@@ -758,18 +758,11 @@ function dispatcher(request, sender, sendResponse) {
758
758
// messages from content scripts are to be treated with greater caution:
759
759
// https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ
760
760
//
761
- // prefer sender.origin when available
761
+ // use sender.origin, not sender.url:
762
762
// https://issues.chromium.org/issues/40095810
763
763
// https://bugzilla.mozilla.org/show_bug.cgi?id=1787379
764
764
// https://github.com/uBlockOrigin/uBlock-issues/issues/1992#issuecomment-1058056302
765
- //
766
- // TODO remove sender.origin sender.url/request.frameUrl fallbacks
767
- // TODO once minimum supported versions equal or exceed
768
- // TODO 80 (Chromium) and 126 (Firefox) in all builds
769
- if ( utils . hasOwn ( sender , "origin" ) ?
770
- sender . origin == "null" || sender . origin + '/' !== chrome . runtime . getURL ( '' ) :
771
- ! sender . url . startsWith ( chrome . runtime . getURL ( '' ) ) ) {
772
-
765
+ if ( sender . origin == "null" || sender . origin + '/' !== chrome . runtime . getURL ( '' ) ) {
773
766
// reject unless it's a known content script message
774
767
const KNOWN_CONTENT_SCRIPT_MESSAGES = [
775
768
"allowWidgetOnSite" ,
@@ -815,8 +808,7 @@ function dispatcher(request, sender, sendResponse) {
815
808
}
816
809
817
810
case "checkClobberingEnabled" : {
818
- if ( utils . hasOwn ( sender , "origin" ) ?
819
- sender . origin == "null" : request . frameUrl == "about:blank" ) {
811
+ if ( sender . origin == "null" ) {
820
812
return sendResponse ( ) ;
821
813
}
822
814
@@ -826,8 +818,7 @@ function dispatcher(request, sender, sendResponse) {
826
818
return sendResponse ( ) ;
827
819
}
828
820
829
- let frame_host = extractHostFromURL (
830
- utils . hasOwn ( sender , "origin" ) ? sender . origin + '/' : request . frameUrl ) ;
821
+ let frame_host = extractHostFromURL ( sender . origin + '/' ) ;
831
822
832
823
// CNAME uncloaking
833
824
if ( utils . hasOwn ( badger . cnameDomains , frame_host ) ) {
@@ -999,26 +990,19 @@ function dispatcher(request, sender, sendResponse) {
999
990
1000
991
case "supercookieReport" : {
1001
992
if ( badger . hasSupercookie ( request . data ) ) {
1002
- let frame_host = extractHostFromURL (
1003
- utils . hasOwn ( sender , "origin" ) ?
1004
- sender . origin + '/' : request . frameUrl ) ;
1005
- if ( frame_host ) {
1006
- recordSupercookie ( sender . tab . id , frame_host ) ;
1007
- }
993
+ let frame_host = extractHostFromURL ( sender . origin + '/' ) ;
994
+ recordSupercookie ( sender . tab . id , frame_host ) ;
1008
995
}
1009
996
break ;
1010
997
}
1011
998
1012
999
case "detectSupercookies" : {
1013
- if ( utils . hasOwn ( sender , "origin" ) ?
1014
- sender . origin == "null" : request . frameUrl == "about:blank" ) {
1000
+ if ( sender . origin == "null" ) {
1015
1001
return sendResponse ( ) ;
1016
1002
}
1017
1003
1018
1004
let tab_host = extractHostFromURL ( sender . tab . url ) ,
1019
- frame_host = extractHostFromURL (
1020
- utils . hasOwn ( sender , "origin" ) ?
1021
- sender . origin + '/' : request . frameUrl ) ;
1005
+ frame_host = extractHostFromURL ( sender . origin + '/' ) ;
1022
1006
1023
1007
// CNAME uncloaking
1024
1008
if ( utils . hasOwn ( badger . cnameDomains , frame_host ) ) {
@@ -1036,10 +1020,7 @@ function dispatcher(request, sender, sendResponse) {
1036
1020
case "detectFingerprinting" : {
1037
1021
if ( sender . frameId > 0 ) {
1038
1022
// do not modify the JS environment in Cloudflare CAPTCHA frames
1039
- if ( utils . hasOwn ( sender , "origin" ) ?
1040
- sender . origin === "https://challenges.cloudflare.com" :
1041
- sender . url . startsWith ( "https://challenges.cloudflare.com/" ) ) {
1042
-
1023
+ if ( sender . origin === "https://challenges.cloudflare.com" ) {
1043
1024
sendResponse ( false ) ;
1044
1025
break ;
1045
1026
}
@@ -1505,9 +1486,7 @@ function dispatcher(request, sender, sendResponse) {
1505
1486
// implications of accepting pbSurrogateMessage events
1506
1487
// from third-party scripts in nested frames
1507
1488
if ( sender . frameId > 0 ) {
1508
- let frame_origin = utils . hasOwn ( sender , "origin" ) ?
1509
- sender . origin != "null" && sender . origin :
1510
- request . frameUrl && ( new URL ( request . frameUrl ) ) . origin ;
1489
+ let frame_origin = sender . origin != "null" && sender . origin ;
1511
1490
1512
1491
if ( ! frame_origin ) {
1513
1492
break ;
0 commit comments