Revision 9d825eaa
Added by koszko over 1 year ago
| background/patterns_query_manager.js | ||
|---|---|---|
| 49 | 49 |
#FROM common/browser.js IMPORT browser |
| 50 | 50 |
#ENDIF |
| 51 | 51 |
|
| 52 |
let default_allow = {};
|
|
| 53 |
#EXPORT default_allow |
|
| 54 |
|
|
| 52 | 55 |
let secret; |
| 53 | 56 |
|
| 54 | 57 |
const tree = pqt.make(); |
| ... | ... | |
| 72 | 75 |
script_update_needed = false; |
| 73 | 76 |
|
| 74 | 77 |
const code = `\ |
| 75 |
this.haketilo_secret = ${secret};
|
|
| 76 |
this.haketilo_pattern_tree = ${JSON.stringify(tree)};
|
|
| 78 |
this.haketilo_secret = ${JSON.stringify(secret)};
|
|
| 79 |
this.haketilo_pattern_tree = ${JSON.stringify(tree)};
|
|
| 80 |
this.haketilo_default_allow = ${JSON.stringify(default_allow.value)};
|
|
| 77 | 81 |
if (this.haketilo_content_script_main) |
| 78 | 82 |
haketilo_content_script_main();`; |
| 79 | 83 |
|
| ... | ... | |
| 151 | 155 |
initial_mappings.forEach(m => register("mappings", m));
|
| 152 | 156 |
initial_blocking.forEach(b => register("blocking", b));
|
| 153 | 157 |
|
| 158 |
const set_allow_val = ch => default_allow.value = (ch.new_val || {}).value;
|
|
| 159 |
const [setting_tracking, initial_settings] = |
|
| 160 |
await haketilodb.track.settings(set_allow_val); |
|
| 161 |
for (const setting of initial_settings) {
|
|
| 162 |
if (setting.name === "default_allow") |
|
| 163 |
Object.assign(default_allow, setting); |
|
| 164 |
} |
|
| 165 |
|
|
| 154 | 166 |
#IF MOZILLA || MV3 |
| 155 | 167 |
script_update_needed = true; |
| 156 | 168 |
await update_content_script(); |
| background/webrequest.js | ||
|---|---|---|
| 50 | 50 |
#FROM common/misc.js IMPORT is_privileged_url, csp_header_regex |
| 51 | 51 |
#FROM common/policy.js IMPORT decide_policy |
| 52 | 52 |
|
| 53 |
#FROM background/patterns_query_manager.js IMPORT tree |
|
| 53 |
#FROM background/patterns_query_manager.js IMPORT tree, default_allow
|
|
| 54 | 54 |
|
| 55 | 55 |
let secret; |
| 56 | 56 |
|
| 57 |
let default_allow = false; |
|
| 58 |
|
|
| 59 |
async function track_default_allow() |
|
| 60 |
{
|
|
| 61 |
const set_val = ch => default_allow = (ch.new_val || {}).value;
|
|
| 62 |
const [tracking, settings] = await haketilodb.track.settings(set_val); |
|
| 63 |
for (const setting of settings) {
|
|
| 64 |
if (setting.name === "default_allow") |
|
| 65 |
default_allow = setting.value; |
|
| 66 |
} |
|
| 67 |
} |
|
| 68 |
|
|
| 69 | 57 |
function on_headers_received(details) |
| 70 | 58 |
{
|
| 71 | 59 |
const url = details.url; |
| ... | ... | |
| 74 | 62 |
|
| 75 | 63 |
let headers = details.responseHeaders; |
| 76 | 64 |
|
| 77 |
const policy = decide_policy(tree, details.url, !!default_allow, secret); |
|
| 65 |
const policy = |
|
| 66 |
decide_policy(tree, details.url, !!default_allow.value, secret); |
|
| 78 | 67 |
if (policy.allow) |
| 79 | 68 |
return; |
| 80 | 69 |
|
| common/misc.js | ||
|---|---|---|
| 96 | 96 |
* Check if url corresponds to a browser's special page (or a directory index in |
| 97 | 97 |
* case of `file://' protocol). |
| 98 | 98 |
*/ |
| 99 |
const privileged_reg = |
|
| 100 |
/^(chrome(-extension)?|moz-extension):\/\/|^about:|^file:\/\/.*\/$/; |
|
| 101 |
#EXPORT url => privileged_reg.test(url) AS is_privileged_url |
|
| 99 |
#IF MOZILLA |
|
| 100 |
const priv_reg = /^moz-extension:\/\/|^about:|^file:\/\/[^?#]*\/([?#]|$)/; |
|
| 101 |
#ELIF CHROMIUM |
|
| 102 |
const priv_reg = /^chrome(-extension)?:\/\/|^about:|^file:\/\/[^?#]*\/([?#]|$)/; |
|
| 103 |
#ENDIF |
|
| 104 |
#EXPORT url => priv_reg.test(url) AS is_privileged_url |
|
| 102 | 105 |
|
| 103 | 106 |
/* Parse a CSP header */ |
| 104 | 107 |
function parse_csp(csp) {
|
| content/content.js | ||
|---|---|---|
| 1 |
/** |
|
| 2 |
* This file is part of Haketilo. |
|
| 3 |
* |
|
| 4 |
* Function: Content scripts - main script. |
|
| 5 |
* |
|
| 6 |
* Copyright (C) 2022 Wojtek Kosior |
|
| 7 |
* |
|
| 8 |
* This program is free software: you can redistribute it and/or modify |
|
| 9 |
* it under the terms of the GNU General Public License as published by |
|
| 10 |
* the Free Software Foundation, either version 3 of the License, or |
|
| 11 |
* (at your option) any later version. |
|
| 12 |
* |
|
| 13 |
* This program is distributed in the hope that it will be useful, |
|
| 14 |
* but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
| 15 |
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
| 16 |
* GNU General Public License for more details. |
|
| 17 |
* |
|
| 18 |
* As additional permission under GNU GPL version 3 section 7, you |
|
| 19 |
* may distribute forms of that code without the copy of the GNU |
|
| 20 |
* GPL normally required by section 4, provided you include this |
|
| 21 |
* license notice and, in case of non-source distribution, a URL |
|
| 22 |
* through which recipients can access the Corresponding Source. |
|
| 23 |
* If you modify file(s) with this exception, you may extend this |
|
| 24 |
* exception to your version of the file(s), but you are not |
|
| 25 |
* obligated to do so. If you do not wish to do so, delete this |
|
| 26 |
* exception statement from your version. |
|
| 27 |
* |
|
| 28 |
* As a special exception to the GPL, any HTML file which merely |
|
| 29 |
* makes function calls to this code, and for that purpose |
|
| 30 |
* includes it by reference shall be deemed a separate work for |
|
| 31 |
* copyright law purposes. If you modify this code, you may extend |
|
| 32 |
* this exception to your version of the code, but you are not |
|
| 33 |
* obligated to do so. If you do not wish to do so, delete this |
|
| 34 |
* exception statement from your version. |
|
| 35 |
* |
|
| 36 |
* You should have received a copy of the GNU General Public License |
|
| 37 |
* along with this program. If not, see <https://www.gnu.org/licenses/>. |
|
| 38 |
* |
|
| 39 |
* I, Wojtek Kosior, thereby promise not to sue for violation of this file's |
|
| 40 |
* license. Although I request that you do not make use of this code in a |
|
| 41 |
* proprietary program, I am not going to enforce this in court. |
|
| 42 |
*/ |
|
| 43 |
|
|
| 44 |
#IMPORT content/repo_query_cacher.js |
|
| 45 |
|
|
| 46 |
#FROM common/browser.js IMPORT browser |
|
| 47 |
#FROM common/misc.js IMPORT is_privileged_url |
|
| 48 |
#FROM common/policy.js IMPORT decide_policy |
|
| 49 |
#FROM content/policy_enforcing.js IMPORT enforce_blocking |
|
| 50 |
|
|
| 51 |
let already_run = false, page_info; |
|
| 52 |
|
|
| 53 |
function on_page_info_request([type], sender, respond_cb) {
|
|
| 54 |
if (type !== "page_info") |
|
| 55 |
return; |
|
| 56 |
|
|
| 57 |
respond_cb(page_info); |
|
| 58 |
} |
|
| 59 |
|
|
| 60 |
globalThis.haketilo_content_script_main = function() {
|
|
