Revision 4970930c
Added by koszko over 1 year ago
| background/webrequest.js | ||
|---|---|---|
| 117 | 117 | 
    return;  | 
| 118 | 118 | 
     | 
| 119 | 119 | 
    #IF DEBUG  | 
| 120 | 
        console.debug(`Settings queried using XHR for '${details.url}'.`);
   | 
|
| 120 | 
        console.debug(`Haketilo: Settings queried using XHR for '${details.url}'.`);
   | 
|
| 121 | 121 | 
    #ENDIF  | 
| 122 | 122 | 
     | 
| 123 | 123 | 
    /*  | 
| ... | ... | |
| 129 | 129 | 
    const queried_url = decodeURIComponent(match[1]);  | 
| 130 | 130 | 
     | 
| 131 | 131 | 
    	if (details.initiator && !queried_url.startsWith(details.initiator)) {
   | 
| 132 | 
    	    console.warn(`Blocked suspicious query of '${url}' by '${details.initiator}'. This might be the result of page fingerprinting the browser.`);
   | 
|
| 132 | 
    	    console.warn(`Haketilo: Blocked suspicious query of '${url}' by '${details.initiator}'. This might be the result of page fingerprinting the browser.`);
   | 
|
| 133 | 133 | 
    	    return {cancel: true};
   | 
| 134 | 134 | 
    }  | 
| 135 | 135 | 
     | 
| ... | ... | |
| 140 | 140 | 
    }  | 
| 141 | 141 | 
    }  | 
| 142 | 142 | 
     | 
| 143 | 
        console.warn(`Bad request! Expected ${browser.runtime.getURL("dummy")}?url=<valid_urlencoded_url>. Got ${details.url}. This might be the result of page fingerprinting the browser.`);
   | 
|
| 143 | 
        console.warn(`Haketilo: Bad request! Expected ${browser.runtime.getURL("dummy")}?url=<valid_urlencoded_url>. Got ${details.url}. This might be the result of page fingerprinting the browser.`);
   | 
|
| 144 | 144 | 
     | 
| 145 | 145 | 
        return {cancel: true};
   | 
| 146 | 146 | 
    }  | 
Also available in: Unified diff
prepend all generated console messages with 'Haketilo:'