Left: | ||
Right: |
OLD | NEW |
---|---|
1 /* | 1 /* |
2 * This file is part of Adblock Plus <https://adblockplus.org/>, | 2 * This file is part of Adblock Plus <https://adblockplus.org/>, |
3 * Copyright (C) 2006-2015 Eyeo GmbH | 3 * Copyright (C) 2006-2015 Eyeo GmbH |
4 * | 4 * |
5 * Adblock Plus is free software: you can redistribute it and/or modify | 5 * Adblock Plus is free software: you can redistribute it and/or modify |
6 * it under the terms of the GNU General Public License version 3 as | 6 * it under the terms of the GNU General Public License version 3 as |
7 * published by the Free Software Foundation. | 7 * published by the Free Software Foundation. |
8 * | 8 * |
9 * Adblock Plus is distributed in the hope that it will be useful, | 9 * Adblock Plus is distributed in the hope that it will be useful, |
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of | 10 * but WITHOUT ANY WARRANTY; without even the implied warranty of |
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | 11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
12 * GNU General Public License for more details. | 12 * GNU General Public License for more details. |
13 * | 13 * |
14 * You should have received a copy of the GNU General Public License | 14 * You should have received a copy of the GNU General Public License |
15 * along with Adblock Plus. If not, see <http://www.gnu.org/licenses/>. | 15 * along with Adblock Plus. If not, see <http://www.gnu.org/licenses/>. |
16 */ | 16 */ |
17 | 17 |
18 let {getDecodedHostname, stringifyURL} = require("url"); | 18 let {extractHostFromFrame, stringifyURL, isThirdParty} = require("url"); |
19 let {getKey, isFrameWhitelisted} = require("whitelisting"); | |
20 let {defaultMatcher} = require("matcher"); | |
21 let {WhitelistFilter} = require("filterClasses"); | |
19 | 22 |
20 function escapeChar(chr) | 23 function escapeChar(chr) |
21 { | 24 { |
22 let code = chr.charCodeAt(0); | 25 let code = chr.charCodeAt(0); |
23 | 26 |
24 // Control characters and leading digits must be escaped based on | 27 // Control characters and leading digits must be escaped based on |
25 // their char code in CSS. Moreover, curly brackets aren't allowed | 28 // their char code in CSS. Moreover, curly brackets aren't allowed |
26 // in elemhide filters, and therefore must be escaped based on their | 29 // in elemhide filters, and therefore must be escaped based on their |
27 // char code as well. | 30 // char code as well. |
28 if (code <= 0x1F || code == 0x7F || /[\d\{\}]/.test(chr)) | 31 if (code <= 0x1F || code == 0x7F || /[\d\{\}]/.test(chr)) |
(...skipping 21 matching lines...) Expand all Loading... | |
50 * @return {string} | 53 * @return {string} |
51 */ | 54 */ |
52 function quoteCSS(value) | 55 function quoteCSS(value) |
53 { | 56 { |
54 return '"' + value.replace(/["\\\{\}\x00-\x1F\x7F]/g, escapeChar) + '"'; | 57 return '"' + value.replace(/["\\\{\}\x00-\x1F\x7F]/g, escapeChar) + '"'; |
55 } | 58 } |
56 exports.quoteCSS = quoteCSS; | 59 exports.quoteCSS = quoteCSS; |
57 | 60 |
58 /** | 61 /** |
59 * Generates filters to block an element. | 62 * Generates filters to block an element. |
60 * | 63 * @param {Object} details |
61 * @param {string} tagName The element's tag name | 64 * @param {string} details.tagName The element's tag name |
62 * @param {string} [src] The element's "src" attribute | 65 * @param {string} detials.id The element's "id" attribute |
63 * @param {string} [id] The element's "id" attribute | 66 * @param {string} details.src The element's "src" attribute |
64 * @param {string} [style] The element's "style" attribute | 67 * @param {string} details.style The element's "style" attribute |
65 * @param {string[]} classes The classes given by the element's "class" attribu te | 68 * @param {string[]} details.classes The classes given by the element's "class" attribute |
66 * @param {string[]} urls The URLs considered when loading the element | 69 * @param {string[]} details.urls The URLs considered when loading the eleme nt |
67 * @param {URL} baseURL The URL of the document containing the element | 70 * @param {string} details.type The request type (will be ignored if there are no URLs) |
71 * @param {string} details.baseURL The URL of the document containing the ele ment | |
72 * @param {Page} details.page The page containing the element | |
73 * @param {Frame} details.frame The frame containing the element | |
Wladimir Palant
2015/03/03 19:17:01
I wonder whether JsDoc Toolkit will actually accep
Sebastian Noack
2015/03/03 19:18:54
Why not? This is official JSDoc syntax:
http://use
Wladimir Palant
2015/03/03 20:11:47
Yes, seems to be supported by our version as well:
| |
68 * | 74 * |
