mirror of
https://github.com/GoogleChromeLabs/squoosh.git
synced 2025-11-15 10:09:45 +00:00
Added lib-csp (temp until available as npm pckg)
This commit is contained in:
192
src/static-build/lib-csp.ts
Normal file
192
src/static-build/lib-csp.ts
Normal file
@@ -0,0 +1,192 @@
|
||||
/**
|
||||
* @license
|
||||
* Copyright 2021 Google LLC
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* https://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
import * as crypto from 'crypto';
|
||||
import * as cheerio from 'cheerio';
|
||||
|
||||
/** Module for enabling a hash-based strict Content Security Policy. */
|
||||
export class StrictCsp {
|
||||
private static readonly HASH_FUNCTION = 'sha256';
|
||||
private static readonly INLINE_SCRIPT_SELECTOR = 'script:not([src])';
|
||||
private static readonly SOURCED_SCRIPT_SELECTOR = 'script[src]';
|
||||
private $: any;
|
||||
|
||||
constructor(html: string) {
|
||||
this.$ = cheerio.load(html, {
|
||||
decodeEntities: false,
|
||||
xmlMode: false,
|
||||
});
|
||||
}
|
||||
|
||||
serializeDom(): string {
|
||||
return this.$.html();
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns a strict Content Security Policy for mitigating XSS.
|
||||
* For more details read csp.withgoogle.com.
|
||||
* If you modify this CSP, make sure it has not become trivially bypassable by
|
||||
* checking the policy using csp-evaluator.withgoogle.com.
|
||||
*
|
||||
* @param hashes A list of sha-256 hashes of trusted inline scripts.
|
||||
* @param enableTrustedTypes If Trusted Types should be enabled for scripts.
|
||||
* @param enableBrowserFallbacks If fallbacks for older browsers should be
|
||||
* added. This is will not weaken the policy as modern browsers will ignore
|
||||
* the fallbacks.
|
||||
*/
|
||||
static getStrictCsp(
|
||||
hashes?: string[],
|
||||
enableTrustedTypes?: boolean,
|
||||
enableBrowserFallbacks?: boolean,
|
||||
): string {
|
||||
hashes = hashes || [];
|
||||
let strictCspTemplate = {
|
||||
// 'strict-dynamic' allows hashed scripts to create new scripts.
|
||||
'script-src': [`'strict-dynamic'`, ...hashes],
|
||||
// Restricts `object-src` to disable dangerous plugins like Flash.
|
||||
'object-src': [`'none'`],
|
||||
// Restricts `base-uri` to block the injection of `<base>` tags. This
|
||||
// prevents attackers from changing the locations of scripts loaded from
|
||||
// relative URLs.
|
||||
'base-uri': [`'self'`],
|
||||
};
|
||||
|
||||
// Adds fallbacks for browsers not compatible to CSP3 and CSP2.
|
||||
// These fallbacks are ignored by modern browsers in presence of hashes,
|
||||
// and 'strict-dynamic'.
|
||||
if (enableBrowserFallbacks) {
|
||||
// Fallback for Safari. All modern browsers supporting strict-dynamic will
|
||||
// ignore the 'https:' fallback.
|
||||
strictCspTemplate['script-src'].push('https:');
|
||||
// 'unsafe-inline' is only ignored in presence of a hash or nonce.
|
||||
if (hashes.length > 0) {
|
||||
strictCspTemplate['script-src'].push(`'unsafe-inline'`);
|
||||
}
|
||||
}
|
||||
|
||||
// If enabled, dangerous DOM sinks will only accept typed objects instead of
|
||||
// strings.
|
||||
if (enableTrustedTypes) {
|
||||
strictCspTemplate = {
|
||||
...strictCspTemplate,
|
||||
...{ 'require-trusted-types-for': [`'script'`] },
|
||||
};
|
||||
}
|
||||
|
||||
return Object.entries(strictCspTemplate)
|
||||
.map(([directive, values]) => {
|
||||
return `${directive} ${values.join(' ')};`;
|
||||
})
|
||||
.join('');
|
||||
}
|
||||
|
||||
/**
|
||||
* Enables a CSP via a meta tag at the beginning of the document.
