Revision 7ee7889a
Added by Wojtek Kosior about 2 years ago
| TODOS.org | ||
|---|---|---|
| 24 | 24 |
- test with more browser forks (Abrowser, Parabola IceWeasel, LibreWolf) |
| 25 | 25 |
- also see if browsers based on pre-quantum FF support enough of |
| 26 | 26 |
WebExtensions for easy porting |
| 27 |
- make sure page's own csp doesn't block our scripts |
|
| 27 |
- make sure page's own csp in <head> doesn't block our scripts
|
|
| 28 | 28 |
- make blocking more torough -- CRUCIAL |
| 29 | 29 |
- mind the data: urls -- CRUCIAL |
| 30 | 30 |
- find out how and make it possible to whitelist non-https urls and |
| ... | ... | |
| 39 | 39 |
- all solutions to modularize js code SUCK; come up with own simple DSL |
| 40 | 40 |
to manage imports/exports |
| 41 | 41 |
- perform never-ending refactoring of already-written code |
| 42 |
- when redirecting to target, make it possible to smartly recognize |
|
| 43 |
and remove previous added target |
|
| 42 |
- also implement support for whitelisting of non-https urls |
|
| 43 |
- validate data entered in settings |
|
| 44 |
- stop always using the same script nonce on given https(s) site (this |
|
| 45 |
improvement seems to be unachievable in case of other protocols) |
|
| 46 |
- besides blocking scripts through csp, also block connections that needlessly |
|
| 47 |
fetch those scripts |
|
| 48 |
- make extension's all html files proper XHTML |
|
| 44 | 49 |
|
| 45 | 50 |
DONE: |
| 46 | 51 |
- make it possible to use wildcard urls in settings -- DONE 2021-05-14 |
| background/background.html | ||
|---|---|---|
| 37 | 37 |
<script src="./settings_query.js"></script> |
| 38 | 38 |
<script src="./page_actions_server.js"></script> |
| 39 | 39 |
<script src="/common/gen_unique.js"></script> |
| 40 |
<script src="./policy_smuggler.js"></script>
|
|
| 40 |
<script src="./policy_injector.js"></script>
|
|
| 41 | 41 |
<script src="./main.js"></script> |
| 42 | 42 |
</head> |
| 43 | 43 |
</html> |
| background/main.js | ||
|---|---|---|
| 30 | 30 |
const get_storage = window.get_storage; |
| 31 | 31 |
const start_storage_server = window.start_storage_server; |
| 32 | 32 |
const start_page_actions_server = window.start_page_actions_server; |
| 33 |
const start_policy_smuggler = window.start_policy_smuggler;
|
|
| 33 |
const start_policy_injector = window.start_policy_injector;
|
|
| 34 | 34 |
const browser = window.browser; |
| 35 | 35 |
|
| 36 | 36 |
start_storage_server(); |
| 37 | 37 |
start_page_actions_server(); |
| 38 |
start_policy_smuggler();
|
|
| 38 |
start_policy_injector();
|
|
| 39 | 39 |
|
| 40 | 40 |
async function init_myext(install_details) |
| 41 | 41 |
{
|
| background/policy_injector.js | ||
|---|---|---|
| 1 |
/** |
|
| 2 |
* Myext injecting policy to page using webRequest |
|
| 3 |
* |
|
| 4 |
* Copyright (C) 2021 Wojtek Kosior |
|
| 5 |
* |
|
| 6 |
* This code is dual-licensed under: |
|
| 7 |
* - Asshole license 1.0, |
|
| 8 |
* - GPLv3 or (at your option) any later version |
|
| 9 |
* |
|
| 10 |
* "dual-licensed" means you can choose the license you prefer. |
|
| 11 |
* |
|
| 12 |
* This code is released under a permissive license because I disapprove of |
|
| 13 |
* copyright and wouldn't be willing to sue a violator. Despite not putting |
|
| 14 |
* this code under copyleft (which is also kind of copyright), I do not want |
|
| 15 |
* it to be made proprietary. Hence, the permissive alternative to GPL is the |
|
| 16 |
* Asshole license 1.0 that allows me to call you an asshole if you use it. |
|
| 17 |
* This means you're legally ok regardless of how you utilize this code but if |
|
| 18 |
* you make it into something nonfree, you're an asshole. |
|
| 19 |
* |
|
| 20 |
* You should have received a copy of both GPLv3 and Asshole license 1.0 |
|
| 21 |
* together with this code. If not, please see: |
|
| 22 |
* - https://www.gnu.org/licenses/gpl-3.0.en.html |
|
| 23 |
* - https://koszko.org/asshole-license.txt |
|
| 24 |
*/ |
|
| 25 |
|
|
| 26 |
"use strict"; |
|
| 27 |
|
|
| 28 |
(() => {
|
|
| 29 |
const TYPE_PREFIX = window.TYPE_PREFIX; |
|
| 30 |
const get_storage = window.get_storage; |
|
| 31 |
const browser = window.browser; |
|
| 32 |
const is_chrome = window.is_chrome; |
|
| 33 |
const gen_unique = window.gen_unique; |
|
| 34 |
const url_item = window.url_item; |
|
| 35 |
const get_query_best = window.get_query_best; |
|
| 36 |
|
|
| 37 |
var storage; |
|
| 38 |
var query_best; |
|
| 39 |
|
|
| 40 |
let csp_header_names = {
|
|
| 41 |
"content-security-policy" : true, |
|
| 42 |
"x-webkit-csp" : true, |
|
| 43 |
"x-content-security-policy" : true |
|
| 44 |
}; |
|
| 45 |
|
|
| 46 |
function is_noncsp_header(header) |
|
| 47 |
{
|
|
| 48 |
return !csp_header_names[header.name.toLowerCase()]; |
|
| 49 |
} |
|
| 50 |
|
|
| 51 |
function inject(details) |
|
| 52 |
{
|
|
| 53 |
let url = url_item(details.url); |
|
| 54 |
|
|
| 55 |
let [pattern, settings] = query_best(url); |
|
| 56 |
|
|
| 57 |
if (settings !== undefined && settings.allow) {
|
|
| 58 |
console.log("allowing", url);
|
|
| 59 |
return {cancel : false};
|
|
| 60 |
} |
|
| 61 |
|
|
| 62 |
let nonce = gen_unique(url).substring(1); |
|
| 63 |
let headers = details.responseHeaders.filter(is_noncsp_header); |
|
| 64 |
headers.push({
|
|
| 65 |
name : "content-security-policy", |
|
| 66 |
value : `script-src 'nonce-${nonce}'; script-src-elem 'nonce-${nonce}';`
|
|
| 67 |
}); |
|
| 68 |
|
|
| 69 |
console.log("modified headers", url, headers);
|
|
| 70 |
|
|
| 71 |
return {responseHeaders: headers};
|
|
| 72 |
} |
|
| 73 |
|
|
| 74 |
async function start() {
|
|
| 75 |
storage = await get_storage(); |
|
| 76 |
query_best = await get_query_best(); |
|
| 77 |
|
|
| 78 |
let extra_opts = ["blocking", "responseHeaders"]; |
|
| 79 |
if (is_chrome) |
|
| 80 |
extra_opts.push("extraHeaders");
|
|
| 81 |
|
|
| 82 |
browser.webRequest.onHeadersReceived.addListener( |
|
| 83 |
inject, |
|
| 84 |
{
|
|
| 85 |
urls: ["<all_urls>"], |
|
| 86 |
types: ["main_frame", "sub_frame"] |
|
| 87 |
}, |
|
| 88 |
extra_opts |
|
| 89 |
); |
|
| 90 |
} |
|
| 91 |
|
|
| 92 |
