Project

General

Profile

Download (4.78 KB) Statistics
| Branch: | Tag: | Revision:

haketilo / common / policy.js @ aec5c9ae

1
/**
2
 * This file is part of Haketilo.
3
 *
4
 * Function: Determining what to do on a given web page.
5
 *
6
 * Copyright (C) 2021 Wojtek Kosior
7
 *
8
 * This program is free software: you can redistribute it and/or modify
9
 * it under the terms of the GNU General Public License as published by
10
 * the Free Software Foundation, either version 3 of the License, or
11
 * (at your option) any later version.
12
 *
13
 * This program is distributed in the hope that it will be useful,
14
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16
 * GNU General Public License for more details.
17
 *
18
 * As additional permission under GNU GPL version 3 section 7, you
19
 * may distribute forms of that code without the copy of the GNU
20
 * GPL normally required by section 4, provided you include this
21
 * license notice and, in case of non-source distribution, a URL
22
 * through which recipients can access the Corresponding Source.
23
 * If you modify file(s) with this exception, you may extend this
24
 * exception to your version of the file(s), but you are not
25
 * obligated to do so. If you do not wish to do so, delete this
26
 * exception statement from your version.
27
 *
28
 * As a special exception to the GPL, any HTML file which merely
29
 * makes function calls to this code, and for that purpose
30
 * includes it by reference shall be deemed a separate work for
31
 * copyright law purposes. If you modify this code, you may extend
32
 * this exception to your version of the code, but you are not
33
 * obligated to do so. If you do not wish to do so, delete this
34
 * exception statement from your version.
35
 *
36
 * You should have received a copy of the GNU General Public License
37
 * along with this program.  If not, see <https://www.gnu.org/licenses/>.
38
 *
39
 * I, Wojtek Kosior, thereby promise not to sue for violation of this file's
40
 * license. Although I request that you do not make use of this code in a
41
 * proprietary program, I am not going to enforce this in court.
42
 */
43

    
44
#IMPORT common/patterns_query_tree.js AS pqt
45

    
46
#FROM common/sha256.js IMPORT sha256
47

    
48
/*
49
 * CSP rule that either blocks all scripts or only allows scripts with specified
50
 * nonce attached.
51
 */
52
function make_csp(nonce) {
53
    const rule = nonce ? `'nonce-${nonce}'` : "'none'";
54
    const csp_list = [
55
	["prefetch-src",    "'none'"],
56
	["script-src-attr", "'none'"],
57
	["script-src",      rule, "'unsafe-eval'"],
58
	["script-src-elem", rule]
59
    ];
60
    return csp_list.map(words => `${words.join(" ")};`).join(" ");
61
}
62

    
63
function decide_policy(patterns_tree, url, default_allow, secret)
64
{
65
    const policy = {allow: default_allow};
66

    
67
    try {
68
	var payloads = pqt.search(patterns_tree, url).next().value;
69
    } catch (e) {
70
	console.error("Haketilo:", e);
71
	policy.allow = false;
72
	policy.error = {haketilo_error_type: "deciding_policy"};
73
    }
74

    
75
    if (payloads !== undefined) {
76
	/*
77
	 * mapping will be either the actual mapping identifier or "~allow" if
78
	 * we matched a simple script block/allow rule.
79
	 */
80
	policy.mapping = Object.keys(payloads).sort()[0];
81
	const payload = payloads[policy.mapping];
82
	if (policy.mapping === "~allow") {
83
	    /* Convert 0/1 back to false/true. */
84
	    policy.allow = !!payload;
85
	} else /* if (payload.identifier) */ {
86
	    policy.allow = false;
87
	    policy.payload = payload;
88
	    /*
89
	     * Hash a secret and other values into a string that's unpredictable
90
	     * to someone who does not know these values. What we produce here
91
	     * is not a true "nonce" because it might get produced multiple
92
	     * times given the same url and mapping choice. Nevertheless, this
93
	     * is reasonably good given the limitations WebExtension APIs and
94
	     * environments give us. If we were using a true nonce, we'd have no
95
	     * reliable way of passing it to our content scripts.
96
	     */
97
	    const nonce_source = [
98
		policy.mapping,
99
		policy.payload.identifier,
100
		url,
101
		secret
102
	    ];
103
	    policy.nonce = sha256(nonce_source.join(":"));
104
	}
105
    }
106

    
107
    if (!policy.allow)
108
	policy.csp = make_csp(policy.nonce);
109

    
110
    return policy;
111
}
112
#EXPORT decide_policy
113

    
114
#EXPORT  () => ({allow: false, csp: make_csp()})  AS fallback_policy
115

    
116
#IF NEVER
117

    
118
/*
119
 * Note: the functions below were overeagerly written and are not used now but
120
 * might prove useful to once we add more functionalities and are hence kept...
121
 */
122

    
123
function relaxed_csp_eval(csp) {
124
    const new_csp_list = [];
125

    
126
    for (const directive of csp.split(";")) {
127
	const directive_words = directive.trim().split(" ");
128
	if (directive_words[0] === "script-src")
129
	    directive_words.push("'unsafe-eval'");
130

    
131
	new_csp_list.push(directive_words);
132
    }
133

    
134
    new_policy.csp = new_csp_list.map(d => `${d.join(" ")}';`).join(" ");
135
}
136

    
137
function relax_policy_eval(policy) {
138
    const new_policy = Object.assign({}, policy);
139

    
140
    return Object.assign(new_policy, {csp: relaxed_csp_eval(policy.csp)});
141
}
142
#EXPORT relax_policy_eval
143

    
144
#ENDIF
(10-10/11)