mirror of
https://github.com/kkapsner/CanvasBlocker
synced 2025-04-18 08:08:28 +02:00
parent
59f8e38722
commit
b7a8a51a56
@ -1051,6 +1051,10 @@
|
|||||||
"message": "Data-URL Seiten können nicht gegen Fingerprinting geschützt werden (siehe https://bugzilla.mozilla.org/show_bug.cgi?id=1475831). Indem Data-URL Seiten blockiert werden kann verhindert werden, dass der echte Fingerabdruck zu irgendeinem Server gelangt.",
|
"message": "Data-URL Seiten können nicht gegen Fingerprinting geschützt werden (siehe https://bugzilla.mozilla.org/show_bug.cgi?id=1475831). Indem Data-URL Seiten blockiert werden kann verhindert werden, dass der echte Fingerabdruck zu irgendeinem Server gelangt.",
|
||||||
"description": ""
|
"description": ""
|
||||||
},
|
},
|
||||||
|
"blockDataURLs_urlSpecific": {
|
||||||
|
"message": "Um bestimmte Seiten von diesem Schutz auszuschließen, klicken Sie auf den schwarzen Pfeil um das Menü zu öffnen, fügen Sie die gewünschte Domain oder URL mit einem Klick auf \"+\" hinzu und entfernen Sie das zugehörige Häkchen.",
|
||||||
|
"description": ""
|
||||||
|
},
|
||||||
"showReleaseNotes_title": {
|
"showReleaseNotes_title": {
|
||||||
"message": "Versionsinformationen",
|
"message": "Versionsinformationen",
|
||||||
"description": ""
|
"description": ""
|
||||||
|
@ -1099,6 +1099,10 @@
|
|||||||
"message": "Data URL pages cannot be protected against fingerprinting (see https://bugzilla.mozilla.org/show_bug.cgi?id=1475831). Blocking them prevents the real fingerprint to reach any server.",
|
"message": "Data URL pages cannot be protected against fingerprinting (see https://bugzilla.mozilla.org/show_bug.cgi?id=1475831). Blocking them prevents the real fingerprint to reach any server.",
|
||||||
"description": ""
|
"description": ""
|
||||||
},
|
},
|
||||||
|
"blockDataURLs_urlSpecific": {
|
||||||
|
"message": "To exclude specific websites from this protection, click on the black arrow to open the menu, add the domain or URL by clicking on \"+\" and remove its checkmark.",
|
||||||
|
"description": ""
|
||||||
|
},
|
||||||
|
|
||||||
"showReleaseNotes_title": {
|
"showReleaseNotes_title": {
|
||||||
"message": "Release notes",
|
"message": "Release notes",
|
||||||
|
@ -14,6 +14,7 @@
|
|||||||
|
|
||||||
const logging = require("./logging");
|
const logging = require("./logging");
|
||||||
const settings = require("./settings");
|
const settings = require("./settings");
|
||||||
|
const settingContainer = require("./settingContainers");
|
||||||
let canMergeHeader = false;
|
let canMergeHeader = false;
|
||||||
let blockBlob = true;
|
let blockBlob = true;
|
||||||
browser.runtime.getBrowserInfo().then(function(info){
|
browser.runtime.getBrowserInfo().then(function(info){
|
||||||
@ -42,7 +43,7 @@
|
|||||||
scope.init = function(){
|
scope.init = function(){
|
||||||
function listener(details){
|
function listener(details){
|
||||||
const headers = details.responseHeaders;
|
const headers = details.responseHeaders;
|
||||||
if (settings.blockDataURLs){
|
if (settings.get("blockDataURLs", new URL(details.url))){
|
||||||
const cspMatch = (blockBlob? "": "blob: ") + "filesystem: *";
|
const cspMatch = (blockBlob? "": "blob: ") + "filesystem: *";
|
||||||
logging.verbose("Adding CSP header to", details);
|
logging.verbose("Adding CSP header to", details);
|
||||||
setHeader(headers, {
|
setHeader(headers, {
|
||||||
@ -57,6 +58,7 @@
|
|||||||
}
|
}
|
||||||
function addListener(){
|
function addListener(){
|
||||||
if (!browser.webRequest.onHeadersReceived.hasListener(listener)){
|
if (!browser.webRequest.onHeadersReceived.hasListener(listener)){
|
||||||
|
logging.message("add listener for CSP headers (data URL protection)");
|
||||||
browser.webRequest.onHeadersReceived.addListener(
|
browser.webRequest.onHeadersReceived.addListener(
|
||||||
listener,
|
listener,
|
||||||
{
|
{
|
||||||
@ -68,10 +70,18 @@
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
function removeListener(){
|
function removeListener(){
|
||||||
browser.webRequest.onHeadersReceived.removeListener(listener);
|
if (browser.webRequest.onHeadersReceived.hasListener(listener)){
|
||||||
|
logging.message("remove listener for CSP headers (data URL protection)");
|
||||||
|
browser.webRequest.onHeadersReceived.removeListener(listener);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
function adjustListener(){
|
function adjustListener(){
|
||||||
if (settings.blockDataURLs){
|
if (
|
||||||
|
settings.blockDataURLs ||
|
||||||
|
settingContainer.urlContainer.get().some(function(entry){
|
||||||
|
return entry.blockDataURLs;
|
||||||
|
})
|
||||||
|
){
|
||||||
addListener();
|
addListener();
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
@ -81,6 +91,7 @@
|
|||||||
|
|
||||||
settings.onloaded(adjustListener);
|
settings.onloaded(adjustListener);
|
||||||
settings.on("blockDataURLs", adjustListener);
|
settings.on("blockDataURLs", adjustListener);
|
||||||
|
settingContainer.urlContainer.on(adjustListener);
|
||||||
};
|
};
|
||||||
|
|
||||||
}());
|
}());
|
@ -304,7 +304,8 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "blockDataURLs",
|
name: "blockDataURLs",
|
||||||
defaultValue: true
|
defaultValue: true,
|
||||||
|
urlSpecific: true
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "protectNavigator",
|
name: "protectNavigator",
|
||||||
|
@ -5,6 +5,7 @@ Version 0.5.9:
|
|||||||
new features:
|
new features:
|
||||||
- added protection for navigator properties
|
- added protection for navigator properties
|
||||||
- added support to import older storage versions
|
- added support to import older storage versions
|
||||||
|
- protection for data URLs can now be url specific
|
||||||
|
|
||||||
fixes:
|
fixes:
|
||||||
- search could show hidden settings
|
- search could show hidden settings
|
||||||
|
Loading…
x
Reference in New Issue
Block a user