From f0d454d8ef9e6fb14b1e683cfec0e2b015d10424 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Adomas=20Ven=C4=8Dkauskas?= Date: Thu, 27 Jun 2024 13:56:58 +0300 Subject: [PATCH] Revert "Add an injection blacklist. Addresses #483" This reverts commit 5bab0587352696ffb014f58c34f8366dd3ae5f16. Addressed more comprehensively with a41057011c0e305afeee64368ffbe194995981f1 --- src/browserExt/background.js | 11 ----------- 1 file changed, 11 deletions(-) diff --git a/src/browserExt/background.js b/src/browserExt/background.js index 350f8bd9e..9b613169d 100644 --- a/src/browserExt/background.js +++ b/src/browserExt/background.js @@ -27,13 +27,6 @@ if (!Zotero.isManifestV3) { browser.action = browser.browserAction; } -// Some websites break when injecting translation sandbox iframe into -// the website's first iframe (which we do for websites like ebscohost -// where often the translatable site is not the top frame, but first child frame). -const INJECTION_BLACKLIST = new Set([ - 'lastpass.com' -]) - Zotero.Connector_Browser = new function() { var _tabInfo = {}; var _incompatibleVersionMessageShown; @@ -265,10 +258,6 @@ Zotero.Connector_Browser = new function() { // Injected via the manifest file return; } else { - if (Zotero.isManifestV3) { - const host = new URL(url).host; - if (INJECTION_BLACKLIST.has(host)) return; - } let tabInfo = this.getTabInfo(tab.id); if (!tabInfo.frameChecked) { // Also in the first frame detected