summaryrefslogtreecommitdiff
path: root/data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/mcdonalds_wifi.js~
diff options
context:
space:
mode:
authorAmin Bandali <bandali@gnu.org>2020-01-03 01:12:39 -0500
committerAmin Bandali <bandali@gnu.org>2020-01-03 02:23:25 -0500
commit123962d4320bfe827e90aa031aa9964946cbc238 (patch)
treee3c1dba4350df2d9de8999ca6e19a8e1a25fd0e9 /data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/mcdonalds_wifi.js~
parentd1be83a59f1a123401d50f5bdd393a4de102e421 (diff)
General clean-ups for the new workarounds extension
* data/extensions/gnuzilla-ext-workarounds@gnu.org/jquery-3.4.1.min.js: Remove, since it's a duplicate and not needed. * data/extensions/gnuzilla-ext-workarounds@gnu.org/manifest.json: Re-indent, remove "jquery-3.4.1.min.js" from content_scripts js files: as far as I see, it's not used in any of the workaround files, and is only used in html/domestic.html; but html/ already has a copy of it. So there's no point in keeping a second copy around and injecting it to the matched urls along with the other workaround scripts. * data/extensions/gnuzilla-ext-workarounds@gnu.org/html/domestic.html: Update the extension name here to match the manifest. * data/extensions/gnuzilla-ext-workarounds@gnu.org/README~, data/extensions/gnuzilla-ext-workarounds@gnu.org/background.js~, data/extensions/gnuzilla-ext-workarounds@gnu.org/html/domestic.html~, data/extensions/gnuzilla-ext-workarounds@gnu.org/html/domestic.js~, data/extensions/gnuzilla-ext-workarounds@gnu.org/html/usps_postage.js~, data/extensions/gnuzilla-ext-workarounds@gnu.org/jquery-3.4.1.min.js, data/extensions/gnuzilla-ext-workarounds@gnu.org/manifest.json~, data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/googledocs_main.js~, data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/goteo_main.js~, data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/mcdonalds_wifi.js~, data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/paygov_main.js~, data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/rsf_main.js~, data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/sumofus_main.js~: Remove auto-created backup files.
Diffstat (limited to 'data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/mcdonalds_wifi.js~')
-rw-r--r--data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/mcdonalds_wifi.js~76
1 files changed, 0 insertions, 76 deletions
diff --git a/data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/mcdonalds_wifi.js~ b/data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/mcdonalds_wifi.js~
deleted file mode 100644
index 3394b61..0000000
--- a/data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/mcdonalds_wifi.js~
+++ /dev/null
@@ -1,76 +0,0 @@
-/*
-
- Copyright (C) 2017-2019 Nathan Nichols
- Copyright (C) 2019 Free Software Foundation
-
- This program is free software: you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation, either version 3 of the License, or
- (at your option) any later version.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License
- along with this program. If not, see <http://www.gnu.org/licenses/>.
-
-*/
-if(document.location.href.indexOf("login-mcd-cluster.prd.snantx.attwifi.com") != -1){
- console.log("mcdonalds_wifi.js");
- console.log("Detected new style captive portal.");
- document.forms[0].submit();
-}
-
-
-// It seems McDonald's captive portal has changed and it no longer
-// uses this captive portal. This will be left here in case there
-// are some places where the old style captive portal is still in
-// use.
-if(document.location.href.indexOf("wayport.net") != -1){
- console.log("mcdonalds_wifi.js");
- console.log("Detected old style captive portal.");
-
- console.log("Detected the McDonald's captive portal.")
- var form = document.getElementsByTagName("form");
- var entries = form[0].getElementsByTagName("input");
- var data = new FormData();
- captive_portal_url = "wayport.net"
- if ("undefined" === typeof(document.getElementsByTagName("form")[0].action)) {
- console.log("no form found.")
- } else{
- document.body.style.border = "5px solid red";
- post_url = document.getElementsByTagName("form")[0].action;
- var dest = "";
- for(var i = 0; i < entries.length; i++){
- console.log(entries[i].name + ":" + entries[i].value);
-
- if(entries[i].name == "origDest"){
- dest = entries[i].name;
- entries[i].value = "http://www.wikipedia.org";
- }
- // Seems like this should be set to 1, not sure if required though
- if(entries[i].name == "connect"){
- entries[i].value = "1";
- }
-
- data.append(entries[i].name,entries[i].value);
-
- }
- var http = new XMLHttpRequest();
- //auth_url = document.URL.substring(0,document.URL.indexOf(captive_portal_url)+captive_portal_url.length);
- //auth_url += post_url;
- console.log(data);
- console.log(post_url);
- var xhr = new XMLHttpRequest();
- xhr.open('POST', post_url, true);
- xhr.onload = function () {
- // do something to response
- //console.log(this.responseText);
- document.body = this.responseText;
- };
- xhr.send(data);
- alert("Authenticated to McDonald's Wi-fi.")
- }
-}