Rietveld Code Review Tool
Help | Bug tracker | Discussion group | Source code

Unified Diff: lib/abp2blocklist.js

Issue 29502555: Issue 5464 - Ignore and whitelist WebRTC if not supported (Closed) Base URL: https://hg.adblockplus.org/abp2blocklist
Patch Set: Created Aug. 1, 2017, 8:14 a.m.
Use n/p to move between diff chunks; N/P to move between comments.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: lib/abp2blocklist.js
===================================================================
--- a/lib/abp2blocklist.js
+++ b/lib/abp2blocklist.js
@@ -137,17 +137,18 @@
function getURLSchemes(contentType)
{
// If the given content type includes all supported URL schemes, simply
// return a single generic URL scheme pattern. This minimizes the size of the
// generated rule set. The downside to this is that it will also match
// schemes that we do not want to match (e.g. "ftp://"), but this can be
// mitigated by adding exceptions for those schemes.
- if (contentType & typeMap.WEBSOCKET && contentType & typeMap.WEBRTC &&
+ if (contentType & typeMap.WEBSOCKET &&
+ (!typeMap.WEBRTC || contentType & typeMap.WEBRTC) &&
contentType & httpRequestTypes)
return ["[^:]+:(//)?"];
let urlSchemes = [];
if (contentType & typeMap.WEBSOCKET)
urlSchemes.push("wss?://");
@@ -414,17 +415,17 @@
// If WebSocket or WebRTC are given along with other options but not
// including all three of WebSocket, WebRTC, and at least one HTTP raw type,
// we must generate multiple rules. For example, for the filter
// "foo$websocket,image", we must generate one rule with "^wss?://" and "raw"
// and another rule with "^https?://" and "image". If we merge the two, we
// end up blocking requests of all HTTP raw types (e.g. XMLHttpRequest)
// inadvertently.
if ((contentType & typeMap.WEBSOCKET && contentType != typeMap.WEBSOCKET &&
- !(contentType & typeMap.WEBRTC &&
+ !((!typeMap.WEBRTC || contentType & typeMap.WEBRTC) &&
contentType & rawRequestTypes & httpRequestTypes)) ||
(contentType & typeMap.WEBRTC && contentType != typeMap.WEBRTC &&
!(contentType & typeMap.WEBSOCKET &&
contentType & rawRequestTypes & httpRequestTypes)))
{
if (contentType & typeMap.WEBSOCKET)
{
convertFilterAddRules(rules, filter, action, withResourceTypes,
@@ -1225,19 +1226,21 @@
* Generate content blocker list for all filters that were added
*/
ContentBlockerList.prototype.generateRules = function()
{
let cssRules = [];
let cssExceptionRules = [];
let blockingRules = [];
let blockingExceptionRules = [];
+ let urlSchemeExceptionRules = [];
let ruleGroups = [cssRules, cssExceptionRules,
- blockingRules, blockingExceptionRules];
+ blockingRules, blockingExceptionRules,
+ urlSchemeExceptionRules];
let genericSelectors = [];
let groupedElemhideFilters = new Map();
for (let filter of this.elemhideFilters)
{
let result = convertElemHideFilter(filter, this.elemhideSelectorExceptions);
if (!result)
@@ -1306,16 +1309,30 @@
}
for (let filter of this.requestExceptions)
{
convertFilterAddRules(blockingExceptionRules, filter,
"ignore-previous-rules", true);
}
+ if (!typeMap.WEBRTC)
+ {
+ urlSchemeExceptionRules.push([
+ {
+ trigger: {"url-filter": "^stuns?:"},
+ action: {type: "ignore-previous-rules"}
+ },
+ {
+ trigger: {"url-filter": "^turns?:"},
+ action: {type: "ignore-previous-rules"}
+ }
+ ]);
+ }
+
return async(ruleGroups, (group, index) => () =>
{
let next = () =>
{
if (index == ruleGroups.length - 1)
return ruleGroups.reduce((all, rules) => all.concat(rules), []);
};
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld