2014-06-23 16:42:43 -06:00
|
|
|
/*******************************************************************************
|
|
|
|
|
|
|
|
µBlock - a Chromium browser extension to block requests.
|
|
|
|
Copyright (C) 2014 Raymond Hill
|
|
|
|
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with this program. If not, see {http://www.gnu.org/licenses/}.
|
|
|
|
|
|
|
|
Home: https://github.com/gorhill/uBlock
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* global chrome, µBlock, punycode, publicSuffixList */
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
µBlock.getBytesInUse = function() {
|
|
|
|
var getBytesInUseHandler = function(bytesInUse) {
|
|
|
|
µBlock.storageUsed = bytesInUse;
|
|
|
|
};
|
|
|
|
chrome.storage.local.getBytesInUse(null, getBytesInUseHandler);
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
µBlock.saveLocalSettings = function() {
|
|
|
|
chrome.storage.local.set(this.localSettings, function() {
|
|
|
|
µBlock.getBytesInUse();
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
µBlock.loadLocalSettings = function() {
|
|
|
|
var settingsLoaded = function(store) {
|
|
|
|
µBlock.localSettings = store;
|
|
|
|
};
|
|
|
|
|
|
|
|
chrome.storage.local.get(this.localSettings, settingsLoaded);
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
// Save local settings regularly. Not critical.
|
|
|
|
|
|
|
|
µBlock.asyncJobs.add(
|
|
|
|
'autoSaveLocalSettings',
|
|
|
|
null,
|
|
|
|
µBlock.saveLocalSettings.bind(µBlock),
|
|
|
|
2 * 60 * 1000,
|
|
|
|
true
|
|
|
|
);
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
µBlock.saveUserSettings = function() {
|
|
|
|
chrome.storage.local.set(this.userSettings, function() {
|
|
|
|
µBlock.getBytesInUse();
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
µBlock.loadUserSettings = function() {
|
|
|
|
var settingsLoaded = function(store) {
|
2014-08-02 09:40:27 -06:00
|
|
|
var µb = µBlock;
|
|
|
|
// Backward compatibility after fix to #5
|
|
|
|
// TODO: remove once all users are up to date with latest version.
|
|
|
|
if ( store.netExceptionList ) {
|
|
|
|
if ( store.netWhitelist === '' ) {
|
|
|
|
store.netWhitelist = Object.keys(store.netExceptionList).join('\n');
|
|
|
|
if ( store.netWhitelist !== '' ) {
|
|
|
|
chrome.storage.local.set({ 'netWhitelist': store.netWhitelist });
|
|
|
|
}
|
|
|
|
}
|
|
|
|
delete store.netExceptionList;
|
|
|
|
chrome.storage.local.remove('netExceptionList');
|
|
|
|
}
|
|
|
|
µb.userSettings = store;
|
|
|
|
µb.netWhitelist = µb.whitelistFromString(store.netWhitelist);
|
|
|
|
µb.netWhitelistModifyTime = Date.now();
|
2014-06-23 16:42:43 -06:00
|
|
|
};
|
|
|
|
|
|
|
|
chrome.storage.local.get(this.userSettings, settingsLoaded);
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2014-07-17 08:52:43 -06:00
|
|
|
µBlock.saveWhitelist = function() {
|
2014-08-02 09:40:27 -06:00
|
|
|
this.userSettings.netWhitelist = this.stringFromWhitelist(this.netWhitelist);
|
|
|
|
var bin = { 'netWhitelist': this.userSettings.netWhitelist };
|
2014-07-17 08:52:43 -06:00
|
|
|
chrome.storage.local.set(bin, function() {
|
|
|
|
µBlock.getBytesInUse();
|
|
|
|
});
|
2014-08-02 09:40:27 -06:00
|
|
|
this.netWhitelistModifyTime = Date.now();
|
2014-07-17 08:52:43 -06:00
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2014-07-12 18:32:44 -06:00
|
|
|
µBlock.saveUserFilters = function(content, callback) {
|
|
|
|
return this.assets.put(this.userFiltersPath, content, callback);
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
µBlock.loadUserFilters = function(callback) {
|
|
|
|
return this.assets.get(this.userFiltersPath, callback);
