Index: lib/filterClasses.js |
=================================================================== |
--- a/lib/filterClasses.js |
+++ b/lib/filterClasses.js |
@@ -766,16 +766,17 @@ |
let contentType = null; |
let matchCase = null; |
let domains = null; |
let sitekeys = null; |
let thirdParty = null; |
let collapse = null; |
let csp = null; |
+ let rewrite = null; |
let options; |
let match = (text.indexOf("$") >= 0 ? Filter.optionsRegExp.exec(text) : null); |
if (match) |
{ |
options = match[1].split(","); |
text = match.input.substr(0, match.index); |
for (let option of options) |
{ |
@@ -813,30 +814,32 @@ |
else if (option == "~THIRD_PARTY") |
thirdParty = false; |
else if (option == "COLLAPSE") |
collapse = true; |
else if (option == "~COLLAPSE") |
collapse = false; |
else if (option == "SITEKEY" && value) |
sitekeys = value.toUpperCase(); |
+ else if (option == "REWRITE" && value) |
+ rewrite = value; |
else |
return new InvalidFilter(origText, "filter_unknown_option"); |
} |
} |
try |
{ |
if (blocking) |
{ |
if (csp && Filter.invalidCSPRegExp.test(csp)) |
return new InvalidFilter(origText, "filter_invalid_csp"); |
return new BlockingFilter(origText, text, contentType, matchCase, domains, |
- thirdParty, sitekeys, collapse, csp); |
+ thirdParty, sitekeys, collapse, csp, rewrite); |
} |
return new WhitelistFilter(origText, text, contentType, matchCase, domains, |
thirdParty, sitekeys); |
} |
catch (e) |
{ |
return new InvalidFilter(origText, "filter_invalid_regexp"); |
} |
@@ -889,27 +892,30 @@ |
* @param {boolean} matchCase see RegExpFilter() |
* @param {string} domains see RegExpFilter() |
* @param {boolean} thirdParty see RegExpFilter() |
* @param {string} sitekeys see RegExpFilter() |
* @param {boolean} collapse |
* defines whether the filter should collapse blocked content, can be null |
* @param {string} [csp] |
* Content Security Policy to inject when the filter matches |
+ * @param {string} [rewrite] |
+ * The rewrite expression |
* @constructor |
* @augments RegExpFilter |
*/ |
function BlockingFilter(text, regexpSource, contentType, matchCase, domains, |
- thirdParty, sitekeys, collapse, csp) |
+ thirdParty, sitekeys, collapse, csp, rewrite) |
{ |
RegExpFilter.call(this, text, regexpSource, contentType, matchCase, domains, |
thirdParty, sitekeys); |
this.collapse = collapse; |
this.csp = csp; |
+ this.rewrite = rewrite; |
} |
exports.BlockingFilter = BlockingFilter; |
BlockingFilter.prototype = extend(RegExpFilter, { |
type: "blocking", |
/** |
* Defines whether the filter should collapse blocked content. |
@@ -917,17 +923,37 @@ |
* @type {boolean} |
*/ |
collapse: null, |
/** |
* Content Security Policy to inject for matching requests. |
* @type {string} |
*/ |
- csp: null |
+ csp: null, |
+ |
+ /** |
+ * The rewrite expression |
+ * @type {string} |
+ */ |
+ rewrite: null, |
+ |
+ /** |
+ * Perform the URL rewrite |
+ * @param {string} urlString the string URL to rewrite |
+ * @returns {string?} the rewritten URL, or null if it doesn't match. |
+ */ |
+ doRewrite(urlString) |
+ { |
+ let matches = this.regexp.exec(urlString); |
Sebastian Noack
2018/05/02 15:10:06
Why do we need to call exec() first? Can't we call
Manish Jethani
2018/05/02 15:31:09
Yeah exec shouldn't be necessary.
hub
2018/05/02 22:14:33
Done.
|
+ if (matches) |
+ return urlString.replace(this.regexp, this.rewrite); |
Sebastian Noack
2018/05/02 15:10:05
As mentioned in the discussion on the issue, we sh
hub
2018/05/02 22:14:33
Ok, I'll check the origin
|
+ |
+ return null; |
+ } |
}); |
/** |
* Class for whitelist filters |
* @param {string} text see Filter() |
* @param {string} regexpSource see RegExpFilter() |
* @param {number} contentType see RegExpFilter() |
* @param {boolean} matchCase see RegExpFilter() |