summaryrefslogtreecommitdiff
path: root/src/content
Commit message (Collapse)AuthorAgeFilesLines
* Recursive webgl context monkeypatching across same origin windows ↵hackademix2019-09-291-22/+85
| | | | (concept/patch by skriptimaahinen).
* Replace cookie-based hacks with synchronous messaging (currently shimmed) to ↵hackademix2019-09-292-72/+19
| | | | retrieve fallback and per-tab restriction policies.
* Remove ChildPolicies and its dependencies.hackademix2019-09-291-21/+0
|
* Work-around for browser.i18n.getMessage() API in content scripts giving away ↵hackademix2019-07-311-1/+11
| | | | browser's real locale (Tor issue #31287).
* Fix incorrect console reporting from paste sanitization.hackademix2019-07-251-3/+3
|
* Fix paste sanitization bugs and make it work on drag and drop too.hackademix2019-07-241-33/+38
|
* Restore "classic" pasted HTML sanitization feature (patch by barbaz with ↵hackademix2019-07-231-0/+58
| | | | slight modifications).
* Add "Collapse blocked objects" option to the Blocked Objects prompt.hackademix2019-07-231-6/+14
|
* Update childNode.parentNode.removeChild(childNode) pattern to ↵hackademix2019-07-231-1/+1
| | | | childNode.remove().
* Handle corner case when application/* content types should match "media" ↵hackademix2019-07-231-4/+7
| | | | rather than "object".
* Handle replacement clicks even if a content placeholder is obstructed.hackademix2019-07-231-3/+8
|
* Static and click-to-play placeholders.hackademix2019-06-241-6/+5
|
* Fixed media replacement broken when <source> elements are used.hackademix2019-06-151-1/+5
|
* Fixed regression in full embedding document replacement due to timing changes.hackademix2019-06-152-3/+24
|
* Removed legacy DomNode.replaceChild() usage.hackademix2019-05-221-1/+1
|
* Skip MediaSource patching where it's disabled by browser settings.hackademix2019-04-291-1/+2
|
* Catch SecurityException thrown on cross-origin wrappedJSObject access.hackademix2019-04-081-1/+6
|
* Limit wrappedJSObject usages to compatible browsers.hackademix2019-04-013-3/+3
|
* Remove usage of non-standard Array methods.hackademix2019-02-011-3/+3
|
* Safer cookie-less check for unrestricted tabs from subdocuments.hackademix2018-12-271-4/+9
|
* Fix for unrestricted tabs not affecting about:blank subframes (issue #48).hackademix2018-12-262-3/+17
|
* Fix restored media element from placeholder not loading previously blocked ↵hackademix2018-12-061-3/+3
| | | | content.
* Fixed meta refresh inside <NOSCRIPT> emulation breaking Firefox's built-in ↵hackademix2018-11-171-18/+13
| | | | refresh blocking.
* Fixed potential race condition in per-tab configuration cookie hack.hackademix2018-10-141-3/+4
|
* Use cookie instead of window.name as a tab-configuration hack.hackademix2018-10-131-20/+9
|
* Set tab restrictions status across all frames.hackademix2018-10-121-9/+5
|
* FTP directory UI emulation on script-disabled domains.hackademix2018-09-261-0/+88
|
* Better IPV6 support.hackademix2018-09-102-8/+21
|
* Streamlined child policy content scripts.hackademix2018-09-103-9/+8
|
* Fix for various content script timing related issues.hackademix2018-09-092-4/+3
|
* Prevent multiple CSP entries to be injected in the DOM on each reload if ↵hackademix2018-09-091-4/+2
| | | | scripting is disabled.
* More efficient window.name persistence for tab-scoped permissions.hackademix2018-09-081-30/+34
|
* Saner message dispatching.hackademix2018-09-081-2/+1
|
* Work-around for a potential race condition in message handling on extension ↵hackademix2018-09-051-0/+5
| | | | updates.
* Ensure we remove the HEAD element parent of our META CSP policy only if we ↵hackademix2018-09-041-2/+3
| | | | created it.
* Work-around for CSP not being honored when the HEAD element has not been ↵hackademix2018-09-043-35/+15
| | | | inserted yet.
* Better file: protocol support.hackademix2018-09-044-20/+66
|
* Full-page placeholders for embedding documents.hackademix2018-09-032-0/+16
|
* Fix fallback scripts when ServiceWorkers are unavailablePeter Wu2018-08-301-6/+6
| | | | | | | ServiceWorkers are not available in private browsing mode (and can be disabled otherwise via about:config), be sure to check its availability. Otherwise fallback scripts are not invoked which prevents redirections in <noscript> tags from being executed (as observed with t.co).
* Reload-less service worker busting.hackademix2018-08-281-0/+10
|
* Further CSP refactoring and removal of obsolete fallbacks.hackademix2018-08-278-199/+200
|
* Let content script inject failsafe CSP in the DOM.hackademix2018-08-272-2/+35
|
* Hotfix for some possible reload loops before refactoring CSP management.hackademix2018-08-251-1/+0
|
* Fixed typo causing accidental permissions/status mismatches being checked ↵hackademix2018-08-231-1/+1
| | | | only while pages are still loading (thanks skriptimaahinen).
* More coherent wrapper around the webex messaging API.hackademix2018-08-222-14/+4
|
* Fixed possible surprises in background script message handling.hackademix2018-08-212-4/+4
|
* Removed all references to RequestUtil.js and dependancies.hackademix2018-08-183-16/+20
|
* Hack: use top.name to store per-tab content-side configuration (e.g. ↵hackademix2018-08-171-1/+41
| | | | unrestricted tab status).
* Policy serialization using the contentScripts API.hackademix2018-08-163-59/+85
|
* Improved support for debugging code removal in releases.hackademix2018-08-013-3/+3
|