120 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			120 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
const config = require('./config')
 | 
						|
const { v4: uuidv4 } = require('uuid')
 | 
						|
const { buildDomainOriginWithProtocol } = require('./config/buildDomainOriginWithProtocol')
 | 
						|
 | 
						|
const CspStrategy = {}
 | 
						|
 | 
						|
const defaultDirectives = {
 | 
						|
  defaultSrc: ['\'none\''],
 | 
						|
  baseUri: ['\'self\''],
 | 
						|
  connectSrc: ['\'self\'', buildDomainOriginWithProtocol(config, 'ws')],
 | 
						|
  fontSrc: ['\'self\''],
 | 
						|
  manifestSrc: ['\'self\''],
 | 
						|
  frameSrc: ['\'self\'', 'https://player.vimeo.com', 'https://www.slideshare.net/slideshow/embed_code/key/', 'https://www.youtube.com'],
 | 
						|
  imgSrc: ['*', 'data:'], // we allow using arbitrary images & explicit data for mermaid
 | 
						|
  scriptSrc: [
 | 
						|
    config.serverURL + '/build/',
 | 
						|
    config.serverURL + '/js/',
 | 
						|
    config.serverURL + '/config',
 | 
						|
    'https://gist.github.com/',
 | 
						|
    'https://vimeo.com/api/oembed.json',
 | 
						|
    'https://www.slideshare.net/api/oembed/2',
 | 
						|
    '\'unsafe-inline\'' // this is ignored by browsers supporting nonces/hashes
 | 
						|
  ],
 | 
						|
  styleSrc: [config.serverURL + '/build/', config.serverURL + '/css/', '\'unsafe-inline\'', 'https://github.githubassets.com'], // unsafe-inline is required for some libs, plus used in views
 | 
						|
  objectSrc: ['*'], // Chrome PDF viewer treats PDFs as objects :/
 | 
						|
  formAction: ['\'self\''],
 | 
						|
  mediaSrc: ['*']
 | 
						|
}
 | 
						|
 | 
						|
const disqusDirectives = {
 | 
						|
  scriptSrc: ['https://disqus.com', 'https://*.disqus.com', 'https://*.disquscdn.com'],
 | 
						|
  styleSrc: ['https://*.disquscdn.com'],
 | 
						|
  fontSrc: ['https://*.disquscdn.com']
 | 
						|
}
 | 
						|
 | 
						|
const googleAnalyticsDirectives = {
 | 
						|
  scriptSrc: ['https://www.google-analytics.com']
 | 
						|
}
 | 
						|
 | 
						|
const dropboxDirectives = {
 | 
						|
  scriptSrc: ['https://www.dropbox.com', '\'unsafe-inline\'']
 | 
						|
}
 | 
						|
 | 
						|
const disallowFramingDirectives = {
 | 
						|
  frameAncestors: ['\'self\'']
 | 
						|
}
 | 
						|
 | 
						|
const allowPDFEmbedDirectives = {
 | 
						|
  objectSrc: ['*'], // Chrome and Firefox treat PDFs as objects
 | 
						|
  frameSrc: ['*'] // Chrome also checks PDFs against frame-src
 | 
						|
}
 | 
						|
 | 
						|
const configuredGitLabInstanceDirectives = {
 | 
						|
  connectSrc: [config.gitlab.baseURL]
 | 
						|
}
 | 
						|
 | 
						|
CspStrategy.computeDirectives = function () {
 | 
						|
  const directives = {}
 | 
						|
  mergeDirectives(directives, config.csp.directives)
 | 
						|
  mergeDirectivesIf(config.csp.addDefaults, directives, defaultDirectives)
 | 
						|
  mergeDirectivesIf(config.csp.addDisqus, directives, disqusDirectives)
 | 
						|
  mergeDirectivesIf(config.csp.addGoogleAnalytics, directives, googleAnalyticsDirectives)
 | 
						|
  mergeDirectivesIf(config.dropbox.appKey, directives, dropboxDirectives)
 | 
						|
  mergeDirectivesIf(!config.csp.allowFraming, directives, disallowFramingDirectives)
 | 
						|
  mergeDirectivesIf(config.csp.allowPDFEmbed, directives, allowPDFEmbedDirectives)
 | 
						|
  mergeDirectivesIf(config.isGitlabSnippetsEnable, directives, configuredGitLabInstanceDirectives)
 | 
						|
  addInlineScriptExceptions(directives)
 | 
						|
  addUpgradeUnsafeRequestsOptionTo(directives)
 | 
						|
  addReportURI(directives)
 | 
						|
  return directives
 | 
						|
}
 | 
						|
 | 
						|
function mergeDirectives (existingDirectives, newDirectives) {
 | 
						|
  for (const propertyName in newDirectives) {
 | 
						|
    const newDirective = newDirectives[propertyName]
 | 
						|
    if (newDirective) {
 | 
						|
      const existingDirective = existingDirectives[propertyName] || []
 | 
						|
      existingDirectives[propertyName] = existingDirective.concat(newDirective)
 | 
						|
    }
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
function mergeDirectivesIf (condition, existingDirectives, newDirectives) {
 | 
						|
  if (condition) {
 | 
						|
    mergeDirectives(existingDirectives, newDirectives)
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
function addInlineScriptExceptions (directives) {
 | 
						|
  directives.scriptSrc.push(getCspNonce)
 | 
						|
  // TODO: This is the SHA-256 hash of the inline script in build/reveal.js/plugins/notes/notes.html
 | 
						|
  // Any more clean solution appreciated.
 | 
						|
  directives.scriptSrc.push('\'sha256-81acLZNZISnyGYZrSuoYhpzwDTTxi7vC1YM4uNxqWaM=\'')
 | 
						|
}
 | 
						|
 | 
						|
function getCspNonce (req, res) {
 | 
						|
  return '\'nonce-' + res.locals.nonce + '\''
 | 
						|
}
 | 
						|
 | 
						|
function addUpgradeUnsafeRequestsOptionTo (directives) {
 | 
						|
  if (config.csp.upgradeInsecureRequests === 'auto' && (config.useSSL || config.protocolUseSSL)) {
 | 
						|
    directives.upgradeInsecureRequests = []
 | 
						|
  } else if (config.csp.upgradeInsecureRequests === true) {
 | 
						|
    directives.upgradeInsecureRequests = []
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
function addReportURI (directives) {
 | 
						|
  if (config.csp.reportURI) {
 | 
						|
    directives.reportUri = config.csp.reportURI
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
CspStrategy.addNonceToLocals = function (req, res, next) {
 | 
						|
  res.locals.nonce = uuidv4()
 | 
						|
  next()
 | 
						|
}
 | 
						|
 | 
						|
module.exports = CspStrategy
 |