From bc9b8a13300d7a6de93d0632369be15b05b7646e Mon Sep 17 00:00:00 2001 From: Raymond Hill Date: Wed, 16 Dec 2020 07:02:55 -0500 Subject: [PATCH] Enable broad no-csp-reports rule only in Firefox Related commit: - https://github.com/gorhill/uBlock/commit/7d90f97aa1cbf2728508506f6dd7a75c054b85d1 --- src/js/start.js | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/src/js/start.js b/src/js/start.js index 509aa3c4f28dc..7ac10c0f0c8cc 100644 --- a/src/js/start.js +++ b/src/js/start.js @@ -233,7 +233,6 @@ const createDefaultProps = function() { ].join('\n'), 'urlFilteringString': '', 'hostnameSwitchesString': [ - 'no-csp-reports: * true', 'no-large-media: behind-the-scene false', ].join('\n'), 'lastRestoreFile': '', @@ -243,6 +242,10 @@ const createDefaultProps = function() { 'netWhitelist': µb.netWhitelistDefault, 'version': '0.0.0.0' }; + // https://github.com/LiCybora/NanoDefenderFirefox/issues/196 + if ( vAPI.webextFlavor.soup.has('firefox') ) { + fetchableProps.hostnameSwitchesString += '\nno-csp-reports: * true'; + } toFetch(µb.localSettings, fetchableProps); toFetch(µb.userSettings, fetchableProps); toFetch(µb.restoreBackupSettings, fetchableProps);