Rietveld Code Review Tool
Help | Bug tracker | Discussion group | Source code

Unified Diff: lib/requestBlocker.js

Issue 29680696: [$csp4 adblockpluschrome] Issue 5241 - Add support for Content Security Policy filters (Closed)
Patch Set: Use extractHostFromFrame and attempt to match $csp exceptions non-recursively Created March 16, 2018, 12:43 p.m.
Use n/p to move between diff chunks; N/P to move between comments.
Jump to:
View side-by-side diff with in-line comments
Download patch
« lib/csp.js ('K') | « lib/devtools.js ('k') | metadata.chrome » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: lib/requestBlocker.js
diff --git a/lib/requestBlocker.js b/lib/requestBlocker.js
index 56f6313cea25fe63ebfef2c5b0498a70f989117b..a26cab4deb9570d02aa4d8386e5764096200e488 100644
--- a/lib/requestBlocker.js
+++ b/lib/requestBlocker.js
@@ -68,10 +68,12 @@ exports.filterTypes = new Set(function*()
yield "WEBSOCKET";
yield "WEBRTC";
- // POPUP and ELEMHIDE filters aren't blocked on the request level but by other
- // means. They don't have a corresponding value in webRequest.ResourceType.
+ // POPUP, CSP and ELEMHIDE filters aren't blocked on the request level but by
Sebastian Noack 2018/03/16 23:52:39 Technically, the CSP filter is implemented on the
kzar 2018/03/19 14:41:30 Done.
+ // other means. They don't have a corresponding value in
+ // webRequest.ResourceType.
yield "POPUP";
yield "ELEMHIDE";
+ yield "CSP";
}());
function onBeforeRequestAsync(page, url, type, docDomain,
« lib/csp.js ('K') | « lib/devtools.js ('k') | metadata.chrome » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld