Revision 4970930c
Added by koszko over 1 year ago
| background/webrequest.js | ||
|---|---|---|
| 117 | 117 |
return; |
| 118 | 118 |
|
| 119 | 119 |
#IF DEBUG |
| 120 |
console.debug(`Settings queried using XHR for '${details.url}'.`);
|
|
| 120 |
console.debug(`Haketilo: Settings queried using XHR for '${details.url}'.`);
|
|
| 121 | 121 |
#ENDIF |
| 122 | 122 |
|
| 123 | 123 |
/* |
| ... | ... | |
| 129 | 129 |
const queried_url = decodeURIComponent(match[1]); |
| 130 | 130 |
|
| 131 | 131 |
if (details.initiator && !queried_url.startsWith(details.initiator)) {
|
| 132 |
console.warn(`Blocked suspicious query of '${url}' by '${details.initiator}'. This might be the result of page fingerprinting the browser.`);
|
|
| 132 |
console.warn(`Haketilo: Blocked suspicious query of '${url}' by '${details.initiator}'. This might be the result of page fingerprinting the browser.`);
|
|
| 133 | 133 |
return {cancel: true};
|
| 134 | 134 |
} |
| 135 | 135 |
|
| ... | ... | |
| 140 | 140 |
} |
| 141 | 141 |
} |
| 142 | 142 |
|
| 143 |
console.warn(`Bad request! Expected ${browser.runtime.getURL("dummy")}?url=<valid_urlencoded_url>. Got ${details.url}. This might be the result of page fingerprinting the browser.`);
|
|
| 143 |
console.warn(`Haketilo: Bad request! Expected ${browser.runtime.getURL("dummy")}?url=<valid_urlencoded_url>. Got ${details.url}. This might be the result of page fingerprinting the browser.`);
|
|
| 144 | 144 |
|
| 145 | 145 |
return {cancel: true};
|
| 146 | 146 |
} |
Also available in: Unified diff
prepend all generated console messages with 'Haketilo:'