blob: 4f70aacdec5f1b2edc02009cb9d70ed6371b0d4a (
about) (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
|
/**
* Myext injecting policy to page using webRequest
*
* Copyright (C) 2021 Wojtek Kosior
* Redistribution terms are gathered in the `copyright' file.
*/
/*
* IMPORTS_START
* IMPORT TYPE_PREFIX
* IMPORT get_storage
* IMPORT browser
* IMPORT is_chrome
* IMPORT gen_unique
* IMPORT url_item
* IMPORT get_query_best
* IMPORT csp_rule
* IMPORTS_END
*/
var storage;
var query_best;
let csp_header_names = {
"content-security-policy" : true,
"x-webkit-csp" : true,
"x-content-security-policy" : true
};
function is_noncsp_header(header)
{
return !csp_header_names[header.name.toLowerCase()];
}
function inject(details)
{
let url = url_item(details.url);
let [pattern, settings] = query_best(url);
if (settings !== undefined && settings.allow)
return {cancel : false};
let nonce = gen_unique(url);
let headers = details.responseHeaders.filter(is_noncsp_header);
headers.push({
name : "content-security-policy",
value : csp_rule(nonce)
});
return {responseHeaders: headers};
}
async function start_policy_injector()
{
storage = await get_storage();
query_best = await get_query_best();
let extra_opts = ["blocking", "responseHeaders"];
if (is_chrome)
extra_opts.push("extraHeaders");
browser.webRequest.onHeadersReceived.addListener(
inject,
{
urls: ["<all_urls>"],
types: ["main_frame", "sub_frame"]
},
extra_opts
);
}
/*
* EXPORTS_START
* EXPORT start_policy_injector
* EXPORTS_END
*/
|