| 61 |
if (already_run) |
|
| 62 |
return; |
|
| 63 |
|
|
| 64 |
already_run = true; |
|
| 65 |
|
|
| 66 |
if (is_privileged_url(document.URL)) |
|
| 67 |
return; |
|
| 68 |
|
|
| 69 |
browser.runtime.onMessage.addListener(on_page_info_request); |
|
| 70 |
repo_query_cacher.start(); |
|
| 71 |
|
|
| 72 |
const policy = decide_policy(globalThis.haketilo_pattern_tree, |
|
| 73 |
document.URL, |
|
| 74 |
globalThis.haketilo_defualt_allow, |
|
| 75 |
globalThis.haketilo_secret); |
|
| 76 |
page_info = Object.assign({url: document.URL}, policy);
|
|
| 77 |
["csp", "nonce"].forEach(prop => delete page_info[prop]); |
|
| 78 |
|
|
| 79 |
enforce_blocking(policy); |
|
| 80 |
} |
|
| 81 |
|
|
| 82 |
function main() {
|
|
| 83 |
if (globalThis.haketilo_pattern_tree !== undefined) |
|
| 84 |
globalThis.haketilo_content_script_main(); |
|
| 85 |
} |
|
| 86 |
|
|
| 87 |
#IF !UNIT_TEST |
|
| 88 |
main(); |
|
| 89 |
#ENDIF |
|
| html/default_blocking_policy.js | ||
|---|---|---|
| 83 | 83 |
toggle_policy_but.addEventListener("click", toggle_policy);
|
| 84 | 84 |
} |
| 85 | 85 |
|
| 86 |
#IF !TEST_UNIT
|
|
| 86 |
#IF !UNIT_TEST
|
|
| 87 | 87 |
init_default_policy_dialog(); |
| 88 | 88 |
#ENDIF |
| html/popup.js | ||
|---|---|---|
| 88 | 88 |
var mapping = `None (scripts ${scripts_fate} by a rule)`;
|
| 89 | 89 |
else if (page_info.mapping) |
| 90 | 90 |
var mapping = page_info.mapping; |
| 91 |
else |
|
| 92 |
var mapping = `None (scripts ${scripts_fate} by default policy)`;
|
|
| 91 |
else if (page_info.error)
|
|
| 92 |
var mapping = `None (error occured when determining policy)`;
|
|
| 93 | 93 |
by_id("mapping_used").innerText = mapping;
|
| 94 | 94 |
} |
| 95 | 95 |
} |
| test/unit/test_content.py | ||
|---|---|---|
| 1 |
# SPDX-License-Identifier: CC0-1.0 |
|
| 2 |
|
|
| 3 |
""" |
|
| 4 |
Haketilo unit tests - main content script |
|
| 5 |
""" |
|
| 6 |
|
|
| 7 |
# This file is part of Haketilo |
|
| 8 |
# |
|
| 9 |
# Copyright (C) 2022 Wojtek Kosior <koszko@koszko.org> |
|
| 10 |
# |
|
| 11 |
# This program is free software: you can redistribute it and/or modify |
|
| 12 |
# it under the terms of the CC0 1.0 Universal License as published by |
|
| 13 |
# the Creative Commons Corporation. |
|
| 14 |
# |
|
| 15 |
# This program is distributed in the hope that it will be useful, |
|
| 16 |
# but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
| 17 |
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
| 18 |
# CC0 1.0 Universal License for more details. |
|
| 19 |
|
|
| 20 |
import pytest |
|
| 21 |
import json |
|
| 22 |
from selenium.webdriver.support.ui import WebDriverWait |
|
| 23 |
|
|
| 24 |
from ..script_loader import load_script |
|
| 25 |
|
|
| 26 |
# From: |
|
| 27 |
# https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/WebExtensions/API/contentScripts/register |
|
| 28 |
# it is unclear whether the dynamically-registered content script is guaranteed |
|
| 29 |
# to be always executed after statically-registered ones. We want to test both |
|
| 30 |
# cases, so we'll make the mocked dynamic content script execute before |
|
| 31 |
# content.js on http:// pages and after it on https:// pages. |
|
| 32 |
dynamic_script = \ |
|
| 33 |
'''; |
|
| 34 |
this.haketilo_secret = "abracadabra"; |
|
| 35 |
this.haketilo_pattern_tree = {};
|
|
| 36 |
this.haketilo_defualt_allow = false; |
|
| 37 |
