Raymond Hill
9b3e94b23f
Import translation work from https://crowdin.com/project/
2024-10-27 14:46:25 -04:00
Raymond Hill
20b54185fa
Offer ability to skip redirects in strict-blocked page
...
Related discussion:
https://github.com/uBlockOrigin/uBlock-issues/issues/3206#issuecomment-2439639215
If a strict-blocked page matches a `urlskip=` filter, the page
will show the user the destination URL as a result of applying the
`urlskip` filter should they choose to proceed with the
navigation.
2024-10-27 14:24:08 -04:00
Raymond Hill
6aa9391c8d
Make Firefox dev build auto-update
2024-10-26 14:31:33 -04:00
Raymond Hill
87716cf781
New revision for stable release candidate
2024-10-26 14:04:55 -04:00
Raymond Hill
4cb92102c7
Update changelog
2024-10-26 14:03:58 -04:00
Raymond Hill
d04dc4c767
Add `-blocked` directive to `urlskip=` option
...
Potentially breaking change:
`urlskip=` option will no longer apply by default to blocked network
requests, only network requests which are not blocked can be skipped
through a `urlskip=` filter.
The new `urlskip=` directive `-blocked` can be used to explicitly
allow a `urlskip=` filter to also apply to blocked network requests.
Example: given the filter `||example.com^`, the filter:
||example.com/path/to/tracker$urlskip=?url
Will not prevent strict-blocking when navigating to:
https://example.com/path/to/tracker?url=https://example.org/
However, the filter:
||example.com/path/to/tracker$urlskip=-blocked ?url
Will cause the strict-blocking to be ignored and allow navigation
to proceed to the URL extracted as a result of applying the `urlskip=`
filter:
https://example.org/
Related discussion:
https://github.com/uBlockOrigin/uBlock-issues/issues/3206#issuecomment-2439627386
2024-10-26 12:56:52 -04:00
Raymond Hill
50785ea38b
Make Firefox dev build auto-update
2024-10-25 19:31:28 -04:00
Raymond Hill
d49062db08
New revision for dev build
2024-10-25 19:25:57 -04:00
Raymond Hill
033314ed34
Update changelog
2024-10-25 19:25:44 -04:00
Raymond Hill
11ca4a3923
Add `trusted-set-attr` scriptlet
...
@trustedScriptlet trusted-set-attr
@description
Sets the specified attribute on the specified elements. This scriptlet runs
once when the page loads then afterward on DOM mutations.
Reference: https://github.com/AdguardTeam/Scriptlets/blob/master/wiki/about-trusted-scriptlets.md#-%EF%B8%8F-trusted-set-attr
@param selector
A CSS selector for the elements to target.
@param attr
The name of the attribute to modify.
@param value
The new value of the attribute. Since the scriptlet requires a trusted
source, the value can be anything.
=====
Additionally, start to move scriptlets into their own source files
for easier maintenance and code review.
2024-10-25 19:12:08 -04:00
Raymond Hill
0851015d7d
Make Firefox dev build auto-update
2024-10-22 20:11:11 -04:00
Raymond Hill
c9ebe07d39
New revision for dev build
2024-10-22 19:57:45 -04:00
Raymond Hill
76041bdc64
Update changelog
2024-10-22 19:57:11 -04:00
Raymond Hill
2621c908c3
Remove `64:ff9b:` as private network block
...
Related issue:
https://github.com/uBlockOrigin/uBlock-issues/issues/3426
2024-10-22 19:49:29 -04:00
Nadav Mermer
2782b16ecf
Allow rulesets enabled in manifest.json to stay enabled when finding language defaults
2024-10-20 18:10:23 +03:00
Raymond Hill
b3408a46d1
Fix spurious error message re. bootstrap() not being present
...
Need `?.` before parenthesis for optional chaining to apply on
method call.
Related commit:
https://github.com/gorhill/uBlock/commit/5133991f7e
2024-10-19 12:09:48 -04:00
Raymond Hill
d4f15ca635
[mv3] Fix regression in extended filtering with some lists
...
Related issue:
https://github.com/uBlockOrigin/uBOL-home/issues/236
Regression from:
https://github.com/gorhill/uBlock/commit/58bfe4c846
Cosmetic- and scriptlet injection-based filters broke with filter
lists using AdGuard's `[$domain=/.../]` syntax.
Potentially affected filter lists:
- AdGuard Chinese
- AdGuard Turkish
2024-10-19 10:41:58 -04:00
Raymond Hill
12435d96cc
Make Firefox dev build auto-update
2024-10-17 13:05:37 -04:00
Raymond Hill
d5e662a50f
New revision for dev build
2024-10-17 12:45:04 -04:00
Raymond Hill
0425bdfd35
Import translation work from https://crowdin.com/project/ublock
2024-10-17 12:44:02 -04:00
Raymond Hill
27f3612fdf
[mv3] Set Optimal as default if extension broad permission at install time
...
This is to prepare uBOL to be ready to set Optimal mode as default
if ever Chromium-based browsers support a way to pre-grant broad host
permissions in a policy.
Related issue:
https://github.com/uBlockOrigin/uBOL-home/discussions/232
https://github.com/uBlockOrigin/uBOL-home/discussions/135
2024-10-17 12:37:21 -04:00
Raymond Hill
89c353640e
[mv3] Add EST-0 list
2024-10-17 12:27:49 -04:00
Raymond Hill
4291c874d9
Fix regression in `prevent-xhr` scriptlet
...
Related issue:
https://github.com/uBlockOrigin/uBlock-issues/issues/3418
2024-10-17 12:11:50 -04:00
Raymond Hill
98db549bb7
Make Firefox dev build auto-update
2024-10-16 08:56:20 -04:00
Raymond Hill
e6b7f06ab4
New revision for dev build
2024-10-16 08:29:52 -04:00
Raymond Hill
e9c0ad59dd
Update changelog
2024-10-16 08:29:25 -04:00
Raymond Hill
32f27c5131
Ensure `urlskip=` redirects only to `https:`
2024-10-16 08:25:56 -04:00
Raymond Hill
94ca27acd1
Make Firefox dev build auto-update
2024-10-12 09:25:59 -04:00
Raymond Hill
6df1ea8cd6
New revision for dev build
2024-10-12 08:56:20 -04:00
Raymond Hill
3e7a79ebef
Update changelog
2024-10-12 08:55:54 -04:00
Raymond Hill
ce9fc5dc14
Add support to `urlskip=` media resources
...
Related feedback:
https://github.com/uBlockOrigin/uBlock-issues/issues/3206#issuecomment-2406777654
2024-10-12 08:52:05 -04:00
Raymond Hill
2c60bb3b07
[mv3] Issue labels cannot be set client-side
2024-10-11 16:41:13 -04:00
Raymond Hill
44bcb5fd99
Make Firefox dev build auto-update
2024-10-11 09:15:40 -04:00
Raymond Hill
f5a7053acb
New revision for dev build
2024-10-11 09:07:12 -04:00
Raymond Hill
d0ae3c3e77
Update changelog
2024-10-11 09:06:49 -04:00
Raymond Hill
b8959dcca9
Comment
2024-10-11 09:04:23 -04:00
Raymond Hill
caba9cdefa
Use uBO's default listset
2024-10-11 09:03:30 -04:00
Raymond Hill
01eebffc1f
Add `-uricomponent` to `urlskip=` option
...
To unescape URI-encoded characters.
Related discussion:
https://github.com/uBlockOrigin/uBlock-issues/issues/3206#issuecomment-2406479971
2024-10-11 08:56:50 -04:00
Fanboynz
4d982d9972
Add forbidden/forever values ( #3925 )
2024-10-11 08:26:37 -04:00
Raymond Hill
e5d16a1883
Typo
2024-10-10 11:35:58 -04:00
Raymond Hill
3cee922e68
Make Firefox dev build auto-update
2024-10-10 11:35:40 -04:00
Raymond Hill
9e3c978d55
Minor edit to comment
2024-10-10 11:31:57 -04:00
Raymond Hill
2e1dac5950
New revision for dev build
2024-10-10 11:22:44 -04:00
Raymond Hill
0c462e3ca1
Update changelog
2024-10-10 11:22:23 -04:00
Raymond Hill
c86ed5287b
Add regex extraction transformation step to `urlskip=` option
...
Related feedback:
https://github.com/uBlockOrigin/uBlock-issues/issues/3206#issuecomment-2403795984
The first capture group of the regex will be used as the result of the
transformation. Example:
||podtrac.com/pts/redirect.mp3/$urlskip=/podtrac\.com\/pts\/redirect\.mp3\/(.*?\.mp3\b)/ +https
If the regex is invalid, or if it fails to extract a first capture
group, no redirection will occur.
2024-10-10 11:11:07 -04:00
Raymond Hill
913f20f0a8
Make Firefox dev build auto-update
2024-10-08 19:56:23 -04:00
Raymond Hill
a72def1cbf
New revision for dev build
2024-10-08 19:50:34 -04:00
Raymond Hill
987e198016
Update changelog
2024-10-08 19:50:14 -04:00
Raymond Hill
85877b12ed
Improve `prevent-window-open` scriptlet
...
Support triggering a `debugger` statement when `window.open()` is
called.
Related feedback:
https://github.com/uBlockOrigin/uAssets/issues/25510#issuecomment-2400067735
2024-10-08 19:47:35 -04:00
Raymond Hill
58bfe4c846
Add support to parse Adguard's `[$domain=/.../]` regex-based modifier
...
The modifier will be converted to one that is compatible with uBO, i.e.:
[$domain=/^trgoals\d+\.xyz$/]##+js(set-constant, isShow, true)
Will parsed as equivalent of:
/^trgoals\d+\.xyz$/##+js(set-constant, isShow, true)
Related issue:
https://github.com/AdguardTeam/FiltersCompiler/issues/204
Reference:
https://adguard.com/kb/general/ad-filtering/create-own-filters/#non-basic-domain-modifier
2024-10-08 19:19:08 -04:00