uBlock/src/js/contentscript-start.js

156 lines
5.7 KiB
JavaScript
Raw Normal View History

2014-06-23 16:42:43 -06:00
/*******************************************************************************
µBlock - a Chromium browser extension to block requests.
Copyright (C) 2014 Raymond Hill
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see {http://www.gnu.org/licenses/}.
Home: https://github.com/gorhill/uBlock
*/
/* jshint multistr: true */
/* global vAPI */
'use strict';
/******************************************************************************/
2014-06-23 16:42:43 -06:00
// Injected into content pages
/******************************************************************************/
// OK, I keep changing my mind whether a closure should be used or not. This
// will be the rule: if there are any variables directly accessed on a regular
// basis, use a closure so that they are cached. Otherwise I don't think the
// overhead of a closure is worth it. That's my understanding.
(function() {
// because Safari
if (location.protocol !== "http:" && location.protocol !== "https:") {
return;
}
2014-08-28 09:08:51 -06:00
var localMessager = vAPI.messaging.channel('contentscript-start.js');
2014-06-23 16:42:43 -06:00
/******************************************************************************/
/******************************************************************************/
// Domain-based ABP cosmetic filters.
// These can be inserted before the DOM is loaded.
var cosmeticFilters = function(details) {
2014-09-16 13:39:41 -06:00
// Maybe uBlock's style tag was already injected?
var style = document.getElementById('ublock-preload-1ae7a5f130fc79b4fdb8a4272d9426b5');
if ( style !== null ) {
return;
}
style = document.createElement('style');
style.setAttribute('id', 'ublock-preload-1ae7a5f130fc79b4fdb8a4272d9426b5');
var donthide = details.cosmeticDonthide;
var hide = details.cosmeticHide;
2014-08-07 14:12:15 -06:00
if ( donthide.length !== 0 ) {
2014-08-13 18:03:55 -06:00
donthide = donthide.length !== 1 ? donthide.join(',\n') : donthide[0];
donthide = donthide.split(',\n');
style.setAttribute('data-ublock-exceptions', JSON.stringify(donthide));
2014-08-07 14:12:15 -06:00
// https://github.com/gorhill/uBlock/issues/143
if ( hide.length !== 0 ) {
// I chose to use Array.indexOf() instead of converting the array to
// a map, then deleting whitelisted selectors, and then converting
// back the map into an array, because there are typically very few
// exception filters, if any.
2014-08-13 18:03:55 -06:00
hide = hide.length !== 1 ? hide.join(',\n') : hide[0];
hide = hide.split(',\n');
2014-08-07 14:12:15 -06:00
var i = donthide.length, j;
while ( i-- ) {
j = hide.indexOf(donthide[i]);
if ( j !== -1 ) {
hide.splice(j, 1);
}
}
2014-06-23 16:42:43 -06:00
}
}
2014-08-07 14:12:15 -06:00
if ( hide.length !== 0 ) {
2014-08-13 18:03:55 -06:00
var text = hide.join(',\n');
2014-08-17 14:07:42 -06:00
hideElements(text);
// The linefeed before the style block is very important: do not remove!
2014-08-13 18:03:55 -06:00
style.appendChild(document.createTextNode(text + '\n{display:none !important;}'));
//console.debug('µBlock> "%s" cosmetic filters: injecting %d CSS rules:', details.domain, details.hide.length, hideStyleText);
2014-08-07 14:12:15 -06:00
}
var parent = document.head || document.documentElement;
if ( parent ) {
parent.appendChild(style);
}
2014-06-23 16:42:43 -06:00
};
var netFilters = function(details) {
var parent = document.head || document.documentElement;
if ( !parent ) {
return;
}
var style = document.createElement('style');
style.setAttribute('class', 'ublock-preload-1ae7a5f130fc79b4fdb8a4272d9426b5');
var text = details.netHide.join(',\n');
var css = details.netCollapse ?
'\n{display:none !important;}' :
'\n{visibility:hidden !important;}';
style.appendChild(document.createTextNode(text + css));
parent.appendChild(style);
2014-08-17 14:07:42 -06:00
//console.debug('document.querySelectorAll("%s") = %o', text, document.querySelectorAll(text));
};
var filteringHandler = function(details) {
2014-09-16 13:39:41 -06:00
if ( details ) {
if ( details.cosmeticHide.length !== 0 || details.cosmeticDonthide.length !== 0 ) {
cosmeticFilters(details);
}
if ( details.netHide.length !== 0 ) {
netFilters(details);
}
// The port will never be used again at this point, disconnecting allows
// the browser to flush this script from memory.
}
2014-09-16 13:39:41 -06:00
// Do not close the port before we are done.
localMessager.close();
};
2014-08-17 14:07:42 -06:00
var hideElements = function(selectors) {
2014-06-23 16:42:43 -06:00
if ( document.body === null ) {
return;
}
2014-08-17 14:07:42 -06:00
// https://github.com/gorhill/uBlock/issues/158
// Using CSSStyleDeclaration.setProperty is more reliable
2014-06-23 16:42:43 -06:00
var elems = document.querySelectorAll(selectors);
var i = elems.length;
while ( i-- ) {
2014-08-17 14:07:42 -06:00
elems[i].style.setProperty('display', 'none', 'important');
2014-06-23 16:42:43 -06:00
}
};
localMessager.send(
2014-06-23 16:42:43 -06:00
{
what: 'retrieveDomainCosmeticSelectors',
pageURL: window.location.href,
locationURL: window.location.href
},
filteringHandler
2014-06-23 16:42:43 -06:00
);
/******************************************************************************/
/******************************************************************************/
})();
/******************************************************************************/