|
|
| 38 |
if (this.haketilo_content_script_main) |
|
| 39 |
this.haketilo_content_script_main(); |
|
| 40 |
''' |
|
| 41 |
|
|
| 42 |
content_script = \ |
|
| 43 |
''' |
|
| 44 |
/* Mock dynamic content script - case 'before'. */ |
|
| 45 |
if (/#dynamic_before$/.test(document.URL)) {
|
|
| 46 |
%s; |
|
| 47 |
} |
|
| 48 |
|
|
| 49 |
/* Place amalgamated content.js here. */ |
|
| 50 |
%s; |
|
| 51 |
|
|
| 52 |
/* Rest of mocks */ |
|
| 53 |
const data_to_verify = {};
|
|
| 54 |
function data_set(prop, val) {
|
|
| 55 |
data_to_verify[prop] = val; |
|
| 56 |
window.wrappedJSObject.data_to_verify = JSON.stringify(data_to_verify); |
|
| 57 |
} |
|
| 58 |
|
|
| 59 |
repo_query_cacher.start = () => data_set("cacher_started", true);
|
|
| 60 |
|
|
| 61 |
enforce_blocking = policy => data_set("enforcing", policy);
|
|
| 62 |
|
|
| 63 |
browser.runtime.onMessage.addListener = async function (listener_cb) {
|
|
| 64 |
await new Promise(cb => setTimeout(cb, 0)); |
|
| 65 |
|
|
| 66 |
/* Mock a good request. */ |
|
| 67 |
const set_good = val => data_set("good_request_result", val);
|
|
| 68 |
listener_cb(["page_info"], {}, val => set_good(val));
|
|
| 69 |
|
|
| 70 |
/* Mock a bad request. */ |
|
| 71 |
const set_bad = val => data_set("bad_request_result", val);
|
|
| 72 |
listener_cb(["???"], {}, val => set_bad(val));
|
|
| 73 |
} |
|
| 74 |
|
|
| 75 |
/* main() call - normally present in content.js, inside '#IF !UNIT_TEST'. */ |
|
| 76 |
main(); |
|
| 77 |
|
|
| 78 |
/* Mock dynamic content script - case 'after'. */ |
|
| 79 |
if (/#dynamic_after$/.test(document.URL)) {
|
|
| 80 |
%s; |
|
| 81 |
} |
|
| 82 |
|
|
| 83 |
data_set("script_run_without_errors", true);
|
|
| 84 |
''' % (dynamic_script, load_script('content/content.js'), dynamic_script)
|
|
| 85 |
|
|
| 86 |
@pytest.mark.ext_data({'content_script': content_script})
|
|
| 87 |
@pytest.mark.usefixtures('webextension')
|
|
| 88 |
@pytest.mark.parametrize('target', ['dynamic_before', 'dynamic_after'])
|
|
| 89 |
def test_content_unprivileged_page(driver, execute_in_page, target): |
|
| 90 |
""" |
|
| 91 |
Test functioning of content.js on an page using unprivileged schema (e.g. |
|
| 92 |
'https://' and not 'about:'). |
|
| 93 |
""" |
|
| 94 |
driver.get(f'https://gotmyowndoma.in/index.html#{target}')
|
|
| 95 |
data = json.loads(driver.execute_script('return window.data_to_verify;'))
|
|
| 96 |
|
|
| 97 |
assert 'gotmyowndoma.in' in data['good_request_result']['url'] |
|
| 98 |
assert 'bad_request_result' not in data |
|
| 99 |
|
|
| 100 |
assert data['cacher_started'] == True |
|
| 101 |
|
|
| 102 |
assert data['enforcing']['allow'] == False |
|
| 103 |
assert 'mapping' not in data['enforcing'] |
|
| 104 |
assert 'error' not in data['enforcing'] |
|
| 105 |
|
|
| 106 |
assert data['script_run_without_errors'] == True |
|
| 107 |
|
|
| 108 |
@pytest.mark.ext_data({'content_script': content_script})
|
|
| 109 |
@pytest.mark.usefixtures('webextension')
|
|
| 110 |
@pytest.mark.parametrize('target', ['dynamic_before', 'dynamic_after'])
|
|
| 111 |
def test_content_privileged_page(driver, execute_in_page, target): |
|
| 112 |
""" |
|
| 113 |
Test functioning of content.js on an page considered privileged (e.g. a |
|
| 114 |
directory listing at 'file:///'). |
|
| 115 |
""" |
|
| 116 |
driver.get(f'file:///#{target}')
|
|
| 117 |
