master
Commits on Dec 12, 2019
-
* v0.9.5.3: - Removed donation request - Fixed issue of Rate Us link which was not working for Firefox
-
- Fixed issue of Rate Us link which was not working for Firefox
Commits on Dec 4, 2019
-
* v0.9.5.3: - Improvements in assets management - Add Rate Us in pop-up menu - Change the short description to "A fast, effective, and free ad blocker."
-
- Improvements in assets management
- Add Rate Us in pop-up menu - Change the short description to "A fast, effective, and free ad blocker."
Commits on Oct 9, 2019
-
* v0.9.5.3: Added the phrase "- free ad blocker" after uBlock
-
Commits on Oct 4, 2019
-
* v0.9.5.3: - Handle more complex cases of Extended Pseudo Classes - Add support for Adguard :not operator - Added support for using Extended Pseudo Classes in Style filter rule like mycinema.pro#$#[class]:matches-css(width: 336px):matches-css(height: 280px):matches-css(min-height: 280px):has(>ins.adsbygoogle) { visibility: hidden!important; } - Added support for two types of syntax from uBO (+js, +style) -
- Handle more complex cases of Extended Pseudo Classes
- Add support for Adguard :not operator - Added support for using Extended Pseudo Classes in Style filter rule like mycinema.pro#$#[class]:matches-css(width: 336px):matches-css(height: 280px):matches-css(min-height: 280px):has(>ins.adsbygoogle) { visibility: hidden!important; } - Added support for two types of syntax from uBO (+js, +style)
Commits on Sep 13, 2019
-
* v0.9.5.3: Adding support for AdGuard pseudo-classes update of third-party assets update of third-party assets update of third-party assets
-
Adding support for AdGuard pseudo-classes
- Added support for following AdGuard pseudo-classes :matches-css() :matches-css-before :matches-css-after - Removed obsolete filter list / Updated filter list links / Added new filter list / Changed location of filter list - Fixed issues to make uBlock compatible with Chrome 49 - Doing parsing and validation of Extended CSS at the time of filter list data processing. It saves time when actually applying extended CSS
Commits on Sep 11, 2019
Commits on Sep 9, 2019
Commits on Aug 26, 2019
-
* v0.9.5.3: Translating Adguard CSS rules into uBlock supported compatible rule syntax. -ext-has to :-abp-has() :has to :-abp-has() -ext-contains to :-abp-contains() :contains to :-abp-contains() Adding support for Adguard Cosmetic Css Rule [https://kb.adguard.com/en/general/how-to-create-your-own-ad-filters#cosmetic-css-rules-examples-1] Start using chrome.tabs.insertCSS API for CSS rules injection which is applicable for Firefox >= 53 and Chrome >= 66. [https://bugs.chromium.org/p/chromium/issues/detail?id=632009] Code Improvements update of third-party assets
-
Translating Adguard CSS rules into uBlock supported compatible rule s…
…yntax. -ext-has to :-abp-has() :has to :-abp-has() -ext-contains to :-abp-contains() :contains to :-abp-contains() Adding support for Adguard Cosmetic Css Rule [https://kb.adguard.com/en/general/how-to-create-your-own-ad-filters#cosmetic-css-rules-examples-1] Start using chrome.tabs.insertCSS API for CSS rules injection which is applicable for Firefox >= 53 and Chrome >= 66. [https://bugs.chromium.org/p/chromium/issues/detail?id=632009] Code Improvements
Commits on Aug 22, 2019
Commits on Jul 30, 2019
-
* v0.9.5.3: Added support for following filter options - abort-on-property-read - abort-on-property-write - abort-current-inline-script
-
Added support for following filter options
- abort-on-property-read - abort-on-property-write - abort-current-inline-script
Commits on Jul 12, 2019
-
* v0.9.5.3: Updated translation
-
Commits on Jul 2, 2019
-
* v0.9.5.3: Performance and memory related changes
-
Performance and memory related changes
