summaryrefslogtreecommitdiff
path: root/content
diff options
context:
space:
mode:
authorjahoti <jahoti@tilde.team>2021-08-14 00:00:00 +0000
committerjahoti <jahoti@tilde.team>2021-08-14 00:00:00 +0000
commit6fda8ea58575e52e8957e6b5bfbdcde8b71d0106 (patch)
treeb929a18d024a564459b32f272a49516ece84c3c7 /content
parent5b419aedd564e6506aa2fc8bddcaa5d601888f17 (diff)
downloadbrowser-extension-6fda8ea58575e52e8957e6b5bfbdcde8b71d0106.tar.gz
browser-extension-6fda8ea58575e52e8957e6b5bfbdcde8b71d0106.zip
Revert changes to content/main.js to commit 25817b68c*
It turns out modifying the CSP headers in meta tags has no effect.
Diffstat (limited to 'content')
-rw-r--r--content/main.js27
1 files changed, 8 insertions, 19 deletions
diff --git a/content/main.js b/content/main.js
index 5edb8a6..9ed557c 100644
--- a/content/main.js
+++ b/content/main.js
@@ -19,7 +19,6 @@
* IMPORT is_chrome
* IMPORT is_mozilla
* IMPORT start_activity_info_server
- * IMPORT sanitize_csp_header
* IMPORTS_END
*/
@@ -66,17 +65,6 @@ function block_node(node)
block_script(node);
return;
}
-
- else if (node.tagName === 'META' &&
- node.getAttribute('http-equiv') === 'content-security-policy') {
-
- node.content = sanitize_csp_header(
- {value: node.content},
- `'nonce-${nonce}'`,
- !policy.allow
- ).value;
- return;
- }
sanitize_attributes(node);
@@ -126,13 +114,14 @@ if (!is_privileged_url(document.URL)) {
if (!policy.allow) {
block_nodes_recursively(document.documentElement);
- /* Now needed on Mozilla as well to sanitize CSP header */
- var observer = new MutationObserver(handle_mutation);
- observer.observe(document.documentElement, {
- attributes: true,
- childList: true,
- subtree: true
- });
+ if (is_chrome) {
+ var observer = new MutationObserver(handle_mutation);
+ observer.observe(document.documentElement, {
+ attributes: true,
+ childList: true,
+ subtree: true
+ });
+ }
if (is_mozilla)
addEventListener('beforescriptexecute', mozilla_suppress_scripts, true);