|
||||
* Warning: It's recommended to set CSP as HTTP response header instead of
|
||||
* using a meta tag. Injections before the meta tag will not be covered by CSP
|
||||
* and meta tags don't support CSP in report-only mode.
|
||||
*
|
||||
* @param csp A Content Security Policy string.
|
||||
*/
|
||||
addMetaTag(csp: string): void {
|
||||
let metaTag = this.$('meta[http-equiv="Content-Security-Policy"]');
|
||||
if (!metaTag.length) {
|
||||
metaTag = cheerio.load('<meta http-equiv="Content-Security-Policy">')(
|
||||
'meta',
|
||||
);
|
||||
metaTag.prependTo(this.$('head'));
|
||||
}
|
||||
metaTag.attr('content', csp);
|
||||
}
|
||||
|
||||
/**
|
||||
* Replaces all sourced scripts with a single inline script that can be hashed
|
||||
*/
|
||||
refactorSourcedScriptsForHashBasedCsp(): void {
|
||||
const srcList = this.$(StrictCsp.SOURCED_SCRIPT_SELECTOR)
|
||||
.map((i: any, script: any) => {
|
||||
const src = this.$(script).attr('src');
|
||||
this.$(script).remove();
|
||||
return src;
|
||||
})
|
||||
.filter((src: any) => src !== null)
|
||||
.get();
|
||||
|
||||
const loaderScript = StrictCsp.createLoaderScript(srcList);
|
||||
if (!loaderScript) {
|
||||
return;
|
||||
}
|
||||
|
||||
// const hash = StrictCsp.hashInlineScript(loaderScript);
|
||||
// const comment = cheerio.load(`<!-- CSP hash: ${hash} -->`).root();
|
||||
// comment.appendTo(this.$('body'));
|
||||
const newScript = cheerio.load('<script>')('script');
|
||||
newScript.text(loaderScript);
|
||||
newScript.appendTo(this.$('body'));
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns a list of hashes of all inline scripts found in the HTML document.
|
||||
*/
|
||||
hashAllInlineScripts(): string[] {
|
||||
return this.$(StrictCsp.INLINE_SCRIPT_SELECTOR)
|
||||
.map((i: any, elem: any) =>
|
||||
StrictCsp.hashInlineScript(this.$(elem).html() || ''),
|
||||
)
|
||||
.get();
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns a list of all inline scripts found in the HTML document.
|
||||
*/
|
||||
getAllInlineScripts(): string[] {
|
||||
return this.$(StrictCsp.INLINE_SCRIPT_SELECTOR);
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns JS code for dynamically loading sourced (external) scripts.
|
||||
* @param srcList A list of paths for scripts that should be loaded.
|
||||
*/
|
||||
static createLoaderScript(srcList: string[]): string | undefined {
|
||||
if (!srcList.length) {
|
||||
return undefined;
|
||||
}
|
||||
const srcListFormatted = srcList.map((s) => `'${s}'`).join();
|
||||
return `
|
||||
var scripts = [${srcListFormatted}];
|
||||
scripts.forEach(function(scriptUrl) {
|
||||
var s = document.createElement('script');
|
||||
s.src = scriptUrl;
|
||||
s.async = false; // preserve execution order.
|
||||
document.body.appendChild(s);
|
||||
});\n `;
|
||||
}
|
||||
|
||||
/**
|
||||
* Calculates a CSP compatible hash of an inline script.
|
||||
* @param scriptText Text between opening and closing script tag. Has to
|
||||
* include whitespaces and newlines!
|
||||
*/
|
||||
static hashInlineScript(scriptText: string): string {
|
||||
const hash = crypto
|
||||
.createHash(StrictCsp.HASH_FUNCTION)
|
||||
// EDITED
|
||||
.update(scriptText)
|
||||
.digest('base64');
|
||||
console.log(hash);
|
||||
return `'${StrictCsp.HASH_FUNCTION}-${hash}'`;
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user