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
µBlock.appendUserFilters = function(content) {
|
|
|
|
var onSaved = function(details) {
|
|
|
|
if ( details.error ) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
µBlock.loadUbiquitousBlacklists();
|
|
|
|
};
|
|
|
|
var onLoaded = function(details) {
|
|
|
|
if ( details.error ) {
|
|
|
|
return;
|
|
|
|
}
|
2014-07-13 10:57:20 -06:00
|
|
|
if ( details.content.indexOf(content.trim()) !== -1 ) {
|
2014-07-12 18:32:44 -06:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
µBlock.saveUserFilters(details.content + '\n' + content, onSaved);
|
|
|
|
};
|
|
|
|
if ( content.length > 0 ) {
|
|
|
|
this.loadUserFilters(onLoaded);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
2014-07-25 14:12:20 -06:00
|
|
|
µBlock.getAvailableLists = function(callback) {
|
|
|
|
var availableLists = {};
|
2014-06-23 16:42:43 -06:00
|
|
|
|
2014-07-25 14:12:20 -06:00
|
|
|
// selected lists
|
|
|
|
var onSelectedListsLoaded = function(store) {
|
|
|
|
var lists = store.remoteBlacklists;
|
|
|
|
var locations = Object.keys(lists);
|
2014-06-23 16:42:43 -06:00
|
|
|
var location;
|
2014-07-25 14:12:20 -06:00
|
|
|
|
|
|
|
while ( location = locations.pop() ) {
|
|
|
|
if ( !availableLists[location] ) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
// https://github.com/gorhill/httpswitchboard/issues/218
|
|
|
|
// Transfer potentially existing list title into restored list data.
|
|
|
|
if ( lists[location].title !== availableLists[location].title ) {
|
|
|
|
lists[location].title = availableLists[location].title;
|
|
|
|
}
|
|
|
|
availableLists[location] = lists[location];
|
2014-06-23 16:42:43 -06:00
|
|
|
}
|
2014-07-25 14:12:20 -06:00
|
|
|
|
|
|
|
callback(availableLists);
|
2014-06-23 16:42:43 -06:00
|
|
|
};
|
|
|
|
|
2014-07-25 14:12:20 -06:00
|
|
|
// built-in lists
|
|
|
|
var onBuiltinListsLoaded = function(details) {
|
|
|
|
var location, locations;
|
|
|
|
try {
|
|
|
|
locations = JSON.parse(details.content);
|
|
|
|
} catch (e) {
|
|
|
|
locations = {};
|
|
|
|
}
|
|
|
|
for ( location in locations ) {
|
|
|
|
if ( locations.hasOwnProperty(location) === false ) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
availableLists['assets/thirdparties/' + location] = locations[location];
|
2014-06-23 16:42:43 -06:00
|
|
|
}
|
2014-07-25 14:12:20 -06:00
|
|
|
|
|
|
|
// Now get user's selection of lists
|
2014-06-23 16:42:43 -06:00
|
|
|
chrome.storage.local.get(
|
2014-07-25 14:12:20 -06:00
|
|
|
{ 'remoteBlacklists': availableLists },
|
|
|
|
onSelectedListsLoaded
|
2014-06-23 16:42:43 -06:00
|
|
|
);
|
|
|
|
};
|
|
|
|
|
2014-07-25 14:12:20 -06:00
|
|
|
// permanent lists
|
|
|
|
var location;
|
|
|
|
var lists = this.permanentLists;
|
|
|
|
for ( location in lists ) {
|
|
|
|
if ( lists.hasOwnProperty(location) === false ) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
availableLists[location] = lists[location];
|
|
|
|
}
|
|
|
|
|
|
|
|
// custom lists
|
|
|
|
var c;
|
|
|
|
var locations = this.userSettings.externalLists.split('\n');
|
|
|
|
for ( var i = 0; i < locations.length; i++ ) {
|
|
|
|
location = locations[i].trim();
|
|
|
|
c = location.charAt(0);
|
|
|
|
if ( location === '' || c === '!' || c === '#' ) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
// Coarse validation
|
|
|
|
if ( /[^0-9A-Za-z!*'();:@&=+$,\/?%#\[\]_.~-]/.test(location) ) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
availableLists[location] = {
|
|
|
|
title: '',
|
|
|
|
group: 'custom',
|
|
|
|
external: true
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
// get built-in block lists.
|
|
|
|
this.assets.get('assets/ublock/filter-lists.json', onBuiltinListsLoaded);
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
µBlock.loadUbiquitousBlacklists = function() {
|
|
|
|
var µb = this;
|
|
|
|
var blacklistLoadCount;
|
|
|
|
|
|
|
|
var loadBlacklistsEnd = function() {
|
|
|
|
µb.abpFilters.freeze();
|
|
|
|
µb.abpHideFilters.freeze();
|
|
|
|
µb.messaging.announce({ what: 'loadUbiquitousBlacklistCompleted' });
|
|
|
|
chrome.storage.local.set({ 'remoteBlacklists': µb.remoteBlacklists });
|
|
|
|
};
|
|
|
|
|
2014-06-23 16:42:43 -06:00
|
|
|
var mergeBlacklist = function(details) {
|
|
|
|
µb.mergeUbiquitousBlacklist(details);
|
|
|
|
blacklistLoadCount -= 1;
|
|
|
|
if ( blacklistLoadCount === 0 ) {
|
|
|
|
loadBlacklistsEnd();
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2014-07-25 14:12:20 -06:00
|
|
|
var loadBlacklistsStart = function(lists) {
|
|
|
|
µb.remoteBlacklists = lists;
|
2014-07-04 10:32:18 -06:00
|
|
|
|
2014-06-23 16:42:43 -06:00
|
|
|
// rhill 2013-12-10: set all existing entries to `false`.
|
|
|
|
µb.abpFilters.reset();
|
|
|
|
µb.abpHideFilters.reset();
|
2014-07-25 14:12:20 -06:00
|
|
|
var locations = Object.keys(lists);
|
|
|
|
blacklistLoadCount = locations.length;
|
2014-06-23 16:42:43 -06:00
|
|
|
if ( blacklistLoadCount === 0 ) {
|
|
|
|
loadBlacklistsEnd();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Load each preset blacklist which is not disabled.
|
|
|
|
var location;
|
2014-07-25 14:12:20 -06:00
|
|
|
while ( location = locations.pop() ) {
|
2014-06-23 16:42:43 -06:00
|
|
|
// rhill 2013-12-09:
|
|
|
|
// Ignore list if disabled
|
|
|
|
// https://github.com/gorhill/httpswitchboard/issues/78
|
2014-07-25 14:12:20 -06:00
|
|
|
if ( lists[location].off ) {
|
2014-06-23 16:42:43 -06:00
|
|
|
blacklistLoadCount -= 1;
|
|
|
|
continue;
|
|
|
|
}
|
2014-07-25 14:12:20 -06:00
|
|
|
if ( /^https?:\/\/.+$/.test(location) ) {
|
|
|
|
µb.assets.getExternal(location, mergeBlacklist);
|
|
|
|
} else {
|
|
|
|
µb.assets.get(location, mergeBlacklist);
|
2014-06-23 16:42:43 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2014-07-25 14:12:20 -06:00
|
|
|
this.getAvailableLists(loadBlacklistsStart);
|
2014-06-23 16:42:43 -06:00
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
µBlock.mergeUbiquitousBlacklist = function(details) {
|
|
|
|
// console.log('µBlock > mergeUbiquitousBlacklist from "%s": "%s..."', details.path, details.content.slice(0, 40));
|
|
|
|
|
|
|
|
var rawText = details.content;
|
|
|
|
var rawEnd = rawText.length;
|
|
|
|
|
|
|
|
// rhill 2013-10-21: No need to prefix with '* ', the hostname is just what
|
|
|
|
// we need for preset blacklists. The prefix '* ' is ONLY needed when
|
|
|
|
// used as a filter in temporary blacklist.