data = json.loads(driver.execute_script('return window.data_to_verify;'))
|
|
| 118 |
|
|
| 119 |
assert data == {'script_run_without_errors': True}
|
|
| test/unit/test_patterns_query_manager.py | ||
|---|---|---|
| 18 | 18 |
# CC0 1.0 Universal License for more details. |
| 19 | 19 |
|
| 20 | 20 |
import pytest |
| 21 |
import re |
|
| 22 | 21 |
import json |
| 23 | 22 |
from selenium.webdriver.support.ui import WebDriverWait |
| 24 | 23 |
|
| ... | ... | |
| 35 | 34 |
'payloads': payloads |
| 36 | 35 |
} |
| 37 | 36 |
|
| 38 |
content_script_tree_re = re.compile(r'this.haketilo_pattern_tree = (.*);') |
|
| 39 |
def extract_tree_data(content_script_text): |
|
| 40 |
return json.loads(content_script_tree_re.search(content_script_text)[1]) |
|
| 41 |
|
|
| 42 |
content_script_mapping_re = re.compile(r'this.haketilo_mappings = (.*);') |
|
| 43 |
def extract_mappings_data(content_script_text): |
|
| 44 |
return json.loads(content_script_mapping_re.search(content_script_text)[1]) |
|
| 37 |
def get_content_script_values(driver, content_script): |
|
| 38 |
""" |
|
| 39 |
Allow easy extraction of 'this.something = ...' values from generated |
|
| 40 |
content script and verify the content script is syntactically correct. |
|
| 41 |
""" |
|
| 42 |
return driver.execute_script( |
|
| 43 |
''' |
|
| 44 |
function value_holder() {
|
|
| 45 |
%s; |
|
| 46 |
return this; |
|
| 47 |
} |
|
| 48 |
return value_holder.call({});
|
|
| 49 |
''' % content_script) |
|
| 45 | 50 |
|
| 46 | 51 |
# Fields that are not relevant for testing are omitted from these mapping |
| 47 | 52 |
# definitions. |
| ... | ... | |
| 87 | 92 |
execute_in_page( |
| 88 | 93 |
''' |
| 89 | 94 |
const [initial_mappings, initial_blocking] = arguments.slice(0, 2); |
| 90 |
let mappingchange, blockingchange; |
|
| 95 |
let mappingchange, blockingchange, settingchange;
|
|
| 91 | 96 |
|
| 92 | 97 |
haketilodb.track.mapping = function (cb) {
|
| 93 | 98 |
mappingchange = cb; |
| ... | ... | |
| 99 | 104 |
|
| 100 | 105 |
return [{}, initial_blocking];
|
| 101 | 106 |
} |
| 107 |
haketilodb.track.settings = function (cb) {
|
|
| 108 |
settingchange = cb; |
|
| 109 |
|
|
| 110 |
return [{}, [{name: "default_allow", value: true}]];
|
|
| 111 |
} |
|
| 102 | 112 |
|
| 103 | 113 |
let last_script; |
| 104 | 114 |
let unregister_called = 0; |
| ... | ... | |
| 110 | 120 |
} |
| 111 | 121 |
browser = {contentScripts: {register: register_mock}};
|
| 112 | 122 |
|
| 113 |
returnval(start()); |
|
| 123 |
returnval(start("abracadabra"));
|
|
| 114 | 124 |
''', |
| 115 | 125 |
sample_mappings[0:2], sample_blocking[0:2]) |
| 116 | 126 |
|
| ... | ... | |
| 125 | 135 |
dict([('~allow', 1),
|
| 126 | 136 |
*[(f'inject-{fruit}', {'identifier': f'{fruit}-{best_pattern}'})
|
| 127 | 137 |
for fruit in ('banana', 'orange')]])
|
| 128 |
assert tree == extract_tree_data(content_script) |
|
| 138 |
cs_values = get_content_script_values(driver, content_script) |
|
| 139 |
assert cs_values['haketilo_secret'] == 'abracadabra' |
|
| 140 |
assert cs_values['haketilo_pattern_tree'] == tree |
|
| 141 |
assert cs_values['haketilo_default_allow'] == True |
|
| 129 | 142 |
assert deregistrations == 0 |
| 130 | 143 |
|
| 131 | 144 |
def condition_all_added(driver): |
| 132 | 145 |
last_script = execute_in_page('returnval(last_script);')
|
| 146 |
cs_values = get_content_script_values(driver, last_script) |
