|
|
|
/*******************************************************************************
|
|
|
|
|
|
|
|
µBlock - a browser extension to block requests.
|
|
|
|
Copyright (C) 2014 The µBlock authors
|
|
|
|
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program. If not, see {http://www.gnu.org/licenses/}.
|
|
|
|
|
|
|
|
Home: https://github.com/gorhill/uMatrix
|
|
|
|
*/
|
|
|
|
|
|
|
|
'use strict';
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
this.EXPORTED_SYMBOLS = ['contentObserver'];
|
|
|
|
|
|
|
|
const {interfaces: Ci, utils: Cu} = Components;
|
|
|
|
const {Services} = Cu.import('resource://gre/modules/Services.jsm', null);
|
|
|
|
const {XPCOMUtils} = Cu.import('resource://gre/modules/XPCOMUtils.jsm', null);
|
|
|
|
|
|
|
|
const hostName = Services.io.newURI(Components.stack.filename, null, null).host;
|
|
|
|
|
|
|
|
// Cu.import('resource://gre/modules/devtools/Console.jsm');
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
const getMessageManager = function(win) {
|
|
|
|
return win
|
|
|
|
.QueryInterface(Ci.nsIInterfaceRequestor)
|
|
|
|
.getInterface(Ci.nsIDocShell)
|
|
|
|
.sameTypeRootTreeItem
|
|
|
|
.QueryInterface(Ci.nsIDocShell)
|
|
|
|
.QueryInterface(Ci.nsIInterfaceRequestor)
|
|
|
|
.getInterface(Ci.nsIContentFrameMessageManager);
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
const contentObserver = {
|
|
|
|
classDescription: 'content-policy for ' + hostName,
|
|
|
|
classID: Components.ID('{c84283d4-9975-41b7-b1a4-f106af56b51d}'),
|
|
|
|
contractID: '@' + hostName + '/content-policy;1',
|
|
|
|
ACCEPT: Ci.nsIContentPolicy.ACCEPT,
|
|
|
|
MAIN_FRAME: Ci.nsIContentPolicy.TYPE_DOCUMENT,
|
|
|
|
contentBaseURI: 'chrome://' + hostName + '/content/js/',
|
|
|
|
uniqueSandboxId: 1,
|
|
|
|
|
|
|
|
get componentRegistrar() {
|
|
|
|
return Components.manager.QueryInterface(Ci.nsIComponentRegistrar);
|
|
|
|
},
|
|
|
|
|
|
|
|
get categoryManager() {
|
|
|
|
return Components.classes['@mozilla.org/categorymanager;1']
|
|
|
|
.getService(Ci.nsICategoryManager);
|
|
|
|
},
|
|
|
|
|
|
|
|
QueryInterface: XPCOMUtils.generateQI([
|
|
|
|
Ci.nsIFactory,
|
|
|
|
Ci.nsIObserver,
|
|
|
|
Ci.nsIContentPolicy,
|
|
|
|
Ci.nsISupportsWeakReference
|
|
|
|
]),
|
|
|
|
|
|
|
|
createInstance: function(outer, iid) {
|
|
|
|
if ( outer ) {
|
|
|
|
throw Components.results.NS_ERROR_NO_AGGREGATION;
|
|
|
|
}
|
|
|
|
|
|
|
|
return this.QueryInterface(iid);
|
|
|
|
},
|
|
|
|
|
|
|
|
register: function() {
|
|
|
|
Services.obs.addObserver(this, 'document-element-inserted', true);
|
|
|
|
|
|
|
|
this.componentRegistrar.registerFactory(
|
|
|
|
this.classID,
|
|
|
|
this.classDescription,
|
|
|
|
this.contractID,
|
|
|
|
this
|
|
|
|
);
|
|
|
|
this.categoryManager.addCategoryEntry(
|
|
|
|
'content-policy',
|
|
|
|
this.contractID,
|
|
|
|
this.contractID,
|
|
|
|
false,
|
|
|
|
true
|
|
|
|
);
|
|
|
|
},
|
|
|
|
|
|
|
|
unregister: function() {
|
|
|
|
Services.obs.removeObserver(this, 'document-element-inserted');
|
|
|
|
|
|
|
|
this.componentRegistrar.unregisterFactory(this.classID, this);
|
|
|
|
this.categoryManager.deleteCategoryEntry(
|
|
|
|
'content-policy',
|
|
|
|
this.contractID,
|
|
|
|
false
|
|
|
|
);
|
|
|
|
},
|
|
|
|
|
|
|
|
// https://bugzil.la/612921
|
|
|
|
shouldLoad: function(type, location, origin, context) {
|
|
|
|
return this.ACCEPT;
|
|
|
|
},
|
|
|
|
|
|
|
|
initContentScripts: function(win, sandbox) {
|
|
|
|
let messager = getMessageManager(win);
|
|
|
|
let sandboxId = hostName + ':sb:' + this.uniqueSandboxId++;
|
|
|
|
|
|
|
|
if ( sandbox ) {
|
|
|
|
let sandboxName = [
|
|
|
|
win.location.href.slice(0, 100),
|
|
|
|
win.document.title.slice(0, 100)
|
|
|
|
].join(' | ');
|
|
|
|
|
|
|
|
sandbox = Cu.Sandbox([win], {
|
|
|
|
sandboxName: sandboxId + '[' + sandboxName + ']',
|
|
|
|
sandboxPrototype: win,
|
|
|
|
wantComponents: false,
|
|
|
|
wantXHRConstructor: false
|
|
|
|
});
|
|
|
|
|
|
|
|
sandbox.injectScript = function(script) {
|
|
|
|
Services.scriptloader.loadSubScript(script, sandbox);
|
|
|
|
};
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
sandbox = win;
|
|
|
|
}
|
|
|
|
|
|
|
|
sandbox._sandboxId_ = sandboxId;
|
|
|
|
sandbox.sendAsyncMessage = messager.sendAsyncMessage;
|
|
|
|
|
|
|
|
sandbox.addMessageListener = function(callback) {
|
|
|
|
if ( sandbox._messageListener_ ) {
|
|
|
|
sandbox.removeMessageListener();
|
|
|
|
}
|
|
|
|
|
|
|
|
sandbox._messageListener_ = function(message) {
|
|
|
|
callback(message.data);
|
|
|
|
};
|
|
|
|
|
|
|
|
messager.addMessageListener(
|
|
|
|
sandbox._sandboxId_,
|
|
|
|
sandbox._messageListener_
|
|
|
|
);
|
|
|
|
messager.addMessageListener(
|
|
|
|
hostName + ':broadcast',
|
|
|
|
sandbox._messageListener_
|
|
|
|
);
|
|
|
|
};
|
|
|
|
|
|
|
|
sandbox.removeMessageListener = function() {
|
|
|
|
try {
|
|
|
|
messager.removeMessageListener(
|
|
|
|
sandbox._sandboxId_,
|
|
|
|
sandbox._messageListener_
|
|
|
|
);
|
|
|
|
messager.removeMessageListener(
|
|
|
|
hostName + ':broadcast',
|
|
|
|
sandbox._messageListener_
|
|
|
|
);
|
|
|
|
} catch (ex) {
|
|
|
|
// It throws sometimes, mostly when the popup closes
|
|
|
|
}
|
|
|
|
|
|
|
|
sandbox._messageListener_ = null;
|
|
|
|
};
|
|
|
|
|
|
|
|
return sandbox;
|
|
|
|
},
|
|
|
|
|
|
|
|
observe: function(doc) {
|
|
|
|
let win = doc.defaultView;
|
|
|
|
if ( !win ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
let loc = win.location;
|
|
|
|
if ( !loc ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// https://github.com/gorhill/uBlock/issues/260
|
|
|
|
// TODO: We may have to skip more types, for now let's be
|
|
|
|
// conservative, i.e. let's not test against `text/html`.
|
|
|
|
if ( doc.contentType.lastIndexOf('image/', 0) === 0 ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( loc.protocol !== 'http:' && loc.protocol !== 'https:' && loc.protocol !== 'file:' ) {
|
|
|
|
if ( loc.protocol === 'chrome:' && loc.host === hostName ) {
|
|
|
|
this.initContentScripts(win);
|
|
|
|
}
|
|
|
|
|
|
|
|
// What about data: and about:blank?
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
let lss = Services.scriptloader.loadSubScript;
|
|
|
|
let sandbox = this.initContentScripts(win, true);
|
|
|
|
|
|
|
|
// Can throw with attempts at injecting into non-HTML document.
|
|
|
|
// Example: https://a.pomf.se/avonjf.webm
|
|
|
|
try {
|
|
|
|
lss(this.contentBaseURI + 'vapi-client.js', sandbox);
|
|
|
|
lss(this.contentBaseURI + 'contentscript-start.js', sandbox);
|
|
|
|
} catch (ex) {
|
|
|
|
return; // don't further try to inject anything
|
|
|
|
}
|
|
|
|
|
|
|
|
let docReady = (e) => {
|
|
|
|
let doc = e.target;
|
|
|
|
doc.removeEventListener(e.type, docReady, true);
|
|
|
|
lss(this.contentBaseURI + 'contentscript-end.js', sandbox);
|
|
|
|
};
|
|
|
|
|
|
|
|
if ( doc.readyState === 'loading') {
|
|
|
|
doc.addEventListener('DOMContentLoaded', docReady, true);
|
|
|
|
} else {
|
|
|
|
docReady({ target: doc, type: 'DOMContentLoaded' });
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
contentObserver.register();
|
|
|
|
|
|
|
|
/******************************************************************************/
|