|
|
|
|
|
|
|
|
// rhill 2014-01-22: Transpose possible Adblock Plus-filter syntax
|
|
|
|
// into a plain hostname if possible.
|
|
|
|
// Useful references:
|
|
|
|
// https://adblockplus.org/en/filter-cheatsheet
|
|
|
|
// https://adblockplus.org/en/filters
|
|
|
|
var abpFilters = this.abpFilters;
|
2014-07-18 18:15:35 -06:00
|
|
|
var abpHideFilters = this.abpHideFilters;
|
|
|
|
var parseAllABPHideFilters = this.userSettings.parseAllABPHideFilters;
|
2014-07-16 08:43:34 -06:00
|
|
|
var duplicateCount = abpFilters.duplicateCount + abpHideFilters.duplicateCount;
|
|
|
|
var acceptedCount = abpFilters.acceptedCount + abpHideFilters.acceptedCount;
|
2014-06-23 16:42:43 -06:00
|
|
|
var reLocalhost = /(^|\s)(localhost\.localdomain|localhost|local|broadcasthost|0\.0\.0\.0|127\.0\.0\.1|::1|fe80::1%lo0)(?=\s|$)/g;
|
|
|
|
var reAdblockFilter = /^[^a-z0-9:]|[^a-z0-9]$|[^a-z0-9_:.-]/;
|
|
|
|
var reAdblockHostFilter = /^\|\|([a-z0-9.-]+[a-z0-9])\^?$/;
|
|
|
|
var reAsciiSegment = /^[\x21-\x7e]+$/;
|
|
|
|
var matches;
|
|
|
|
var lineBeg = 0, lineEnd, currentLineBeg;
|
|
|
|
var line, c;
|
|
|
|
|
|
|
|
while ( lineBeg < rawEnd ) {
|
|
|
|
lineEnd = rawText.indexOf('\n', lineBeg);
|
|
|
|
if ( lineEnd < 0 ) {
|
|
|
|
lineEnd = rawText.indexOf('\r', lineBeg);
|
|
|
|
if ( lineEnd < 0 ) {
|
|
|
|
lineEnd = rawEnd;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// rhill 2014-04-18: The trim is important here, as without it there
|
|
|
|
// could be a lingering `\r` which would cause problems in the
|
|
|
|
// following parsing code.
|
|
|
|
line = rawText.slice(lineBeg, lineEnd).trim();
|
|
|
|
currentLineBeg = lineBeg;
|
|
|
|
lineBeg = lineEnd + 1;
|
|
|
|
|
|
|
|
// Strip comments
|
|
|
|
c = line.charAt(0);
|
|
|
|
if ( c === '!' || c === '[' ) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// 2014-05-18: ABP element hide filters are allowed to contain space
|
|
|
|
// characters
|
2014-07-18 18:15:35 -06:00
|
|
|
if ( parseAllABPHideFilters ) {
|
2014-06-23 16:42:43 -06:00
|
|
|
if ( abpHideFilters.add(line) ) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( c === '#' ) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// https://github.com/gorhill/httpswitchboard/issues/15
|
|
|
|
// Ensure localhost et al. don't end up in the ubiquitous blacklist.
|
|
|
|
line = line
|
|
|
|
.replace(/\s+#.*$/, '')
|
|
|
|
.toLowerCase()
|
|
|
|
.replace(reLocalhost, '')
|
|
|
|
.trim();
|
|
|
|
|
|
|
|
// The filter is whatever sequence of printable ascii character without
|
|
|
|
// whitespaces
|
|
|
|
matches = reAsciiSegment.exec(line);
|
|
|
|
if ( !matches || matches.length === 0 ) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Bypass anomalies
|
|
|
|
// For example, when a filter contains whitespace characters, or
|
|
|
|
// whatever else outside the range of printable ascii characters.
