summaryrefslogtreecommitdiff
path: root/data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/rsf_main.js~
diff options
context:
space:
mode:
authorAmin Bandali <bandali@gnu.org>2020-01-03 01:12:39 -0500
committerAmin Bandali <bandali@gnu.org>2020-01-03 02:23:25 -0500
commit123962d4320bfe827e90aa031aa9964946cbc238 (patch)
treee3c1dba4350df2d9de8999ca6e19a8e1a25fd0e9 /data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/rsf_main.js~
parentd1be83a59f1a123401d50f5bdd393a4de102e421 (diff)
General clean-ups for the new workarounds extension
* data/extensions/gnuzilla-ext-workarounds@gnu.org/jquery-3.4.1.min.js: Remove, since it's a duplicate and not needed. * data/extensions/gnuzilla-ext-workarounds@gnu.org/manifest.json: Re-indent, remove "jquery-3.4.1.min.js" from content_scripts js files: as far as I see, it's not used in any of the workaround files, and is only used in html/domestic.html; but html/ already has a copy of it. So there's no point in keeping a second copy around and injecting it to the matched urls along with the other workaround scripts. * data/extensions/gnuzilla-ext-workarounds@gnu.org/html/domestic.html: Update the extension name here to match the manifest. * data/extensions/gnuzilla-ext-workarounds@gnu.org/README~, data/extensions/gnuzilla-ext-workarounds@gnu.org/background.js~, data/extensions/gnuzilla-ext-workarounds@gnu.org/html/domestic.html~, data/extensions/gnuzilla-ext-workarounds@gnu.org/html/domestic.js~, data/extensions/gnuzilla-ext-workarounds@gnu.org/html/usps_postage.js~, data/extensions/gnuzilla-ext-workarounds@gnu.org/jquery-3.4.1.min.js, data/extensions/gnuzilla-ext-workarounds@gnu.org/manifest.json~, data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/googledocs_main.js~, data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/goteo_main.js~, data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/mcdonalds_wifi.js~, data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/paygov_main.js~, data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/rsf_main.js~, data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/sumofus_main.js~: Remove auto-created backup files.
Diffstat (limited to 'data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/rsf_main.js~')
-rw-r--r--data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/rsf_main.js~44
1 files changed, 0 insertions, 44 deletions
diff --git a/data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/rsf_main.js~ b/data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/rsf_main.js~
deleted file mode 100644
index 7a9c202..0000000
--- a/data/extensions/gnuzilla-ext-workarounds@gnu.org/workaround/rsf_main.js~
+++ /dev/null
@@ -1,44 +0,0 @@
-/*
-
- Copyright (C) 2017-2019 Nathan Nichols
- Copyright (C) 2019 Free Software Foundation
-
- This program is free software: you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation, either version 3 of the License, or
- (at your option) any later version.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License
- along with this program. If not, see <http://www.gnu.org/licenses/>.
-
-*/
-
-if(document.location.href.indexOf("rsf.org") != -1){
- console.log("rsf_main.js");
- function broken_page(){
- if(document.getElementsByClassName("col-md-4 petition-wrap")[0] === undefined){
- return 0;
- }
- var iframe_src = document.getElementsByTagName("iframe")[0].src.replace(/[\s\S]+%20/g,"");
- document.getElementsByClassName("col-md-4 petition-wrap")[0].insertAdjacentHTML("afterbegin",'<h2 style="background-color: #00ffff;"><a href="'+iframe_src+'">Click here to sign the petition</a><h2>');
- document.getElementsByTagName("iframe")[0].remove();
- }
-
- function petition_page(){
- document.getElementsByTagName("form")[0].insertAdjacentHTML("beforeend",document.getElementById("ajax-view-state-page-container").innerHTML);
- console.log("inserted info");
- }
-
- if(document.location.href.match("rsf.secure.force.com/petition") !== null){
- console.log("petition");// the page in the iframe
- petition_page();
- } else{
- console.log("other page");
- broken_page();// the one with the iframe that is a 404
- }
-}