Skip to content

Commit 8ceed63

Browse files
committed
Remove sender.origin fallbacks
1 parent 74b1c00 commit 8ceed63

File tree

1 file changed

+10
-31
lines changed

1 file changed

+10
-31
lines changed

src/js/webrequest.js

+10-31
Original file line numberDiff line numberDiff line change
@@ -758,18 +758,11 @@ function dispatcher(request, sender, sendResponse) {
758758
// messages from content scripts are to be treated with greater caution:
759759
// https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-UCHNm34/m/lDaXwQhzBAAJ
760760
//
761-
// prefer sender.origin when available
761+
// use sender.origin, not sender.url:
762762
// https://issues.chromium.org/issues/40095810
763763
// https://bugzilla.mozilla.org/show_bug.cgi?id=1787379
764764
// https://github.com/uBlockOrigin/uBlock-issues/issues/1992#issuecomment-1058056302
765-
//
766-
// TODO remove sender.origin sender.url/request.frameUrl fallbacks
767-
// TODO once minimum supported versions equal or exceed
768-
// TODO 80 (Chromium) and 126 (Firefox) in all builds
769-
if (utils.hasOwn(sender, "origin") ?
770-
sender.origin == "null" || sender.origin + '/' !== chrome.runtime.getURL('') :
771-
!sender.url.startsWith(chrome.runtime.getURL(''))) {
772-
765+
if (sender.origin == "null" || sender.origin + '/' !== chrome.runtime.getURL('')) {
773766
// reject unless it's a known content script message
774767
const KNOWN_CONTENT_SCRIPT_MESSAGES = [
775768
"allowWidgetOnSite",
@@ -815,8 +808,7 @@ function dispatcher(request, sender, sendResponse) {
815808
}
816809

817810
case "checkClobberingEnabled": {
818-
if (utils.hasOwn(sender, "origin") ?
819-
sender.origin == "null" : request.frameUrl == "about:blank") {
811+
if (sender.origin == "null") {
820812
return sendResponse();
821813
}
822814

@@ -826,8 +818,7 @@ function dispatcher(request, sender, sendResponse) {
826818
return sendResponse();
827819
}
828820

829-
let frame_host = extractHostFromURL(
830-
utils.hasOwn(sender, "origin") ? sender.origin + '/' : request.frameUrl);
821+
let frame_host = extractHostFromURL(sender.origin + '/');
831822

832823
// CNAME uncloaking
833824
if (utils.hasOwn(badger.cnameDomains, frame_host)) {
@@ -999,26 +990,19 @@ function dispatcher(request, sender, sendResponse) {
999990

1000991
case "supercookieReport": {
1001992
if (badger.hasSupercookie(request.data)) {
1002-
let frame_host = extractHostFromURL(
1003-
utils.hasOwn(sender, "origin") ?
1004-
sender.origin + '/' : request.frameUrl);
1005-
if (frame_host) {
1006-
recordSupercookie(sender.tab.id, frame_host);
1007-
}
993+
let frame_host = extractHostFromURL(sender.origin + '/');
994+
recordSupercookie(sender.tab.id, frame_host);
1008995
}
1009996
break;
1010997
}
1011998

1012999
case "detectSupercookies": {
1013-
if (utils.hasOwn(sender, "origin") ?
1014-
sender.origin == "null" : request.frameUrl == "about:blank") {
1000+
if (sender.origin == "null") {
10151001
return sendResponse();
10161002
}
10171003

10181004
let tab_host = extractHostFromURL(sender.tab.url),
1019-
frame_host = extractHostFromURL(
1020-
utils.hasOwn(sender, "origin") ?
1021-
sender.origin + '/' : request.frameUrl);
1005+
frame_host = extractHostFromURL(sender.origin + '/');
10221006

10231007
// CNAME uncloaking
10241008
if (utils.hasOwn(badger.cnameDomains, frame_host)) {
@@ -1036,10 +1020,7 @@ function dispatcher(request, sender, sendResponse) {
10361020
case "detectFingerprinting": {
10371021
if (sender.frameId > 0) {
10381022
// do not modify the JS environment in Cloudflare CAPTCHA frames
1039-
if (utils.hasOwn(sender, "origin") ?
1040-
sender.origin === "https://challenges.cloudflare.com" :
1041-
sender.url.startsWith("https://challenges.cloudflare.com/")) {
1042-
1023+
if (sender.origin === "https://challenges.cloudflare.com") {
10431024
sendResponse(false);
10441025
break;
10451026
}
@@ -1505,9 +1486,7 @@ function dispatcher(request, sender, sendResponse) {
15051486
// implications of accepting pbSurrogateMessage events
15061487
// from third-party scripts in nested frames
15071488
if (sender.frameId > 0) {
1508-
let frame_origin = utils.hasOwn(sender, "origin") ?
1509-
sender.origin != "null" && sender.origin :
1510-
request.frameUrl && (new URL(request.frameUrl)).origin;
1489+
let frame_origin = sender.origin != "null" && sender.origin;
15111490

15121491
if (!frame_origin) {
15131492
break;

0 commit comments

Comments
 (0)