Index: lib/csp.js |
=================================================================== |
--- a/lib/csp.js |
+++ b/lib/csp.js |
@@ -17,17 +17,17 @@ |
"use strict"; |
const {defaultMatcher} = require("../adblockpluscore/lib/matcher"); |
const {RegExpFilter, WhitelistFilter} = |
require("../adblockpluscore/lib/filterClasses"); |
const {extractHostFromFrame, isThirdParty} = require("./url"); |
const {checkWhitelisted} = require("./whitelisting"); |
-const {FilterNotifier} = require("filterNotifier"); |
+const {filterNotifier} = require("filterNotifier"); |
const {logRequest} = require("./hitLogger"); |
const {typeMap} = RegExpFilter; |
browser.webRequest.onHeadersReceived.addListener(details => |
{ |
let url = new URL(details.url); |
let parentFrame = ext.getFrame(details.tabId, details.parentFrameId); |
@@ -57,17 +57,17 @@ |
if (!cspMatch) |
return; |
} |
logRequest([details.tabId], { |
url: details.url, type: "CSP", docDomain: hostname, |
thirdParty, specificOnly |
}, cspMatch); |
- FilterNotifier.emit("filter.hitCount", cspMatch, 0, 0, [details.tabId]); |
+ filterNotifier.emit("filter.hitCount", cspMatch, 0, 0, [details.tabId]); |
if (cspMatch instanceof WhitelistFilter) |
return; |
details.responseHeaders.push({ |
name: "Content-Security-Policy", |
value: cspMatch.csp |
}); |