This commit should fix existing problems with Disqus and Google Analytics enabled in the meta-yaml section of a note. Before this commit they were blocked by the strict CSP. It's still possible to disable the added directives using `addDisqus` and `addGoogleAnalytics` in the `csp` config section. They are enabled by default to prevent breaking changes. Signed-off-by: Sheogorath <sheogorath@shivering-isles.com>
		
			
				
	
	
		
			101 lines
		
	
	
		
			3.3 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
			
		
		
	
	
			101 lines
		
	
	
		
			3.3 KiB
		
	
	
	
		
			JavaScript
		
	
	
	
	
	
var config = require('./config')
 | 
						|
var uuid = require('uuid')
 | 
						|
 | 
						|
var CspStrategy = {}
 | 
						|
 | 
						|
var defaultDirectives = {
 | 
						|
  defaultSrc: ['\'self\''],
 | 
						|
  scriptSrc: ['\'self\'', 'vimeo.com', 'https://gist.github.com', 'www.slideshare.net', 'https://query.yahooapis.com', '\'unsafe-eval\''],
 | 
						|
  // ^ TODO: Remove unsafe-eval - webpack script-loader issues https://github.com/hackmdio/hackmd/issues/594
 | 
						|
  imgSrc: ['*'],
 | 
						|
  styleSrc: ['\'self\'', '\'unsafe-inline\'', 'https://assets-cdn.github.com'], // unsafe-inline is required for some libs, plus used in views
 | 
						|
  fontSrc: ['\'self\'', 'https://public.slidesharecdn.com'],
 | 
						|
  objectSrc: ['*'], // Chrome PDF viewer treats PDFs as objects :/
 | 
						|
  mediaSrc: ['*'],
 | 
						|
  childSrc: ['*'],
 | 
						|
  connectSrc: ['*']
 | 
						|
}
 | 
						|
 | 
						|
var cdnDirectives = {
 | 
						|
  scriptSrc: ['https://cdnjs.cloudflare.com', 'https://cdn.mathjax.org'],
 | 
						|
  styleSrc: ['https://cdnjs.cloudflare.com', 'https://fonts.googleapis.com'],
 | 
						|
  fontSrc: ['https://cdnjs.cloudflare.com', 'https://fonts.gstatic.com']
 | 
						|
}
 | 
						|
 | 
						|
var disqusDirectives = {
 | 
						|
  scriptSrc: ['https://*.disqus.com', 'https://*.disquscdn.com'],
 | 
						|
  styleSrc: ['https://*.disquscdn.com'],
 | 
						|
  fontSrc: ['https://*.disquscdn.com']
 | 
						|
}
 | 
						|
 | 
						|
var googleAnalyticsDirectives = {
 | 
						|
  scriptSrc: ['https://www.google-analytics.com']
 | 
						|
}
 | 
						|
 | 
						|
CspStrategy.computeDirectives = function () {
 | 
						|
  var directives = {}
 | 
						|
  mergeDirectives(directives, config.csp.directives)
 | 
						|
  mergeDirectivesIf(config.csp.addDefaults, directives, defaultDirectives)
 | 
						|
  mergeDirectivesIf(config.useCDN, directives, cdnDirectives)
 | 
						|
  mergeDirectivesIf(config.csp.addDisqus, directives, disqusDirectives)
 | 
						|
  mergeDirectivesIf(config.csp.addGoogleAnalytics, directives, googleAnalyticsDirectives)
 | 
						|
  if (!areAllInlineScriptsAllowed(directives)) {
 | 
						|
    addInlineScriptExceptions(directives)
 | 
						|
  }
 | 
						|
  addUpgradeUnsafeRequestsOptionTo(directives)
 | 
						|
  addReportURI(directives)
 | 
						|
  return directives
 | 
						|
}
 | 
						|
 | 
						|
function mergeDirectives (existingDirectives, newDirectives) {
 | 
						|
  for (var propertyName in newDirectives) {
 | 
						|
    var newDirective = newDirectives[propertyName]
 | 
						|
    if (newDirective) {
 | 
						|
      var existingDirective = existingDirectives[propertyName] || []
 | 
						|
      existingDirectives[propertyName] = existingDirective.concat(newDirective)
 | 
						|
    }
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
function mergeDirectivesIf (condition, existingDirectives, newDirectives) {
 | 
						|
  if (condition) {
 | 
						|
    mergeDirectives(existingDirectives, newDirectives)
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
function areAllInlineScriptsAllowed (directives) {
 | 
						|
  return directives.scriptSrc.indexOf('\'unsafe-inline\'') !== -1
 | 
						|
}
 | 
						|
 | 
						|
function addInlineScriptExceptions (directives) {
 | 
						|
  directives.scriptSrc.push(getCspNonce)
 | 
						|
  // TODO: This is the SHA-256 hash of the inline script in build/reveal.js/plugins/notes/notes.html
 | 
						|
  // Any more clean solution appreciated.
 | 
						|
  directives.scriptSrc.push('\'sha256-EtvSSxRwce5cLeFBZbvZvDrTiRoyoXbWWwvEVciM5Ag=\'')
 | 
						|
}
 | 
						|
 | 
						|
function getCspNonce (req, res) {
 | 
						|
  return "'nonce-" + res.locals.nonce + "'"
 | 
						|
}
 | 
						|
 | 
						|
function addUpgradeUnsafeRequestsOptionTo (directives) {
 | 
						|
  if (config.csp.upgradeInsecureRequests === 'auto' && config.useSSL) {
 | 
						|
    directives.upgradeInsecureRequests = true
 | 
						|
  } else if (config.csp.upgradeInsecureRequests === true) {
 | 
						|
    directives.upgradeInsecureRequests = true
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
function addReportURI (directives) {
 | 
						|
  if (config.csp.reportURI) {
 | 
						|
    directives.reportUri = config.csp.reportURI
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
CspStrategy.addNonceToLocals = function (req, res, next) {
 | 
						|
  res.locals.nonce = uuid.v4()
 | 
						|
  next()
 | 
						|
}
 | 
						|
 | 
						|
module.exports = CspStrategy
 |