Commit Graph

12785 Commits

Author SHA1 Message Date
Raymond Hill 9b3e94b23f
Import translation work from https://crowdin.com/project/ 2024-10-27 14:46:25 -04:00
Raymond Hill 20b54185fa
Offer ability to skip redirects in strict-blocked page
Related discussion:
https://github.com/uBlockOrigin/uBlock-issues/issues/3206#issuecomment-2439639215

If a strict-blocked page matches a `urlskip=` filter, the page
will show the user the destination URL as a result of applying the
`urlskip` filter should they choose to proceed with the
navigation.
2024-10-27 14:24:08 -04:00
Raymond Hill 6aa9391c8d
Make Firefox dev build auto-update 2024-10-26 14:31:33 -04:00
Raymond Hill 87716cf781
New revision for stable release candidate 2024-10-26 14:04:55 -04:00
Raymond Hill 4cb92102c7
Update changelog 2024-10-26 14:03:58 -04:00
Raymond Hill d04dc4c767
Add `-blocked` directive to `urlskip=` option
Potentially breaking change:

`urlskip=` option will no longer apply by default to blocked network
requests, only network requests which are not blocked can be skipped
through a `urlskip=` filter.

The new `urlskip=` directive `-blocked` can be used to explicitly
allow a `urlskip=` filter to also apply to blocked network requests.

Example: given the filter `||example.com^`, the filter:

  ||example.com/path/to/tracker$urlskip=?url

Will not prevent strict-blocking when navigating to:

  https://example.com/path/to/tracker?url=https://example.org/

However, the filter:

  ||example.com/path/to/tracker$urlskip=-blocked ?url

Will cause the strict-blocking to be ignored and allow navigation
to proceed to the URL extracted as a result of applying the `urlskip=`
filter:

  https://example.org/

Related discussion:
https://github.com/uBlockOrigin/uBlock-issues/issues/3206#issuecomment-2439627386
2024-10-26 12:56:52 -04:00
Raymond Hill 50785ea38b
Make Firefox dev build auto-update 2024-10-25 19:31:28 -04:00
Raymond Hill d49062db08
New revision for dev build 2024-10-25 19:25:57 -04:00
Raymond Hill 033314ed34
Update changelog 2024-10-25 19:25:44 -04:00
Raymond Hill 11ca4a3923
Add `trusted-set-attr` scriptlet
@trustedScriptlet trusted-set-attr

@description
Sets the specified attribute on the specified elements. This scriptlet runs
once when the page loads then afterward on DOM mutations.

Reference: https://github.com/AdguardTeam/Scriptlets/blob/master/wiki/about-trusted-scriptlets.md#-%EF%B8%8F-trusted-set-attr

@param selector
A CSS selector for the elements to target.

@param attr
The name of the attribute to modify.

@param value
The new value of the attribute. Since the scriptlet requires a trusted
source, the value can be anything.

=====

Additionally, start to move scriptlets into their own source files
for easier maintenance and code review.
2024-10-25 19:12:08 -04:00
Raymond Hill 0851015d7d
Make Firefox dev build auto-update 2024-10-22 20:11:11 -04:00
Raymond Hill c9ebe07d39
New revision for dev build 2024-10-22 19:57:45 -04:00
Raymond Hill 76041bdc64
Update changelog 2024-10-22 19:57:11 -04:00
Raymond Hill 2621c908c3
Remove `64:ff9b:` as private network block
Related issue:
https://github.com/uBlockOrigin/uBlock-issues/issues/3426
2024-10-22 19:49:29 -04:00
Nadav Mermer 2782b16ecf Allow rulesets enabled in manifest.json to stay enabled when finding language defaults 2024-10-20 18:10:23 +03:00
Raymond Hill b3408a46d1
Fix spurious error message re. bootstrap() not being present
Need `?.` before parenthesis for optional chaining to apply on
method call.

Related commit:
https://github.com/gorhill/uBlock/commit/5133991f7e
2024-10-19 12:09:48 -04:00
Raymond Hill d4f15ca635
[mv3] Fix regression in extended filtering with some lists
Related issue:
https://github.com/uBlockOrigin/uBOL-home/issues/236

Regression from:
https://github.com/gorhill/uBlock/commit/58bfe4c846

Cosmetic- and scriptlet injection-based filters broke with filter
lists using AdGuard's `[$domain=/.../]` syntax.

Potentially affected filter lists:
- AdGuard Chinese
- AdGuard Turkish
2024-10-19 10:41:58 -04:00
Raymond Hill 12435d96cc
Make Firefox dev build auto-update 2024-10-17 13:05:37 -04:00
Raymond Hill d5e662a50f
New revision for dev build 2024-10-17 12:45:04 -04:00
Raymond Hill 0425bdfd35
Import translation work from https://crowdin.com/project/ublock 2024-10-17 12:44:02 -04:00
Raymond Hill 27f3612fdf
[mv3] Set Optimal as default if extension broad permission at install time
This is to prepare uBOL to be ready to set Optimal mode as default
if ever Chromium-based browsers support a way to pre-grant broad host
permissions in a policy.

