Revision 4970930c
Added by koszko over 1 year ago
background/webrequest.js | ||
---|---|---|
117 | 117 |
return; |
118 | 118 |
|
119 | 119 |
#IF DEBUG |
120 |
console.debug(`Settings queried using XHR for '${details.url}'.`); |
|
120 |
console.debug(`Haketilo: Settings queried using XHR for '${details.url}'.`);
|
|
121 | 121 |
#ENDIF |
122 | 122 |
|
123 | 123 |
/* |
... | ... | |
129 | 129 |
const queried_url = decodeURIComponent(match[1]); |
130 | 130 |
|
131 | 131 |
if (details.initiator && !queried_url.startsWith(details.initiator)) { |
132 |
console.warn(`Blocked suspicious query of '${url}' by '${details.initiator}'. This might be the result of page fingerprinting the browser.`); |
|
132 |
console.warn(`Haketilo: Blocked suspicious query of '${url}' by '${details.initiator}'. This might be the result of page fingerprinting the browser.`);
|
|
133 | 133 |
return {cancel: true}; |
134 | 134 |
} |
135 | 135 |
|
... | ... | |
140 | 140 |
} |
141 | 141 |
} |
142 | 142 |
|
143 |
console.warn(`Bad request! Expected ${browser.runtime.getURL("dummy")}?url=<valid_urlencoded_url>. Got ${details.url}. This might be the result of page fingerprinting the browser.`); |
|
143 |
console.warn(`Haketilo: Bad request! Expected ${browser.runtime.getURL("dummy")}?url=<valid_urlencoded_url>. Got ${details.url}. This might be the result of page fingerprinting the browser.`);
|
|
144 | 144 |
|
145 | 145 |
return {cancel: true}; |
146 | 146 |
} |
Also available in: Unified diff
prepend all generated console messages with 'Haketilo:'