69 * @return {object} An object holding the list of generated filters and | 75 * @return {object} An object holding the list of generated filters and |
70 * the list of CSS selectors for the included element | 76 * the list of CSS selectors for the included element |
71 * hiding filters: {filters: [...], selectors: [...]} | 77 * hiding filters: {filters: [...], selectors: [...]} |
72 */ | 78 */ |
73 function composeFilters(tagName, id, src, style, classes, urls, baseURL) | 79 function composeFilters(details) |
74 { | 80 { |
75 // Add a blocking filter for each HTTP(S) URL associated with the element | |
76 let filters = []; | 81 let filters = []; |
77 for (let url of urls) | 82 let selectors = []; |
83 | |
84 let page = details.page; | |
85 let frame = details.frame; | |
86 | |
87 if (!isFrameWhitelisted(page, frame, "DOCUMENT")) | |
78 { | 88 { |
79 let urlObj = new URL(url, baseURL); | 89 let docDomain = extractHostFromFrame(frame); |
80 if (urlObj.protocol == "http:" || urlObj.protocol == "https:") | 90 |
91 // Add a blocking filter for each URL of the element that can be blocked | |
92 for (let url of details.urls) | |
81 { | 93 { |
82 let filter = stringifyURL(urlObj).replace(/^[\w\-]+:\/+(?:www\.)?/, "||"); | 94 let urlObj = new URL(url, details.baseURL); |
83 | 95 |
84 if (filters.indexOf(filter) == -1) | 96 if (urlObj.protocol == "http:" || urlObj.protocol == "https:") |
85 filters.push(filter); | 97 { |
98 url = stringifyURL(urlObj); | |
99 | |
100 let filter = defaultMatcher.matchesAny( | |
101 url, details.type, docDomain, | |
102 isThirdParty(urlObj, docDomain), | |
103 getKey(page, frame) | |
104 ); | |
105 | |
106 if (!(filter instanceof WhitelistFilter)) | |
107 { | |
108 let filterText = url.replace(/^[\w\-]+:\/+(?:www\.)?/, "||"); | |
109 | |
110 if (filters.indexOf(filterText) == -1) | |
111 filters.push(filterText); | |
112 } | |
113 } | |
114 } | |
115 | |
116 // If we couldn't generate any blocking filters, fallback to element hiding | |
117 let selectors = []; | |
118 if (filters.length == 0 && !isFrameWhitelisted(page, frame, "ELEMHIDE")) | |
119 { | |
120 // Generate CSS selectors based on the element's "id" and "class" attribut e | |
121 if (details.id) | |
122 selectors.push("#" + escapeCSS(details.id)); | |
123 if (details.classes.length > 0) | |
124 selectors.push(details.classes.map(c => "." + escapeCSS(c)).join("")); | |
125 | |
126 // If there is a "src" attribute, specifiying a URL that we can't block, | |
127 // generate a CSS selector matching the "src" attribute | |
128 if (details.src) | |
129 selectors.push(escapeCSS(details.tagName) + "[src=" + quoteCSS(details.s rc) + "]"); | |
130 | |
131 // As last resort, if there is a "style" attribute, and we couldn't genera te | |
132 // any filters so far, generate a CSS selector matching the "style" attrib ute | |
133 if (details.style && selectors.length == 0 && filters.length == 0) | |
134 selectors.push(escapeCSS(details.tagName) + "[style=" + quoteCSS(details .style) + "]"); | |
135 | |
136 // Add an element hiding filter for each generated CSS selector | |
137 for (let selector of selectors) | |
138 filters.push(docDomain.replace(/^www\./, "") + "##" + selector); | |
86 } | 139 } |
87 } | 140 } |
88 | 141 |
89 // If we couldn't generate any blocking filters, fallback to element hiding | |
90 let selectors = []; | |
91 if (filters.length == 0) | |
92 { | |
93 // Generate CSS selectors based on the element's "id" and "class" attribute | |
94 if (id) | |
95 selectors.push("#" + escapeCSS(id)); | |
96 if (classes.length > 0) | |
97 selectors.push(classes.map(c => "." + escapeCSS(c)).join("")); | |
98 | |
99 // If there is a "src" attribute, specifiying a URL that we can't block, | |
100 // generate a CSS selector matching the "src" attribute | |
101 if (src) | |
102 selectors.push(escapeCSS(tagName) + "[src=" + quoteCSS(src) + "]"); | |
103 | |
104 // As last resort, if there is a "style" attribute, and we couldn't generate | |
105 // any filters so far, generate a CSS selector matching the "style" attribut e | |
106 if (style && selectors.length == 0 && filters.length == 0) | |
107 selectors.push(escapeCSS(tagName) + "[style=" + quoteCSS(style) + "]"); | |
108 | |
109 // Add an element hiding filter for each generated CSS selector | |
110 if (selectors.length > 0) | |
111 { | |
112 let domain = getDecodedHostname(baseURL).replace(/^www\./, ""); | |
113 | |
114 for (let selector of selectors) | |
115 filters.push(domain + "##" + selector); | |
116 } | |
117 } | |
118 | |
119 return {filters: filters, selectors: selectors}; | 142 return {filters: filters, selectors: selectors}; |
120 } | 143 } |
121 exports.composeFilters = composeFilters; | 144 exports.composeFilters = composeFilters; |
OLD | NEW |