Related issue:
https://github.com/uBlockOrigin/uBOL-home/discussions/232
https://github.com/uBlockOrigin/uBOL-home/discussions/135
2024-10-17 12:37:21 -04:00
Raymond Hill 89c353640e
[mv3] Add EST-0 list 2024-10-17 12:27:49 -04:00
Raymond Hill 4291c874d9
Fix regression in `prevent-xhr` scriptlet
Related issue:
https://github.com/uBlockOrigin/uBlock-issues/issues/3418
2024-10-17 12:11:50 -04:00
Raymond Hill 98db549bb7
Make Firefox dev build auto-update 2024-10-16 08:56:20 -04:00
Raymond Hill e6b7f06ab4
New revision for dev build 2024-10-16 08:29:52 -04:00
Raymond Hill e9c0ad59dd
Update changelog 2024-10-16 08:29:25 -04:00
Raymond Hill 32f27c5131
Ensure `urlskip=` redirects only to `https:` 2024-10-16 08:25:56 -04:00
Raymond Hill 94ca27acd1
Make Firefox dev build auto-update 2024-10-12 09:25:59 -04:00
Raymond Hill 6df1ea8cd6
New revision for dev build 2024-10-12 08:56:20 -04:00
Raymond Hill 3e7a79ebef
Update changelog 2024-10-12 08:55:54 -04:00
Raymond Hill ce9fc5dc14
Add support to `urlskip=` media resources
Related feedback:
https://github.com/uBlockOrigin/uBlock-issues/issues/3206#issuecomment-2406777654
2024-10-12 08:52:05 -04:00
Raymond Hill 2c60bb3b07
[mv3] Issue labels cannot be set client-side 2024-10-11 16:41:13 -04:00
Raymond Hill 44bcb5fd99
Make Firefox dev build auto-update 2024-10-11 09:15:40 -04:00
Raymond Hill f5a7053acb
New revision for dev build 2024-10-11 09:07:12 -04:00
Raymond Hill d0ae3c3e77
Update changelog 2024-10-11 09:06:49 -04:00
Raymond Hill b8959dcca9
Comment 2024-10-11 09:04:23 -04:00
Raymond Hill caba9cdefa
Use uBO's default listset 2024-10-11 09:03:30 -04:00
Raymond Hill 01eebffc1f
Add `-uricomponent` to `urlskip=` option
To unescape URI-encoded characters.

Related discussion:
https://github.com/uBlockOrigin/uBlock-issues/issues/3206#issuecomment-2406479971
2024-10-11 08:56:50 -04:00
Fanboynz 4d982d9972
Add forbidden/forever values (#3925) 2024-10-11 08:26:37 -04:00
Raymond Hill e5d16a1883
Typo 2024-10-10 11:35:58 -04:00
Raymond Hill 3cee922e68
Make Firefox dev build auto-update 2024-10-10 11:35:40 -04:00
Raymond Hill 9e3c978d55
Minor edit to comment 2024-10-10 11:31:57 -04:00
Raymond Hill 2e1dac5950
New revision for dev build 2024-10-10 11:22:44 -04:00
Raymond Hill 0c462e3ca1
Update changelog 2024-10-10 11:22:23 -04:00
Raymond Hill c86ed5287b
Add regex extraction transformation step to `urlskip=` option
Related feedback:
https://github.com/uBlockOrigin/uBlock-issues/issues/3206#issuecomment-2403795984

The first capture group of the regex will be used as the result of the
transformation. Example:

||podtrac.com/pts/redirect.mp3/$urlskip=/podtrac\.com\/pts\/redirect\.mp3\/(.*?\.mp3\b)/ +https

If the regex is invalid, or if it fails to extract a first capture
group, no redirection will occur.
2024-10-10 11:11:07 -04:00
Raymond Hill 913f20f0a8
Make Firefox dev build auto-update 2024-10-08 19:56:23 -04:00
Raymond Hill a72def1cbf
New revision for dev build 2024-10-08 19:50:34 -04:00
Raymond Hill 987e198016
Update changelog 2024-10-08 19:50:14 -04:00
Raymond Hill 85877b12ed
Improve `prevent-window-open` scriptlet
Support triggering a `debugger` statement when `window.open()` is
called.

Related feedback:
https://github.com/uBlockOrigin/uAssets/issues/25510#issuecomment-2400067735
2024-10-08 19:47:35 -04:00
Raymond Hill 58bfe4c846
Add support to parse Adguard's `[$domain=/.../]` regex-based modifier
The modifier will be converted to one that is compatible with uBO, i.e.:

    [$domain=/^trgoals\d+\.xyz$/]##+js(set-constant, isShow, true)

Will parsed as equivalent of:

    /^trgoals\d+\.xyz$/##+js(set-constant, isShow, true)

Related issue:
https://github.com/AdguardTeam/FiltersCompiler/issues/204

Reference:
https://adguard.com/kb/general/ad-filtering/create-own-filters/#non-basic-domain-modifier
2024-10-08 19:19:08 -04:00