1. Special treatment for hostname-anchored (`||`) filters having wildcard characters. These filters are categorized into three types. The purpose is to convert regex based filter internally into plain string based filters. - Filters having a single occurrence of pattern `^*` after the hostname and no other wildcard character on another side of this pattern. ||*.cloudfront.net^*F2P_SideBar_Banner_EN.jpg ||*2mdn.net^*/1x1image.jpg$image ||2mdn.*^*/1x1image.jpg$image - Filters having a single occurrence of wildcard character `*` after the hostname and no other wildcard character on another side of it. ||*.cloudfront.net/wp-content/*F2P_SideBar_Banner_EN.jpg ||cloudfront.net/wp-content/*F2P_SideBar_Banner_EN.jpg ||www.google.*/aclk?*^/am=&adurl= ||i.com.com/wp-content/*F2P_SideBar_Banner_EN.jpg - Other filters ||cloud*.net^$third-party @@||doubleclick.net/adi/mlb.mlb/*^free_agent_tracker_12^$subdocument,domain=mlb.com 2. Now hostname-anchored (`||`) filters matches hostname in URL accurately. ||*-aaa.net^$third-party 3. Filters having a single occurrence of wildcard character `*` converted internally into plain string based filters. @@/cdn-cgi/pe/bag2?*googleadservices.com%2Fpagead%2Fconversion.js$xmlhttprequest,domain=ethica.net.au|factom.org|gogoonhold.com.au /cdn-cgi/pe/bag2?r*.qualitypublishers.com 4. Using singleton object in case of any match URL filter. $script,third-party,domain=0dt.net|123videos.tv 5. Ignore token if it is preceded by `*` characters in Token generate logic
Commits on Jun 21, 2019
-
* v0.9.5.3: update of third-party assets
-
Commits on May 24, 2019
-
* v0.9.5.3: 1. Special handling is given to filters which had to match against document origin only. The filter will only be considered if it satisfies the given criteria. - Should be in the form of `/czf*.` (without token) or `|https://` or `|http://` or `*` - Should have `domain=` option - Should not have a negated domain in its `domain=` option - Should not have `csp=` option examples: |http://$image,script,subdocument,third-party,xmlhttprequest,domain=dwindly.io |https://$image,other,script,stylesheet,third-party,domain=movies123.xyz $websocket,domain=povw1deo.com|povwideo.net|powvideo.net /czf*.$image,domain=100percentfedup.com
-
1. Special handling is given to filters which had to match against do…
…cument origin only. The filter will only be considered if it satisfies the given criteria. - Should be in the form of `/czf*.` (without token) or `|https://` or `|http://` or `*` - Should have `domain=` option - Should not have a negated domain in its `domain=` option - Should not have `csp=` option examples: |http://$image,script,subdocument,third-party,xmlhttprequest,domain=dwindly.io |https://$image,other,script,stylesheet,third-party,domain=movies123.xyz $websocket,domain=povw1deo.com|povwideo.net|powvideo.net /czf*.$image,domain=100percentfedup.com These filters had to be matched against each network request which was causing extra time. Now, these filters will only be considered when document origin matches the domain mentioned in the filter `domain=` option. 2. Added google keyword to badTokens list 3. Replaced substr with startWith method for string pattern matching 4. Validated regular expression based filter 5. Code optimizations
Commits on Apr 19, 2019
-
* v0.9.5.3: - Converted string-based processing into typed array-based processing of blocking by domain name rule and domains listed for $domain option in blocking rules - Removed support for $rewrite option Convert string-based processing into typed array-based processing of element hiding specific filters only
-
- Converted string-based processing into typed array-based processing…
… of blocking by domain name rule and domains listed for $domain option in blocking rules - Removed support for $rewrite option
Commits on Apr 4, 2019
-
Convert string-based processing into typed array-based processing of …
…element hiding specific filters only
uBlockAdmin committedApr 4, 2019
Commits on Feb 23, 2019
-
* v0.9.5.3: Fixed issue with enrolling users in Acceptable Ads.
-
Commits on Feb 19, 2019
-
* v0.9.5.3: update of third-party assets Fix bug that enabled AA by default
-
-
Commits on Feb 13, 2019
-
* v0.9.5.3: Code review change