From 261548ff184926567a623e90df7954aeef842d59 Mon Sep 17 00:00:00 2001 From: Wojtek Kosior Date: Wed, 30 Jun 2021 12:28:05 +0200 Subject: emply an sh-based build system; make some changes to blocking --- TODOS.org | 23 ++++++++++++++--------- 1 file changed, 14 insertions(+), 9 deletions(-) (limited to 'TODOS.org') diff --git a/TODOS.org b/TODOS.org index 63f7985..13b9207 100644 --- a/TODOS.org +++ b/TODOS.org @@ -20,20 +20,15 @@ TODO: - make script bag components re-orderable (via drag&drop in options page) -- CRUCIAL - find some way not to require each chrome user to modify manifest.json - test with more browser forks (Abrowser, Parabola IceWeasel, LibreWolf) - - also see if browsers based on pre-quantum FF support enough of - WebExtensions for easy porting - make sure page's own csp in doesn't block our scripts -- find out how and make it possible to whitelist non-https urls and - whether we can inject csp to them - create a repository to host scripts - enable the extension to automatically fetch script substitutes from the repo - make it possible to inject scripts to arbitrary places in DOM - make script blocking code omit those scripts - check if prerendering has to be blocked -- CRUCIAL - block prefetch -- rearrange files in extension, add some mechanism to build the extension -- all solutions to modularize js code SUCK; come up with own simple DSL - to manage imports/exports +- rearrange files in extension +- supplement the build script with a makefile, also produce zipped arifacts - perform never-ending refactoring of already-written code - also implement support for whitelisting of non-https urls - validate data entered in settings @@ -49,11 +44,21 @@ TODO: (unless someone suggests another good name before we do so) - add an option to disable script blocking globally - Add support to settings_query for non-standard URLs - (e.g. file:// and about:) + (e.g. file:// and ftp://) - Process HTML files in data: URLs instead of just blocking them +- improve CSP injection for pathological cases like