|
|
|
|
if ( matches[0] !== line ) {
|
|
|
|
// console.error('"%s": "%s" !== "%s"', details.path, matches[0], line);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
line = matches[0];
|
|
|
|
|
|
|
|
// Likely an ABP net filter?
|
|
|
|
if ( reAdblockFilter.test(line) ) {
|
2014-07-18 18:15:35 -06:00
|
|
|
if ( abpFilters.add(line) ) {
|
|
|
|
continue;
|
2014-06-23 16:42:43 -06:00
|
|
|
}
|
|
|
|
// rhill 2014-01-22: Transpose possible Adblock Plus-filter syntax
|
|
|
|
// into a plain hostname if possible.
|
|
|
|
matches = reAdblockHostFilter.exec(line);
|
|
|
|
if ( !matches || matches.length < 2 ) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
line = matches[1];
|
|
|
|
}
|
|
|
|
|
|
|
|
if ( line === '' ) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2014-07-16 08:43:34 -06:00
|
|
|
abpFilters.addAnyPartyHostname(line);
|
2014-06-23 16:42:43 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// For convenience, store the number of entries for this
|
|
|
|
// blacklist, user might be happy to know this information.
|
2014-07-16 08:43:34 -06:00
|
|
|
duplicateCount = abpFilters.duplicateCount + abpHideFilters.duplicateCount - duplicateCount;
|
|
|
|
acceptedCount = abpFilters.acceptedCount + abpHideFilters.acceptedCount - acceptedCount;
|
|
|
|
|
|
|
|
this.remoteBlacklists[details.path].entryCount = acceptedCount + duplicateCount;
|
|
|
|
this.remoteBlacklists[details.path].entryUsedCount = acceptedCount;
|
2014-06-23 16:42:43 -06:00
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
// `switches` contains the preset blacklists for which the switch must be
|
|
|
|
// revisited.
|
|
|
|
|
|
|
|
µBlock.reloadPresetBlacklists = function(switches) {
|
|
|
|
var presetBlacklists = this.remoteBlacklists;
|
|
|
|
|
|
|
|
// Toggle switches, if any
|
|
|
|
if ( switches !== undefined ) {
|
|
|
|
var i = switches.length;
|
|
|
|
while ( i-- ) {
|
|
|
|
if ( !presetBlacklists[switches[i].location] ) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
presetBlacklists[switches[i].location].off = !!switches[i].off;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Save switch states
|
|
|
|
chrome.storage.local.set({ 'remoteBlacklists': presetBlacklists }, function() {
|
|
|
|
µBlock.getBytesInUse();
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now force reload
|
|
|
|
this.loadUbiquitousBlacklists();
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
µBlock.loadPublicSuffixList = function() {
|
|
|
|
var applyPublicSuffixList = function(details) {
|
|
|
|
// TODO: Not getting proper suffix list is a bit serious, I think
|
|
|
|
// the extension should be force-restarted if it occurs..
|
|
|
|
if ( !details.error ) {
|
|
|
|
publicSuffixList.parse(details.content, punycode.toASCII);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
this.assets.get(
|
|
|
|
'assets/thirdparties/publicsuffix.org/list/effective_tld_names.dat',
|
|
|
|
applyPublicSuffixList
|
|
|
|
);
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
// Load updatable assets
|
|
|
|
|
|
|
|
µBlock.loadUpdatableAssets = function() {
|
|
|
|
this.loadUbiquitousBlacklists();
|
|
|
|
this.loadPublicSuffixList();
|
|
|
|
};
|
|
|
|
|
|
|
|
/******************************************************************************/
|
|
|
|
|
|
|
|
// Load all
|
|
|
|
|
|
|
|
µBlock.load = function() {
|
|
|
|
this.loadLocalSettings();
|
|
|
|
this.loadUserSettings();
|
|
|
|
|
|
|
|
// load updatable assets -- after updating them if needed
|
|
|
|
this.assetUpdater.update(null, this.loadUpdatableAssets.bind(this));
|
|
|
|
|
|
|
|
this.getBytesInUse();
|
|
|
|
};
|