Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement ffclipboard #260

Merged
merged 3 commits into from
Dec 18, 2021
Merged

Conversation

NotAProton
Copy link
Member

@NotAProton NotAProton commented Dec 15, 2021

NOTICE I dedicate any and all copyright interest in this software to the public domain. I make this dedication for the benefit of the public at large and to the detriment of my heirs and successors. I intend this dedication to be an overt act of relinquishment in perpetuity of all present and future rights to this software under copyright law.

ℹThis PR makes changes to files which aren't auto-updated. Builds will have to be manually submitted to browser stores after merging.

Fixes: #40 (comment)

New API for making bypasses that need cross-domain temporary storage, basically variables that you can use on multiple sites

ffClipboard.set(ID, value)

a = ffClipboard.get(ID)
console.log(a)						// value

ffClipboard.free(ID)
a = ffClipboard.get(ID)
console.log(a)						//null

ffClipboard.get(ID) returns an ffclipboard entry, if id does not exist, returns null
ffClipboard.set(ID, value) sets an ffclipboard entry, if id does not exist, creates it
ffClipboard.free(ID) deletes an ffclipboard entry and frees up storage†, if id does not exist, does nothing

Chrome limits storage to 5mb

  • [?] I made sure there are no unnecessary changes in the code*
  • Tested on Chromium- Chrome Windows
  • Tested on Firefox

* indicates required

@github-actions
Copy link

github-actions bot commented Dec 15, 2021

Download the artifacts for this pull request:

@NotAProton
Copy link
Member Author

needs some testing, and it may make the user vulnerable to xss because the entire storage gets injected into every page. I do uriencode it before injection but not sure if that is enough

@NotAProton
Copy link
Member Author

Updated to encode ', (, ). Should be safe now.

@NotAProton NotAProton requested a review from AliahX December 16, 2021 06:11
@NotAProton NotAProton merged commit af97b89 into FastForwardTeam:main Dec 18, 2021
@NotAProton NotAProton deleted the ffclipboard branch December 18, 2021 08:41
@NotAProton NotAProton restored the ffclipboard branch December 18, 2021 08:50
@NotAProton NotAProton mentioned this pull request Mar 13, 2022
1 task
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant