# SPDX-License-Identifier: GPL-3.0-or-later # Policies for resolving HTTP requests with local resources. # # This file is part of Hydrilla&Haketilo. # # Copyright (C) 2022 Wojtek Kosior # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see . # # # I, Wojtek Kosior, thereby promise not to sue for violation of this # file's license. Although I request that you do not make use of this # code in a proprietary program, I am not going to enforce this in # court. """ ..... We make file resources available to HTTP clients by mapping them at: http(s):///// where is a per-session secret unique for every mapping. For example, a payload with pattern like the following: http*://***.example.com/a/b/** Could cause resources to be mapped (among others) at each of: https://example.com/a/b/**/Da2uiF2UGfg/ https://www.example.com/a/b/**/Da2uiF2UGfg/ http://gnome.vs.kde.example.com/a/b/**/Da2uiF2UGfg/ Unauthorized web pages running in the user's browser are exected to be unable to guess the secret. This way we stop them from spying on the user and from interfering with Haketilo's normal operation. This is only a soft prevention method. With some mechanisms (e.g. service workers), under certain scenarios, it might be possible to bypass it. Thus, to make the risk slightly smaller, we also block the unauthorized accesses that we can detect. Since a web page authorized to access the resources may only be served when the corresponding mapping is enabled (or AUTO mode is on), we consider accesses to non-enabled mappings' resources a security breach and block them by responding with 403 Not Found. """ # Enable using with Python 3.7. from __future__ import annotations import dataclasses as dc import typing as t from ...translations import smart_gettext as _ from .. import state from .. import http_messages from . import base from .payload import PayloadAwarePolicy, PayloadAwarePolicyFactory @dc.dataclass(frozen=True) class PayloadResourcePolicy(PayloadAwarePolicy): """....""" process_request: t.ClassVar[bool] = True priority: t.ClassVar[base.PolicyPriority] = base.PolicyPriority._THREE def _make_file_resource_response(self, path: tuple[str, ...]) \ -> http_messages.ProducedResponse: """....""" try: file_data = self.payload_data.ref.get_file_data(path) except state.MissingItemError: return resource_blocked_response if file_data is None: return http_messages.ProducedResponse( 404, [(b'Content-Type', b'text/plain; charset=utf-8')], _('api.file_not_found').encode() ) return http_messages.ProducedResponse( 200, ((b'Content-Type', file_data.type.encode()),), file_data.contents ) def consume_request(self, request_info: http_messages.RequestInfo) \ -> http_messages.ProducedResponse: """....""" # Payload resource pattern has path of the form: # "/some/arbitrary/segments//***" # # Corresponding requests shall have path of the form: # "/some/arbitrary/segments//actual/resource/path" # # Here we need to extract the "/actual/resource/path" part. segments_to_drop = len(self.payload_data.pattern_path_segments) + 1 resource_path = request_info.url.path_segments[segments_to_drop:] if resource_path == (): return resource_blocked_response elif resource_path[0] == 'static': return self._make_file_resource_response(resource_path[1:]) elif resource_path[0] == 'api': # TODO: implement Haketilo APIs return resource_blocked_response else: return resource_blocked_response resource_blocked_response = http_messages.ProducedResponse( 403, [(b'Content-Type', b'text/plain; charset=utf-8')], _('api.resource_not_enabled_for_access').encode() ) @dc.dataclass(frozen=True) class BlockedResponsePolicy(base.Policy): """....""" process_request: t.ClassVar[bool] = True priority: t.ClassVar[base.PolicyPriority] = base.PolicyPriority._THREE def consume_request(self, request_info: http_messages.RequestInfo) \ -> http_messages.ProducedResponse: """....""" return resource_blocked_response @dc.dataclass(frozen=True, unsafe_hash=True) # type: ignore[misc] class PayloadResourcePolicyFactory(PayloadAwarePolicyFactory): """....""" def make_policy(self, haketilo_state: state.HaketiloState) \ -> t.Union[PayloadResourcePolicy, BlockedResponsePolicy]: """....""" try: payload_data = self.payload_ref.get_data() except state.MissingItemError: return BlockedResponsePolicy() if not payload_data.explicitly_enabled and \ haketilo_state.get_settings().mapping_use_mode != \ state.MappingUseMode.AUTO: return BlockedResponsePolicy() return PayloadResourcePolicy(payload_data)