aboutsummaryrefslogtreecommitdiff
path: root/background/policy_injector.js
blob: e2d6358b213ffade874670682a1a9a20b9146ea7 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
/**
 * Myext injecting policy to page using webRequest
 *
 * Copyright (C) 2021 Wojtek Kosior
 *
 * This code is dual-licensed under:
 * - Asshole license 1.0,
 * - GPLv3 or (at your option) any later version
 *
 * "dual-licensed" means you can choose the license you prefer.
 *
 * This code is released under a permissive license because I disapprove of
 * copyright and wouldn't be willing to sue a violator. Despite not putting
 * this code under copyleft (which is also kind of copyright), I do not want
 * it to be made proprietary. Hence, the permissive alternative to GPL is the
 * Asshole license 1.0 that allows me to call you an asshole if you use it.
 * This means you're legally ok regardless of how you utilize this code but if
 * you make it into something nonfree, you're an asshole.
 *
 * You should have received a copy of both GPLv3 and Asshole license 1.0
 * together with this code. If not, please see:
 * - https://www.gnu.org/licenses/gpl-3.0.en.html
 * - https://koszko.org/asshole-license.txt
 */

"use strict";

(() => {
    const TYPE_PREFIX = window.TYPE_PREFIX;
    const get_storage = window.get_storage;
    const browser = window.browser;
    const is_chrome = window.is_chrome;
    const gen_unique = window.gen_unique;
    const url_item = window.url_item;
    const get_query_best = window.get_query_best;

    var storage;
    var query_best;

    let csp_header_names = {
	"content-security-policy" : true,
	"x-webkit-csp" : true,
	"x-content-security-policy" : true
    };

    function is_noncsp_header(header)
    {
	return !csp_header_names[header.name.toLowerCase()];
    }

    function inject(details)
    {
	let url = url_item(details.url);

	let [pattern, settings] = query_best(url);

	if (settings !== undefined && settings.allow) {
	    console.log("allowing", url);
	    return {cancel : false};
	}

	let nonce = gen_unique(url).substring(1);
	let headers = details.responseHeaders.filter(is_noncsp_header);
	headers.push({
	    name : "content-security-policy",
	    value : `script-src 'nonce-${nonce}'; script-src-elem 'nonce-${nonce}';`
	});

	console.log("modified headers", url, headers);

	return {responseHeaders: headers};
    }

    async function start() {
	storage = await get_storage();
	query_best = await get_query_best();

	let extra_opts = ["blocking", "responseHeaders"];
	if (is_chrome)
	    extra_opts.push("extraHeaders");

	browser.webRequest.onHeadersReceived.addListener(
	    inject,
	    {
		urls: ["<all_urls>"],
		types: ["main_frame", "sub_frame"]
	    },
	    extra_opts
	);
    }

    window.start_policy_injector = start;
})();