aboutsummaryrefslogtreecommitdiff
path: root/gnu/home/services/syncthing.scm
blob: 8d66a167ce59febac14f692ab968224c2ed8fda4 (about) (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
;;; GNU Guix --- Functional package management for GNU
;;; Copyright © 2023 Ludovic Courtès <ludo@gnu.org>
;;;
;;; This file is part of GNU Guix.
;;;
;;; GNU Guix is free software; you can redistribute it and/or modify it
;;; under the terms of the GNU General Public License as published by
;;; the Free Software Foundation; either version 3 of the License, or (at
;;; your option) any later version.
;;;
;;; GNU Guix is distributed in the hope that it will be useful, but
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
;;; GNU General Public License for more details.
;;;
;;; You should have received a copy of the GNU General Public License
;;; along with GNU Guix.  If not, see <http://www.gnu.org/licenses/>.

(define-module (gnu home services syncthing)
  #:use-module (gnu services)
  #:use-module (gnu home services)
  #:use-module (gnu services syncthing)
  ;; For the 'home-shepherd-service-type' mapping.
  #:use-module (gnu home services shepherd)
  #:export (home-syncthing-service-type)
  #:re-export (syncthing-configuration
               syncthing-configuration?))

(define home-syncthing-service-type
  (service-type
   (inherit (system->home-service-type syncthing-service-type))
   (default-value (for-home (syncthing-configuration)))))
74 75 76 77 78
/**
 * Myext injecting policy to page using webRequest
 *
 * Copyright (C) 2021 Wojtek Kosior
 * Redistribution terms are gathered in the `copyright' file.
 */

/*
 * IMPORTS_START
 * IMPORT TYPE_PREFIX
 * IMPORT get_storage
 * IMPORT browser
 * IMPORT is_chrome
 * IMPORT gen_unique
 * IMPORT url_item
 * IMPORT get_query_best
 * IMPORT csp_rule
 * IMPORTS_END
 */

var storage;
var query_best;

let csp_header_names = {
    "content-security-policy" : true,
    "x-webkit-csp" : true,
    "x-content-security-policy" : true
};

function is_noncsp_header(header)
{
    return !csp_header_names[header.name.toLowerCase()];
}

function inject(details)
{
    let url = url_item(details.url);

    let [pattern, settings] = query_best(url);

    if (settings !== undefined && settings.allow)
	return {cancel : false};

    let nonce = gen_unique(url);
    let headers = details.responseHeaders.filter(is_noncsp_header);

    headers.push({
	name : "content-security-policy",
	value : csp_rule(nonce)
    });

    return {responseHeaders: headers};
}

async function start_policy_injector()
{
    storage = await get_storage();
    query_best = await get_query_best();

    let extra_opts = ["blocking", "responseHeaders"];
    if (is_chrome)
	extra_opts.push("extraHeaders");

    browser.webRequest.onHeadersReceived.addListener(
	inject,
	{
	    urls: ["<all_urls>"],
	    types: ["main_frame", "sub_frame"]
	},
	extra_opts
    );
}

/*
 * EXPORTS_START
 * EXPORT start_policy_injector
 * EXPORTS_END
 */