Skip to content

Enable "always open in current container" configuration by domain#167

Open
dmorlitz wants to merge 7 commits intokintesh:masterfrom
dmorlitz:master
Open

Enable "always open in current container" configuration by domain#167
dmorlitz wants to merge 7 commits intokintesh:masterfrom
dmorlitz:master

Conversation

@dmorlitz
Copy link

This pull request creates an "always open in current container" function - configured via the UI. The format of the configuration variable is a pipe (|) separated list of domain names which will always open in the current tab regardless of domain rules. This enables the same domain to open in multiple containers - and to support sites that must remain in the same container as the site that launched it - such as PayPal.

The configuration variable is used in a regex and each domain name must be followed by a / The code adds the ( and )/ to the regex.

dmorlitz added 7 commits November 10, 2021 12:56
Added line 71-76 - which reads the configuration string for "leave in current container", converts it to a Regex and decides if the URL being opened should remain in the current container regardless of other settings
Added lines 15-20 - to create a preference for | separated list of domains which will always remain in the tab they are created in
File added in error
@mikijov
Copy link

mikijov commented Jan 29, 2022

@kintesh , can you comment on this PR? I think it is a very useful feature.

@dmorlitz
Copy link
Author

dmorlitz commented Jan 29, 2022 via email

@kintesh
Copy link
Owner

kintesh commented Feb 1, 2022

@mikijov @dmorlitz I will have a look at this soon.

@WolfRevo
Copy link

WolfRevo commented Mar 8, 2023

@mikijov @dmorlitz I will have a look at this soon.

Did you have a chance to check this PR?
If not did you think about giving some of your contributors the right to merge and release new versions?

@dmorlitz
Copy link
Author

dmorlitz commented Mar 8, 2023 via email

@WolfRevo
Copy link

WolfRevo commented Mar 8, 2023

I have passed control of this code to someone else who has forked containerise at https://github.com/nwg/containerise-ce - because there didn’t seem to be active development here Since Firefox brought out Total Cookie Protection, I have stopped using containers. Any code I contributed here is open for anyone to take over.

On Wed, Mar 8, 2023 at 7:38 AM WolfRevo @.> wrote: @mikijov https://github.com/mikijov @dmorlitz https://github.com/dmorlitz I will have a look at this soon. Did you have a chance to check this PR? If not did you think about giving some of your contributors the right to merge and release new versions? — Reply to this email directly, view it on GitHub <#167 (comment)>, or unsubscribe https://github.com/notifications/unsubscribe-auth/AC3NKEVP6JKUBVFOQ6ADRRLW3B4TZANCNFSM5H27USAA . You are receiving this because you were mentioned.Message ID: @.>

Thx for clarification! Your argument is fair enough.

@kaushikgopal
Copy link

I created Container Traffic Control fwiw which handles the ultimate goal of this issue (but it's implemented slightly differently).

  • in CTC, multiple containers can match the same url
  • but there's a checkbox for "preference"
    • this means, if you're opening a url from scratch it picks the container with "preference"
    • alternatively, if you're in a container that supports opening the url, you will remain in the same container.

@WolfRevo
Copy link

WolfRevo commented Oct 1, 2025

@kaushikgopal

  1. you should clearly mark your addon to be created with the help of AI
  2. what about cloud sync of the rules?
  3. is there a way to import the json from containerise?

@kaushikgopal
Copy link

kaushikgopal commented Oct 1, 2025

  1. I actually wrote an entire blog post detailing it. but out of curiosity may I ask why? (I see it akin to tooling at this point) but trying to understand the underlying concern that is alleviated by indicating AI was used to build the plug in.
  2. rules are indeed automatically synced natively with Firefox.
  3. this is interesting but I thought it more helpful to build out the rules manually vs importing cause it might not be a 1-1 port. CTC introduces the notion of a container "type" as well. it's not technically hard cause eventually the data structure is a table of rules but I feel it'll be more confusing if I assume a container type.

@WolfRevo
Copy link

WolfRevo commented Oct 2, 2025

Thanks for the hint. Didn't see your blog post as I was triggered by your last comment right here and just checked your github repo. Need some time to read but looks interesting.
As I am working in security I consider AI coding basically a security risk if not manually reviewed by experienced human eyes. That's why I at least like to see clear and transparent information when AI is used for any kind of creation, that's all.
Back to topic 👍 I will have a look at your add-in if it is suitable for my needs and could replace containerise (which I maintain for myself in another fork).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants

Comments