived.addListener(
|
|
onHeadersReceived,
|
|
{
|
|
urls: [ 'http://*/*', 'https://*/*' ],
|
|
types: [ 'main_frame', 'sub_frame' ]
|
|
},
|
|
[ 'blocking', 'responseHeaders' ]
|
|
);
|
|
listening = true;
|
|
}
|
|
};
|
|
})();
|
|
|
|
/******************************************************************************/
|
|
|
|
vAPI.scriptletsInjector = ((doc, details) => {
|
|
let script;
|
|
try {
|
|
script = doc.createElement('script');
|
|
script.appendChild(doc.createTextNode(details.scriptlets));
|
|
(doc.head || doc.documentElement).appendChild(script);
|
|
self.uBO_scriptletsInjected = details.filters;
|
|
} catch (ex) {
|
|
}
|
|
if ( script ) {
|
|
script.remove();
|
|
script.textContent = '';
|
|
}
|
|
}).toString();
|
|
|
|
/******************************************************************************/
|