window.start_policy_injector = start; |
|
| 93 |
})(); |
|
| content/main.js | ||
|---|---|---|
| 30 | 30 |
const url_item = window.url_item; |
| 31 | 31 |
const gen_unique = window.gen_unique; |
| 32 | 32 |
|
| 33 |
var url_re = /^([^#]*)((#[^#]*)(#.*)?)?$/; |
|
| 34 |
var match = url_re.exec(document.URL); |
|
| 35 |
var base_url = match[1]; |
|
| 36 |
var first_target = match[3]; |
|
| 37 |
var second_target = match[4]; |
|
| 33 |
/* |
|
| 34 |
* Due to some technical limitations the chosen method of whitelisting sites |
|
| 35 |
* is to smuggle whitelist indicator in page's url as a "magical" string |
|
| 36 |
* after '#'. Right now this is not needed in HTTP(s) pages where native |
|
| 37 |
* script blocking happens through CSP header injection but is needed for |
|
| 38 |
* protocols like ftp:// and file://. |
|
| 39 |
* |
|
| 40 |
* The code that actually injects the magical string into ftp:// and file:// |
|
| 41 |
* urls has not yet been added to the extension. |
|
| 42 |
*/ |
|
| 38 | 43 |
|
| 39 |
// TODO: can be refactored *a little bit* with policy_smuggler.js |
|
| 40 | 44 |
let url = url_item(document.URL); |
| 41 | 45 |
let unique = gen_unique(url); |
| 42 |
|
|
| 43 | 46 |
let nonce = unique.substring(1); |
| 44 | 47 |
|
| 45 |
var block = true; |
|
| 46 |
if (first_target !== undefined && |
|
| 47 |
first_target === unique) {
|
|
| 48 |
block = false; |
|
| 49 |
console.log(["allowing", document.URL]); |
|
| 50 |
if (second_target !== undefined) |
|
| 51 |
window.location.href = base_url + second_target; |
|
| 52 |
else |
|
| 53 |
history.replaceState(null, "", base_url); |
|
| 54 |
} else {
|
|
| 55 |
console.log(["not allowing", document.URL]); |
|
| 48 |
function needs_blocking() |
|
| 49 |
{
|
|
| 50 |
if (url.startsWith("https://") || url.startsWith("http://"))
|
|
| 51 |
return false; |
|
| 52 |
|
|
| 53 |
let url_re = /^([^#]*)((#[^#]*)(#.*)?)?$/; |
|
| 54 |
let match = url_re.exec(document.URL); |
|
| 55 |
let base_url = match[1]; |
|
| 56 |
let first_target = match[3]; |
|
| 57 |
let second_target = match[4]; |
|
| 58 |
|
|
| 59 |
if (first_target !== undefined && |
|
| 60 |
first_target === unique) {
|
|
| 61 |
if (second_target !== undefined) |
|
| 62 |
window.location.href = base_url + second_target; |
|
| 63 |
else |
|
| 64 |
history.replaceState(null, "", base_url); |
|
| 65 |
|
|
| 66 |
console.log(["allowing whitelisted", document.URL]); |
|
| 67 |
return false; |
|
| 68 |
} |
|
| 69 |
|
|
| 70 |
console.log(["disallowing", document.URL]); |
|
| 71 |
return true; |
|
| 56 | 72 |
} |
| 57 | 73 |
|
| 58 | 74 |
function handle_mutation(mutations, observer) |
| ... | ... | |
| 129 | 145 |
} |
| 130 | 146 |
} |
| 131 | 147 |
|
| 132 |
if (block) {
|
|
| 148 |
if (needs_blocking()) {
|
|
| 133 | 149 |
var observer = new MutationObserver(handle_mutation); |
| 134 | 150 |
observer.observe(document.documentElement, {
|
| 135 | 151 |
attributes: true, |
Also available in: Unified diff
when possible inject CSP as http(s) header using webRequest instead of adding a tag