|
| 133 | 147 |
nums = [i for i in range(len(sample_blocking)) if i > 1] |
| 134 |
return (all([('gotmyown%sdoma' % i) in last_script for i in nums]) and
|
|
| 148 |
return (cs_values['haketilo_default_allow'] == False and |
|
| 149 |
all([('gotmyown%sdoma' % i) in last_script for i in nums]) and
|
|
| 135 | 150 |
all([m['identifier'] in last_script for m in sample_mappings])) |
| 136 | 151 |
|
| 137 | 152 |
execute_in_page( |
| 138 | 153 |
''' |
| 154 |
const new_setting_val = {name: "default_allow", value: false};
|
|
| 155 |
settingchange({key: "default_allow", new_val: new_setting_val});
|
|
| 139 | 156 |
for (const mapping of arguments[0]) |
| 140 | 157 |
mappingchange({key: mapping.identifier, new_val: mapping});
|
| 141 | 158 |
for (const blocking of arguments[1]) |
| ... | ... | |
| 163 | 180 |
|
| 164 | 181 |
def condition_all_removed(driver): |
| 165 | 182 |
content_script = execute_in_page('returnval(last_script);')
|
| 166 |
return extract_tree_data(content_script) == {}
|
|
| 183 |
cs_values = get_content_script_values(driver, content_script) |
|
| 184 |
return cs_values['haketilo_pattern_tree'] == {}
|
|
| 167 | 185 |
|
| 168 | 186 |
execute_in_page( |
| 169 | 187 |
''' |
| test/unit/test_popup.py | ||
|---|---|---|
| 62 | 62 |
**unprivileged_page_info, |
| 63 | 63 |
'mapping': 'm1', |
| 64 | 64 |
'payload': {'identifier': 'res1'}
|
| 65 |
}, |
|
| 66 |
'error': {
|
|
| 67 |
**unprivileged_page_info, |
|
| 68 |
'error': True |
|
| 65 | 69 |
} |
| 66 | 70 |
} |
| 67 | 71 |
|
| ... | ... | |
| 143 | 147 |
assert by_id['page_url'].text == mocked_page_infos[page_info_key]['url'] |
| 144 | 148 |
assert not by_id['repo_query_container'].is_displayed() |
| 145 | 149 |
|
| 146 |
if 'blocked' in page_info_key or page_info_key == 'mapping':
|
|
| 150 |
if 'blocked' in page_info_key or page_info_key in ('mapping', 'error'):
|
|
| 147 | 151 |
assert by_id['scripts_blocked'].text.lower() == 'yes' |
| 148 | 152 |
elif 'allowed' in page_info_key: |
| 149 | 153 |
assert by_id['scripts_blocked'].text.lower() == 'no' |
| ... | ... | |
| 167 | 171 |
elif 'default' in page_info_key: |
| 168 | 172 |
'by default_policy)' in mapping_text |
| 169 | 173 |
|
| 174 |
if page_info_key == 'error': |
|
| 175 |
assert mapping_text == 'None (error occured when determining policy)' |
|
| 176 |
|
|
| 170 | 177 |
@pytest.mark.ext_data(popup_ext_data) |
| 171 | 178 |
@pytest.mark.usefixtures('webextension')
|
| 172 | 179 |
def test_popup_repo_query(driver, execute_in_page): |
| test/unit/test_webrequest.py | ||
|---|---|---|
| 30 | 30 |
'''; |
| 31 | 31 |
// Mock pattern tree. |
| 32 | 32 |
tree = pqt.make(); |
| 33 |
// Mock default allow. |
|
| 34 |
default_allow = {name: "default_allow", value: true};
|
|
| 33 | 35 |
|
| 34 | 36 |
// Rule to block scripts. |
| 35 | 37 |
pqt.register(tree, "https://site.with.scripts.block.ed/***", |
| ... | ... | |
| 40 | 42 |
pqt.register(tree, "https://site.with.paylo.ad/***", |
| 41 | 43 |
"somemapping", {identifier: "someresource"});
|
| 42 | 44 |
|
| 43 |
// Mock IndexedDB. |
|
| 44 |
haketilodb.track.settings = |
|
| 45 |
() => [{}, [{name: "default_allow", value: true}]];
|
|
| 46 |
|
|
| 47 | 45 |
// Mock stream_filter. |
| 48 | 46 |
stream_filter.apply = (details, headers, policy) => headers; |
| 49 | 47 |
|
Also available in: Unified diff
add new root content script