-
Notifications
You must be signed in to change notification settings - Fork 85
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Do not triggers strict blocking for wildcard-only patterns #1147
Comments
I think this |
|
Neither do I, probably it doesn't need to be addressed or should be given the least priority. Just wanted to brought your attention as per #687. |
Well @Yuki2718 has a point, since I did something to prevent strict blocking for |
The fix is trivial if uBO checks if the filter starts with |
You mean even if $document or $all is used? As that will be the only case strict blocking is required. |
The heuristic-based code is not executed when Gave more thought to this and it's best that strict-block is not implicit with |
@gorhill gorhill/uBlock@3b7a265 caused strict blocing not triggered not only by Quoting the original issue comment:
|
Prerequisites
Description
I was testing rules like
||ads.
used by some non-default lists and found||ads.*^
triggers strict blocking. Then I found #687 which explains why strict blocking is triggered only for hostname rules by default. Now I tested||*.*^
and it also does! I guess it's not an intended behavior.A specific URL where the issue occurs
Whatever, so I used
https://www.shush.se/
for example.Steps to Reproduce
||*.*^
or.*^
to My filtersExpected behavior:
Too generic rules like this doesn't trigger strict blocking unless
$document
or$all
is added.Actual behavior:
Described
Your environment
The text was updated successfully, but these errors were encountered: