aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorWojtek Kosior <koszko@koszko.org>2022-10-28 12:03:32 +0200
committerWojtek Kosior <koszko@koszko.org>2022-10-28 12:03:32 +0200
commitedb1299c7196a6c3909f4ec3160428636197d877 (patch)
tree6a8d1cd42701d890f22bf781d254c9f04a244bcc
parentfddbbf96bf447bfb630e4a0fd67f6ba7c8c0e141 (diff)
downloadhaketilo-hydrilla-edb1299c7196a6c3909f4ec3160428636197d877.tar.gz
haketilo-hydrilla-edb1299c7196a6c3909f4ec3160428636197d877.zip
[proxy] don't use gettext for localization of doc pages; add a stub of "packages" doc page
-rw-r--r--src/hydrilla/locales/en_US/LC_MESSAGES/messages.po704
-rw-r--r--src/hydrilla/proxy/self_doc/packages.html.jinja41
-rw-r--r--src/hydrilla/proxy/self_doc/policy_selection.html.jinja73
-rw-r--r--src/hydrilla/proxy/self_doc/popup.html.jinja101
-rw-r--r--src/hydrilla/proxy/self_doc/script_blocking.html.jinja92
-rw-r--r--src/hydrilla/proxy/self_doc/url_patterns.html.jinja181
-rw-r--r--src/hydrilla/proxy/web_ui/root.py13
7 files changed, 362 insertions, 843 deletions
diff --git a/src/hydrilla/locales/en_US/LC_MESSAGES/messages.po b/src/hydrilla/locales/en_US/LC_MESSAGES/messages.po
index 7f6760e..7f22ea3 100644
--- a/src/hydrilla/locales/en_US/LC_MESSAGES/messages.po
+++ b/src/hydrilla/locales/en_US/LC_MESSAGES/messages.po
@@ -1,20 +1,13 @@
-# SPDX-License-Identifier: GPL-3.0-or-later OR CC-BY-SA-4.0
+# SPDX-License-Identifier: CC0-1.0
# English translations for Hydrilla&Haketilo.
#
-# This file is part of Hydrilla&Haketilo.
# Copyright (C) 2021-2022 Wojtek Kosior <koszko@koszko.org>
-# Dual licensed under
-# * GNU General Public License v3.0 or later and
-# * Creative Commons Attribution Share Alike 4.0 International.
-# You can choose to use either of these licenses or both.
-# I, Wojtek Kosior, thereby promise not to sue for violation of this
-# file's licenses. Although I request that you do not make use of this
-# code in a proprietary work, I am not going to enforce this in court.
+# Available under the terms of Creative Commons Zero v1.0 Universal.
msgid ""
msgstr ""
"Project-Id-Version: hydrilla 2.0\n"
"Report-Msgid-Bugs-To: koszko@koszko.org\n"
-"POT-Creation-Date: 2022-10-27 19:46+0200\n"
+"POT-Creation-Date: 2022-10-28 11:58+0200\n"
"PO-Revision-Date: 2022-02-12 00:00+0000\n"
"Last-Translator: Wojtek Kosior <koszko@koszko.org>\n"
"Language: en_US\n"
@@ -319,697 +312,6 @@ msgstr "Requested file could not be found."
msgid "api.resource_not_enabled_for_access"
msgstr "Requested resource is not enabled for access."
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:23
-msgid "doc.policy_selection.title"
-msgstr "Policy selection"
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:26
-msgid "doc.policy_selection.h_big"
-msgstr "Page policy selection"
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:30
-msgid "doc.policy_selection.intro"
-msgstr "When a web page is opened, Haketilo is capable of either"
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:33
-msgid "doc.policy_selection.enabled_payload_case"
-msgstr "blocking page's own scripts and injecting payload configured by the user,"
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:36
-msgid "doc.policy_selection.auto_payload_case"
-msgstr ""
-"blocking page's own scripts and injecting an automatically-chosen payload"
-" that is usable with the page,"
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:39
-msgid "doc.policy_selection.ask_payload_case"
-msgstr ""
-"presenting a dialog asking whether to enable an automatically-chosen "
-"payload that is usable with the page,"
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:42
-msgid "doc.policy_selection.block_js_case_{blocking_link}"
-msgstr "{blocking_link} page's own scripts or"
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:43
-msgid "doc.policy_selection.html.block_js_case.blocking_link_text"
-msgstr "blocking"
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:48
-msgid "doc.policy_selection.allow_js_case"
-msgstr ""
-"allowing page's own scripts to execute normally (i.e. not modifying the "
-"page in any meaningful way)."
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:55
-msgid "doc.policy_selection.h_medium.precedence"
-msgstr "Policy precedence"
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:58
-msgid "doc.policy_selection.html.precedence_general_{patterns_link}"
-msgstr ""
-"User configures Haketilo's behavior by defining script-blocking and "
-"-allowing rules and by adding and enabling packages. Each rule and each "
-"package payload has a {patterns_link}. This pattern determined which "
-"pages the policy is compatible with. Patterns also have well-defined "
-"specificity. When multiple rules and packages are combatible with given "
-"page's URL, the one with the most specific pattern \"wins\". In case of a"
-" tie, payload injection is assumed to take precedence over rule "
-"application."
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:59
-msgid "doc.policy_selection.precedence_general.patterns_link_text"
-msgstr "URL pattern"
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:65
-msgid "doc.policy_selection.html.precedence_nonenabled_{settings_link}"
-msgstr ""
-"In the absence of suitable rules and enabled packages, Haketilo may "
-"consider non-enabled packages that are suitable for use on the currently-"
-"visited site. It will either inject package payload automatically, ask "
-"the user whether to enable the package or ignore it completely. The user "
-"can switch between these 3 behaviors on the Haketilo {settings_link}. "
-"Packages that were explicitly marked as disabled will always be ignored. "
-"Pattern specificity is also taken into account in case of multiple "
-"packages."
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:66
-msgid "doc.policy_selection.precedence_nonenabled.settings_link_text"
-msgstr "settings page"
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:72
-msgid "doc.policy_selection.html.precedence_fallback_{settings_link}"
-msgstr ""
-"When absolutely no explicit policy appears suitable for given page, "
-"Haketilo will apply its default script handling behavrior. Whether "
-"JavaScript is blocked or allowed by default is also determined by user's "
-"choice on the {settings_link}."
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:73
-msgid "doc.policy_selection.precedence_fallback.settings_link_text"
-msgstr "settings page"
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:80
-msgid "doc.policy_selection.special_cases.h_medium"
-msgstr "Special cases"
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:83
-msgid "doc.policy_selection.special_cases.html.exepmt_and_error"
-msgstr ""
-"The sites served by Haketilo itself are exempt from all policies. These "
-"are <code>http://hkt.mitm.it</code>, <code>https://hkt.mitm.it</code> and"
-" <code>http://mitm.it</code>. Additionally, if Haketilo experiences an "
-"internal error (e.g. because it could not parse current URL as sent in by"
-" the browser), it will try to block page's JavaScript as a security "
-"measure."
-
-#: src/hydrilla/proxy/self_doc/policy_selection.html.jinja:87
-msgid "doc.policy_selection.special_cases.internal_policies"
-msgstr ""
-"Internally, Haketilo also has a special high-priority policy for serving "
-"files used by payloads and for making its APIs accessible to payload "
-"scripts. This is, however, an implementation detail and casual users need"
-" not care about it nor understand these nuances."
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:23
-msgid "doc.popup.title"
-msgstr "Popup"
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:26
-msgid "doc.popup.h_big"
-msgstr "Haketilo popup"
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:30
-msgid "doc.popup.intro"
-msgstr ""
-"Taking inspiration from user interface features of browser extensions, "
-"Haketilo also offers a popup window for quick interaction with the user. "
-"For technical reasons, the popup is presented as part of the web page and"
-" behaves slightly differently from those some users might have found in "
-"similar tools."
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:35
-msgid "doc.popup.h_medium.operating"
-msgstr "Operating"
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:38
-msgid "doc.popup.operating.html.opening_{blocking_link}_{packages_link}"
-msgstr ""
-"The popup dialog can be opened by typing big letters \"HKT\" anywhere on "
-"the page. It then presents some basic information about the handling of "
-"current URL. It also allows the user quickly define new {blocking_link} "
-"or {packages_link} for it. As of Haketilo 3.0, however, the actual "
-"configuration is not performed from the popup itself but rather a "
-"relevant Haketilo rule/payload definition page is opened in a new tab."
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:39
-msgid "doc.popup.operating.opening.blocking_link_text"
-msgstr "rules"
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:41
-msgid "doc.popup.operating.opening.packages_link_text"
-msgstr "payloads"
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:52
-msgid "doc.popup.operating.html.closing"
-msgstr ""
-"The dialog can be closed by clicking anywhere on the darker area around "
-"it. It can then be reopened by typing \"HKT\" again."
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:57
-msgid "doc.popup.h_medium.enabling"
-msgstr "Enabling/disabling"
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:60
-msgid "doc.popup.enabling.html.intro"
-msgstr ""
-"Popup is unavailable by default on Haketilo special sites including "
-"<code>https://hkt.mitm.it</code>. It can also be disabled independently "
-"on"
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:65
-msgid "doc.popup.enabling.js_allowed_case"
-msgstr "pages with JS allowed,"
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:68
-msgid "doc.popup.enabling.js_blocked_case"
-msgstr "pages with JS blocked and"
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:71
-msgid "doc.popup.enabling.payload_case"
-msgstr "pages with script payload injected."
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:76
-msgid "doc.popup.enabling.html.rest_{settings_link}"
-msgstr ""
-"This can be configured on the {settings_link} and might be useful to "
-"users who are careful about fingerprinting."
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:77
-msgid "doc.popup.enabling.html.rest.settings_link_text"
-msgstr "settings page"
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:84
-msgid "doc.popup.h_medium.fingerprinting"
-msgstr "Fingerprinting considerations"
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:87
-msgid "doc.popup.fingerprinting_intro"
-msgstr ""
-"To make the popup available, Haketilo has to inject an additional script "
-"to all pages. That makes it easy for pages to determine with certainty "
-"that given user is running Haketilo. This has implications for privacy "
-"and may also be used by a hostile site to selectively cause annoyance to "
-"Haketilo users."
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:91
-msgid "doc.popup.fingerprinting_more"
-msgstr ""
-"The above problems would be present regardless on pages with Haketilo-"
-"injected payloads. I.e. in many cases a site could theoretically find out"
-" the user is not accessing it in a normal way. However, the popup also "
-"increases fingerprintability when no payload is in use and especially on "
-"pages with JavaScript allowed. For this reason, the presence of popup on "
-"pages has been made configurable."
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:95
-msgid "doc.popup.fingerprinting_more_more"
-msgstr ""
-"It is also worth noting that as of version 3.0 Haketilo does not make "
-"guarantees about the browser fingerprint. Despite best efforts, there are"
-" still other aspects that might make a Haketilo user distinguishable to a"
-" website even when popup is disabled."
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:100
-msgid "doc.popup.h_medium.other_caveats"
-msgstr "Other caveats"
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:103
-msgid "doc.popup.other_caveats.intro"
-msgstr "Some other potential issues related to the popup are described below."
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:108
-msgid "doc.popup.h_small.site_interference"
-msgstr "Interference with the site"
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:111
-msgid "doc.popup.site_interference.text"
-msgstr ""
-"The popup gets injected by Haketilo into the actual web page. Although "
-"care was taken to make accidental breakage unlikely, it might still "
-"happen under some specific conditions."
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:116
-msgid "doc.popup.h_small.content_blockers_interference"
-msgstr "Interference with other script-blocking tools"
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:119
-msgid "doc.popup.content_blockers_interference.text"
-msgstr ""
-"The popup is driven by a piece of JavaScript code injected by Haketilo to"
-" pages. Haketilo by itself makes sure neither the policies specified by "
-"the page nor its own script-blocking mechanisms interfere with this "
-"particular piece. In spite of that, a browser extension or web browser's "
-"own settings might prevent the popup script from executing, making the "
-"dialog unavailable."
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:124
-msgid "doc.popup.h_small.url_mismatch"
-msgstr "URL mismatch"
-
-#: src/hydrilla/proxy/self_doc/popup.html.jinja:127
-#, fuzzy
-msgid "doc.popup.url_mismatch.text"
-msgstr ""
-"Sometimes a page might change parts of its address visible in browser's "
-"URL bar. E.g. after opening <code>https://entraide.chatons.org/</code> in"
-" the browser we might see <code>https://entraide.chatons.org/en/</code> "
-"as the current address even though no reload happened. In addition, some "
-"browsers hide URL's traling dash (\"/\") from the user. Regardless of "
-"that, Haketilo's popup always presents the original URL under which the "
-"current page was served. Although this the intended behavior, it might "
-"cause confusion and therefore has been documented here."
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:23
-msgid "doc.script_blocking.title"
-msgstr "Script blocking"
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:26
-msgid "doc.script_blocking.h_big"
-msgstr "Script blocking in Haketilo"
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:30
-msgid "doc.script_blocking.intro"
-msgstr ""
-"Modern web browsers allow sites to execute software on users' devices. "
-"This software is usually written in a language called JavaScript and "
-"abbreviated as JS. It can serve various purposes - from small "
-"enhancements to deployment of heavy applications inside the browser. "
-"Because Haketilo aims to give users control over their web browsing, one "
-"of its supported features is blocking of JavaScript execution on per-page"
-" and per-site basis."
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:34
-msgid "doc.script_blocking.html.see_here_for_{packages_link}"
-msgstr ""
-"Besides the casual script-blocking discussed here, Haketilo also blocks "
-"page's JavaScript when injecting the user-specified {packages_link}. That"
-" functionality is described on its own documentation page."
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:35
-msgid "doc.script_blocking.see_here_for.packages_link_text"
-msgstr "script payloads"
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:42
-msgid "doc.script_blocking.h_medium.configuring"
-msgstr "Configuring script blocking"
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:45
-msgid "doc.script_blocking.configuring.html.rules_{rules_link}_{patterns_link}_{policy_link}"
-msgstr ""
-"User can {rules_link} using {patterns_link}. Each such rule tells "
-"Haketilo to either block or allow scripts on pages matched by its "
-"pattern. Rules with more specific patterns can override those with less "
-"specific ones as described on the {policy_link}."
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:46
-msgid "doc.script_blocking.configuring.rules.rules_link_text"
-msgstr "define script-blocking and -allowing rules"
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:48
-msgid "doc.script_blocking.configuring.rules.patterns_link_text"
-msgstr "URL patterns"
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:50
-msgid "doc.script_blocking.configuring.rules.policy_link_text"
-msgstr "policy selection page"
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:62
-msgid "doc.script_blocking.configuring.html.rules_example"
-msgstr ""
-"As an example, if we want all scripts on english Wikipedia pages to be "
-"blocked, we can add a blocking rule with pattern "
-"<code>https://en.wikipedia.org/***</code>. If we then wanted to make an "
-"exception just for the \"List of emoticons\" page, we could create an "
-"additional allowing rule with "
-"<code>https://en.wikipedia.org/wiki/List_of_emoticons</code> as its "
-"pattern. It would take effect on that page while all the other english "
-"Wikipedia pages would still have their scripts blocked."
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:66
-msgid "doc.script_blocking.configuring.html.fallback_{settings_link}"
-msgstr ""
-"It is also possible to configure whether scripts should be blocked by "
-"dafault on pages when no explicit rule and no payload is used. The "
-"relevant option is found on Haketilo {settings_link}"
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:67
-msgid "doc.script_blocking.configuring.html.fallback.settings_link_text"
-msgstr "settings page"
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:74
-msgid "doc.script_blocking.medium_h.with_other_tools"
-msgstr "Use with other script-blocking tools"
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:77
-msgid "doc.script_blocking.with_other_tools.haketilo_independently"
-msgstr ""
-"Various browsers and browser extension can also be configured to block "
-"JavaScript. Haketilo works independently of those tools. If the user "
-"desires to have scripts on certain page to execute normally, both "
-"Haketilo and other tools must be configured to allow that."
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:81
-msgid "doc.script_blocking.with_other_tools.html.breakages_{popup_link}"
-msgstr ""
-"Unlike most similar tools, Haketilo operates outside the web browser. As "
-"a result, it is relatively unlikely for Haketilo to cause these to "
-"malfunction. At the same time, it is relatively easy to have another "
-"script blocker break some Haketilo functionality (e.g. its {popup_link})."
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:82
-msgid "doc.script_blocking.with_other_tools.breakages.popup_link_text"
-msgstr "popup"
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:89
-msgid "doc.script_blocking.medium_h.technical"
-msgstr "Technical means"
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:92
-msgid "doc.script_blocking.technical.general"
-msgstr ""
-"From technical point of view, Haketilo, as of version 3.0, blocks "
-"JavaScript by altering the Content-Security-Policy (abbreviated CSP) "
-"headers in HTTP responses. The original CSP directives sent by site are "
-"retained, with exception of those which would result in CSP violation "
-"reports being sent. Haketilo's own script-blocking directives are then "
-"added to produce the final CSP which user's web browser eventually sees."
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:96
-msgid "doc.script_blocking.technical.means_no_reports"
-msgstr ""
-"The above means that neither the scripts that would be blocked by page's "
-"own rules nor those that are blocked by Haketilo are going to cause CSP "
-"reports to be sent."
-
-#: src/hydrilla/proxy/self_doc/script_blocking.html.jinja:100
-msgid "doc.script_blocking.technical.popup_script"
-msgstr ""
-"In addition, even when a page has JavaScript nominally blocked, Haketilo "
-"3.0 may nevertheless inject into it its own script responsible for making"
-" the popup available. The CSP is then modified appropriately to allow "
-"only that script to run."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:23
-msgid "doc.url_patterns.title"
-msgstr "URL patterns"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:26
-msgid "doc.url_patterns.h_big"
-msgstr "URL patterns"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:30
-msgid "doc.url_patterns.html.intro"
-msgstr ""
-"We want to be able to apply different rules and custom scripts for "
-"different websites. However, merely specifying \"do this for all "
-"documents under <code>https://example.com</code>\" is not enough. Single "
-"site's pages might differ strongly and require different custom scripts "
-"to be loaded. Always matching against a full URL like "
-"<code>https://example.com/something/somethingelse</code> is also not a "
-"good option. It doesn't allow us to properly handle a site that serves "
-"similar pages for multiple values substituted for "
-"<code>somethingelse</code>."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:35
-msgid "doc.url_patterns.h_medium.employed_solution"
-msgstr "Employed solution"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:38
-msgid "doc.url_patterns.html.wildcards_intro"
-msgstr ""
-"Wildcards are being used to address the problem. Each payload and rule in"
-" Haketilo has a URL pattern that specifies to which internet pages it "
-"applies. A URL pattern can be as as simple as literal URL in which case "
-"it only matches itself. It can also contain wildcards in the form of one "
-"or more asterisks (<code>*</code>) that correspond to multiple possible "
-"strings occurring in that place."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:42
-msgid "doc.url_patterns.html.wildcards_types_introduced"
-msgstr ""
-"Wildcards can appear in URL's domain and path that follows it. These 2 "
-"types of wildcards are handled separately."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:47
-msgid "doc.url_patterns.h_small.domain_wildcards"
-msgstr "Domain wildcards"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:50
-msgid "doc.url_patterns.html.domain_wildcards_intro"
-msgstr ""
-"A domain wildcard takes the form of one, two or three asterisks occurring"
-" in place of a single domain name segment at the beginning (left). "
-"Depending on the number of asterisks, the meaning is as follows"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:55
-msgid "doc.url_patterns.html.domain_no_asterisks_example"
-msgstr ""
-"no asterisks (e.g. <code>example.com</code>) - match domain name exactly "
-"(e.g. <code>example.com</code>)"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:58
-msgid "doc.url_patterns.html.domain_one_asterisk_example"
-msgstr ""
-"one asterisk (e.g. <code>*.example.com</code>) - match all domains "
-"resulting from substituting <code>*</code> with a <span "
-"class=\"bold\">single</span> segment (e.g. "
-"<code>banana.example.com</code> or <code>pineapple.example.com</code> but"
-" <span class=\"bold\">not</span> <code>pineapple.pen.example.com</code> "
-"nor <code>example.com</code>)"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:61
-msgid "doc.url_patterns.html.domain_two_asterisks_example"
-msgstr ""
-"two asterisks (e.g. <code>**.example.com</code>) - match all domains "
-"resulting from substituting <code>**</code> with <span class=\"bold\">two"
-" or more</span> segments (e.g. <code>monad.breakfast.example.com</code> "
-"or <code>pure.monad.breakfast.example.com</code> but <span "
-"class=\"bold\">not</span> <code>cabalhell.example.com</code> nor "
-"<code>example.com</code>)"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:64
-msgid "doc.url_patterns.html.domain_three_asterisks_example"
-msgstr ""
-"three asterisks (e.g. <code>***.example.com</code>) - match all domains "
-"resulting from substituting <code>***</code> with <span "
-"class=\"bold\">zero or more</span> segments (e.g. "
-"<code>hello.parkmeter.example.com</code> or "
-"<code>iliketrains.example.com</code> or <code>example.com</code>)"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:70
-msgid "doc.url_patterns.h_small.path_wildcards"
-msgstr "Path wildcards"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:73
-msgid "doc.url_patterns.html.path_wildcards_intro"
-msgstr ""
-"A path wildcard takes the form of one, two or three asterisks occurring "
-"in place of a single path segment at the end of path (right). Depending "
-"on the number of asterisks, the meaning is as follows"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:78
-msgid "doc.url_patterns.html.path_no_asterisks_example"
-msgstr ""
-"no asterisks (e.g. <code>/joke/clowns</code>) - match path exactly (e.g. "
-"<code>/joke/clowns</code>)"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:81
-msgid "doc.url_patterns.html.path_one_asterisk_example"
-msgstr ""
-"one asterisk (e.g. <code>/itscalled/*</code>) - match all paths resulting"
-" from substituting <code>*</code> with a <span "
-"class=\"bold\">single</span> segment (e.g. "
-"<code>/itscalled/gnulinux</code> or <code>/itscalled/glamp</code> but "
-"<span class=\"bold\">not</span> <code>/itscalled/</code> nor "
-"<code>/itscalled/gnu/linux</code>)"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:84
-msgid "doc.url_patterns.html.path_two_asterisks_example"
-msgstr ""
-"two asterisks (e.g. <code>/another/**</code>) - match all paths resulting"
-" from substituting <code>**</code> with <span class=\"bold\">two or "
-"more</span> segments (e.g. <code>/another/nsa/backdoor</code> or "
-"<code>/another/best/programming/language</code> but <span "
-"class=\"bold\">not</span> <code>/another/apibreak</code> nor "
-"<code>/another</code>)"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:87
-msgid "doc.url_patterns.html.path_three_asterisks_example"
-msgstr ""
-"three asterisks (e.g. <code>/mail/dmarc/***</code>) - match all paths "
-"resulting from substituting <code>***</code> with <span "
-"class=\"bold\">zero or more</span> segments (e.g. "
-"<code>/mail/dmarc/spf</code>, <code>/mail/dmarc</code> or "
-"<code>/mail/dmarc/dkim/failure</code> but <span class=\"bold\">not</span>"
-" <code>/mail/</code>)"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:92
-msgid "doc.url_patterns.html.path_trailing_slash"
-msgstr ""
-"If pattern ends <span class=\"bold\">without</span> a trailing slash, it "
-"mathes paths with any number of trailing slashes, including zero. If "
-"pattern ends <span class=\"bold\">with</span> a trailing slash, it only "
-"mathes paths with one or more trailing slashes. For example, "
-"<code>/itscalled/*</code> matches <code>/itscalled/gnulinux</code>, "
-"<code>/itscalled/gnulinux/</code> and <code>/itscalled/gnulinux//</code> "
-"while <code>/itscalled/*/</code> only matches "
-"<code>/itscalled/gnulinux/</code> and <code>/itscalled/gnulinux//</code> "
-"out of those three."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:96
-msgid "doc.url_patterns.html.path_trailing_slash_priority"
-msgstr ""
-"If two patterns only differ by the presence of a trailing slash, pattern "
-"<span class=\"bold\">with</span> a trailing slash is considered <span "
-"class=\"bold\">more specific</span>."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:100
-msgid "doc.url_patterns.html.path_literal_trailing_asterisks"
-msgstr ""
-"Additionally, any path with literal trailing asterisks is matched by "
-"itself, even if such pattern would otherwise be treated as wildcard (e.g."
-" <code>/gobacktoxul/**</code> matches <code>/gobacktoxul/**</code>). This"
-" is likely to change in the future and would best not be relied upon. "
-"Appending three additional asterisks to path pattern to represent literal"
-" asterisks is being considered."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:105
-msgid "doc.url_patterns.h_small.protocol_wildcards"
-msgstr "URL scheme wildcard"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:108
-msgid "doc.url_patterns.html.protocol_wildcards"
-msgstr ""
-"<code>http://</code> and <code>https://</code> shemes in the URL are "
-"matched exactly. However, starting with Haketilo 3.0, it is also possible"
-" for scheme pseudo-wildcard of <code>http*://</code> to be used. Use of "
-"URL pattern with this scheme is equivalent to the use of 2 separate "
-"patterns starting with <code>http://</code> and <code>https://</code>, "
-"respectively. For example, pattern <code>http*://example.com</code> shall"
-" match both <code>https://example.com</code> and "
-"<code>http://example.com</code>."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:112
-msgid "doc.url_patterns.html.protocol_wildcards_are_aliases"
-msgstr ""
-"<code>http*://</code> may be considered not to be a true wildcard but "
-"rather an alias for either of the other 2 values. As of Haketilo 3.0, the"
-" speicificity of a URL pattern starting with <code>http*://</code> is "
-"considered to be the same as that of the corresponding URL pattern "
-"starting with <code>http://</code> or <code>https://</code>. In case of a"
-" conflict, the order of precedence of such patterns is unspecified. This "
-"behavior is likely to change in the future versions of Haketilo."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:117
-msgid "doc.url_patterns.h_small.wildcard_priorities"
-msgstr "Wildcard pattern priorities and querying"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:120
-msgid "doc.url_patterns.priorities_intro"
-msgstr ""
-"In case multiple patterns match some URL, the more specific one is "
-"preferred. Specificity is considered as follows"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:125
-msgid "doc.url_patterns.priorities_rule_path_ending"
-msgstr ""
-"If patterns only differ in the final path segment, the one with least "
-"wildcard asterisks in that segment if preferred."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:128
-msgid "doc.url_patterns.priorities_rule_path_length"
-msgstr ""
-"If patterns, besides the above, only differ in path length, one with "
-"longer path is preferred. Neither final wildcard segment nor trailing "
-"dashes account for path length."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:131
-msgid "doc.url_patterns.priorities_rule_domain_beginning"
-msgstr ""
-"If patterns, besides the above, only differ in the initial domain "
-"segment, one with least wildcard asterisks in that segment is preferred."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:134
-#, fuzzy
-msgid "doc.url_patterns.priorities_rule_domain_length"
-msgstr ""
-"If patterns differ in domain length, one with longer domain is preferred."
-" Initial wildcard segment does not account for domain length."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:139
-msgid "doc.url_patterns.html.priorities_example1_intro"
-msgstr ""
-"As an example, consider the URL "
-"<code>http://settings.query.example.com/google/tries/destroy/adblockers//</code>."
-" Patterns matching it are, in the following order"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:266
-msgid "doc.url_patterns.html.priorities_example1_note"
-msgstr ""
-"Variants of those patterns starting with <code>http*://</code> would of "
-"course match as well. They have been omitted for simplicity."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:270
-msgid "doc.url_patterns.html.priorities_example2_intro"
-msgstr ""
-"For a simpler URL like <code>https://example.com</code> the patterns "
-"would be"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:281
-msgid "doc.url_patterns.html.priorities_example2_note"
-msgstr ""
-"Variants of those patterns with a trailing dash added would <span "
-"class=\"bold\">not</span> match the URL. Also, the pattern variants "
-"starting with <code>http*://</code> have been once again omitted."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:286
-msgid "doc.url_patterns.h_small.limits"
-msgstr "Limits"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:289
-msgid "doc.url_patterns.limits"
-msgstr ""
-"In order to prevent some easy-to-conduct DoS attacks, older versions of "
-"Haketilo and Hydrilla limited the lengths of domain and path parts of "
-"processed URLs. This is no longer the case."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:294
-msgid "doc.url_patterns.h_medium.alt_solution"
-msgstr "Alternative solution idea: mimicking web server mechanics"
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:297
-msgid "doc.url_patterns.url_pattern_drawbacks"
-msgstr ""
-"While wildcard patterns as presented give a lot of flexibility, they are "
-"not the only viable approach to specifying what URLs to apply "
-"rules/payloads to. In fact, wildcards are different from how the server "
-"side of a typical website decides what to return for a given URL request."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:301
-msgid "doc.url_patterns.server_behavior_mimicking_idea"
-msgstr ""
-"In a typical scenario, an HTTP server like Apache reads configuration "
-"files provided by its administrator and uses various (virtual host, "
-"redirect, request rewrite, CGI, etc.) instructions to decide how to "
-"handle given URL. Perhps using a scheme that mimics the configuration "
-"options typically used with web servers would give more efficiency in "
-"specifying what page settings to apply when."
-
-#: src/hydrilla/proxy/self_doc/url_patterns.html.jinja:305
-msgid "doc.url_patterns.approach_may_be_considered"
-msgstr "This approach may be considered in the future."
-
#: src/hydrilla/proxy/state_impl/concrete_state.py:111
msgid "err.proxy.unknown_db_schema"
msgstr ""
diff --git a/src/hydrilla/proxy/self_doc/packages.html.jinja b/src/hydrilla/proxy/self_doc/packages.html.jinja
new file mode 100644
index 0000000..a9bedc5
--- /dev/null
+++ b/src/hydrilla/proxy/self_doc/packages.html.jinja
@@ -0,0 +1,41 @@
+{#
+SPDX-License-Identifier: GPL-3.0-or-later OR CC-BY-SA-4.0
+
+Documentation page describing the concept of packages in Haketilo.
+
+This file is part of Hydrilla&Haketilo.
+
+Copyright (C) 2022 Wojtek Kosior
+
+Dual licensed under
+* GNU General Public License v3.0 or later and
+* Creative Commons Attribution Share Alike 4.0 International.
+
+You can choose to use either of these licenses or both.
+
+
+I, Wojtek Kosior, thereby promise not to sue for violation of this
+file's licenses. Although I request that you do not make use of this
+code in a proprietary work, I am not going to enforce this in court.
+#}
+{% extends "doc_base.html.jinja" %}
+
+{% block title %} Packages {% endblock %}
+
+{% block main %}
+ {{ big_heading('Packages in Haketilo') }}
+
+ {% call section() %}
+ {% call paragraph() %}
+ blah blah
+ {% endcall %}
+ {% endcall %}
+
+ {% call section() %}
+ {{ medium_heading('blah blah') }}
+
+ {% call paragraph() %}
+ more blah blah...
+ {% endcall %}
+ {% endcall %}
+{% endblock main %}
diff --git a/src/hydrilla/proxy/self_doc/policy_selection.html.jinja b/src/hydrilla/proxy/self_doc/policy_selection.html.jinja
index 4d9b251..687d2bd 100644
--- a/src/hydrilla/proxy/self_doc/policy_selection.html.jinja
+++ b/src/hydrilla/proxy/self_doc/policy_selection.html.jinja
@@ -20,71 +20,90 @@ code in a proprietary work, I am not going to enforce this in court.
#}
{% extends "doc_base.html.jinja" %}
-{% block title %}{{ _('doc.policy_selection.title') }}{% endblock %}
+{% block title %} Policy selection {% endblock %}
{% block main %}
- {{ big_heading(_('doc.policy_selection.h_big')) }}
+ {{ big_heading('Page policy selection') }}
{% call section() %}
{% call paragraph() %}
- {{ _('doc.policy_selection.intro') }}
+ When a web page is opened, Haketilo is capable of either
{% call unordered_list() %}
{% call list_entry() %}
- {{ _('doc.policy_selection.enabled_payload_case') }}
+ blocking page's own scripts and
+ {{ doc_page_link('injecting payload', 'packages') }}
+ configured by the user,
{% endcall %}
{% call list_entry() %}
- {{ _('doc.policy_selection.auto_payload_case') }}
+ blocking page's own scripts and injecting an automatically-chosen
+ payload that is usable with the page,
{% endcall %}
{% call list_entry() %}
- {{ _('doc.policy_selection.ask_payload_case') }}
+ presenting a dialog asking whether to enable an automatically-chosen
+ payload that is usable with the page,
{% endcall %}
{% call list_entry() %}
- {% set fmt = _('doc.policy_selection.block_js_case_{blocking_link}') %}
- {% set link_text = _('doc.policy_selection.html.block_js_case.blocking_link_text') %}
- {% set link = doc_page_link(link_text|e, 'script_blocking') %}
- {{ fmt.format(blocking_link=link)|safe }}
+ {{ doc_page_link('blocking', 'script_blocking') }} page's own scripts
+ or
{% endcall %}
{% call list_entry() %}
- {{ _('doc.policy_selection.allow_js_case') }}
+ allowing page's own scripts to execute normally (i.e. not modifying
+ the page in any meaningful way).
{% endcall %}
{% endcall %}
{% endcall %}
{% endcall %}
{% call section() %}
- {{ medium_heading(_('doc.policy_selection.h_medium.precedence')) }}
+ {{ medium_heading('Policy precedence') }}
{% call paragraph() %}
- {% set fmt = _('doc.policy_selection.html.precedence_general_{patterns_link}') %}
- {% set link_text = _('doc.policy_selection.precedence_general.patterns_link_text') %}
- {% set link = doc_page_link(link_text|e, 'url_patterns') %}
- {{ fmt.format(patterns_link=link)|safe }}
+ User configures Haketilo's behavior by defining script-blocking and
+ -allowing rules and by adding and enabling packages. Each rule and each
+ package payload has a {{ doc_page_link('URL pattern', 'url_patterns') }}.
+ This pattern determines which pages the policy is compatible with.
+ Patterns also have well-defined specificity. When multiple rules and
+ packages are combatible with given page's URL, the one with the most
+ specific pattern "wins". In case of a tie, payload injection is assumed to
+ take precedence over rule application.
{% endcall %}
{% call paragraph() %}
- {% set fmt = _('doc.policy_selection.html.precedence_nonenabled_{settings_link}') %}
- {% set link_text = _('doc.policy_selection.precedence_nonenabled.settings_link_text') %}
- {% set link = hkt_link(link_text|e, 'home.home') %}
- {{ fmt.format(settings_link=link)|safe }}
+ In the absence of suitable rules and enabled packages, Haketilo may
+ consider non-enabled packages that are suitable for use on the
+ currently-visited site. It will either inject package payload
+ automatically, ask the user whether to enable the package or ignore it
+ completely. The user can switch between these 3 behaviors on the Haketilo
+ {{ hkt_link('settings page', 'home.home') }}. Packages that were
+ explicitly marked as disabled will always be ignored. Pattern specificity
+ is also taken into account in case of multiple packages.
{% endcall %}
{% call paragraph() %}
- {% set fmt = _('doc.policy_selection.html.precedence_fallback_{settings_link}') %}
- {% set link_text = _('doc.policy_selection.precedence_fallback.settings_link_text') %}
- {% set link = hkt_link(link_text|e, 'home.home') %}
- {{ fmt.format(settings_link=link)|safe }}
+ When absolutely no explicit policy appears suitable for given page,
+ Haketilo will apply its default script handling behavrior. Whether
+ JavaScript is blocked or allowed by default is also determined by user's
+ choice on the {{ hkt_link('settings page', 'home.home') }}.
{% endcall %}
{% endcall %}
{% call section() %}
- {{ medium_heading(_('doc.policy_selection.special_cases.h_medium')) }}
+ {{ medium_heading('Special cases') }}
{% call paragraph() %}
- {{ _('doc.policy_selection.special_cases.html.exepmt_and_error')|safe }}
+ The sites served by Haketilo itself are exempt from all policies. These
+ are <code>http://hkt.mitm.it</code>, <code>https://hkt.mitm.it</code>
+ and <code>http://mitm.it</code>. Additionally, if Haketilo experiences an
+ internal error (e.g. because it could not parse current URL as sent in by
+ the browser), it will try to block page's JavaScript as a security
+ measure.
{% endcall %}
{% call paragraph() %}
- {{ _('doc.policy_selection.special_cases.internal_policies') }}
+ Internally, Haketilo also has a special high-priority policy for serving
+ files used by payloads and for making its APIs accessible to payload
+ scripts. This is, however, an implementation detail and casual users need
+ not care about it nor understand these nuances.
{% endcall %}
{% endcall %}
{% endblock main %}
diff --git a/src/hydrilla/proxy/self_doc/popup.html.jinja b/src/hydrilla/proxy/self_doc/popup.html.jinja
index f1a31e9..a5ad909 100644
--- a/src/hydrilla/proxy/self_doc/popup.html.jinja
+++ b/src/hydrilla/proxy/self_doc/popup.html.jinja
@@ -20,111 +20,138 @@ code in a proprietary work, I am not going to enforce this in court.
#}
{% extends "doc_base.html.jinja" %}
-{% block title %}{{ _('doc.popup.title') }}{% endblock %}
+{% block title %} Popup {% endblock %}
{% block main %}
- {{ big_heading(_('doc.popup.h_big')) }}
+ {{ big_heading('Haketilo popup') }}
{% call section() %}
{% call paragraph() %}
- {{ _('doc.popup.intro') }}
+ Taking inspiration from user interface features of browser extensions,
+ Haketilo also offers a popup window for quick interaction with the
+ user. For technical reasons, the popup is presented as part of the web
+ page and behaves slightly differently from those some users might have
+ found in similar tools.
{% endcall %}
{% endcall %}
{% call section() %}
- {{ medium_heading(_('doc.popup.h_medium.operating')) }}
+ {{ medium_heading('Operating') }}
{% call paragraph() %}
- {% set fmt = _('doc.popup.operating.html.opening_{blocking_link}_{packages_link}') %}
- {% set blocking_link_text = _('doc.popup.operating.opening.blocking_link_text') %}
- {% set blocking_link = doc_page_link(blocking_link_text|e, 'script_blocking') %}
- {% set packages_link_text = _('doc.popup.operating.opening.packages_link_text') %}
- {% set packages_link = doc_page_link(packages_link_text|e, 'packages') %}
- {{
- fmt.format(
- blocking_link = blocking_link,
- packages_link = packages_link
- )|safe
- }}
+ The popup dialog can be opened by typing big letters "HKT" anywhere on the
+ page. It then presents some basic information about the handling of
+ current URL. It also allows the user quickly define new
+ {{ doc_page_link('rules', 'script_blocking') }} or
+ {{ doc_page_link('payloads', 'packages') }} for it. As of Haketilo 3.0,
+ however, the actual configuration is not performed from the popup itself
+ but rather a relevant Haketilo rule/payload definition page is opened in a
+ new tab.
{% endcall %}
{% call paragraph() %}
- {{ _('doc.popup.operating.html.closing')|safe }}
+ The dialog can be closed by clicking anywhere on the darker area around
+ it. It can then be reopened by typing "HKT" again.
{% endcall %}
{% endcall %}
{% call section() %}
- {{ medium_heading(_('doc.popup.h_medium.enabling')) }}
+ {{ medium_heading('Enabling/disabling') }}
{% call paragraph() %}
- {{ _('doc.popup.enabling.html.intro')|safe }}
+ Popup is unavailable by default on Haketilo special sites including
+ <code>https://hkt.mitm.it</code>. It can also be disabled independently on
{% endcall %}
{% call unordered_list() %}
{% call list_entry() %}
- {{ _('doc.popup.enabling.js_allowed_case') }}
+ pages with JS allowed,
{% endcall %}
{% call list_entry() %}
- {{ _('doc.popup.enabling.js_blocked_case') }}
+ pages with JS blocked and
{% endcall %}
{% call list_entry() %}
- {{ _('doc.popup.enabling.payload_case') }}
+ pages with script payload injected.
{% endcall %}
{% endcall %}
{% call paragraph() %}
- {% set fmt = _('doc.popup.enabling.html.rest_{settings_link}') %}
- {% set link_text = _('doc.popup.enabling.html.rest.settings_link_text') %}
- {% set link = hkt_link(link_text|e, 'home.home') %}
- {{ fmt.format(settings_link=link)|safe }}
+ This can be configured on the {{ hkt_link('setings page', 'home.home') }}
+ and might be useful to users who are careful about fingerprinting.
{% endcall %}
{% endcall %}
{% call section() %}
- {{ medium_heading(_('doc.popup.h_medium.fingerprinting')) }}
+ {{ medium_heading('Fingerprinting considerations') }}
{% call paragraph() %}
- {{ _('doc.popup.fingerprinting_intro') }}
+ To make the popup available, Haketilo has to inject an additional script
+ to all pages. That makes it easy for pages to determine with certainty
+ that given user is running Haketilo. This has implications for privacy and
+ may also be used by a hostile site to selectively cause annoyance to
+ Haketilo users.
{% endcall %}
{% call paragraph() %}
- {{ _('doc.popup.fingerprinting_more') }}
+ The above problems would be present regardless on pages with
+ Haketilo-injected payloads. I.e. in many cases a site could theoretically
+ find out the user is not accessing it in a normal way. However, the popup
+ also increases fingerprintability when no payload is in use and especially
+ on pages with JavaScript allowed. For this reason, the presence of popup
+ on pages has been made configurable.
{% endcall %}
{% call paragraph() %}
- {{ _('doc.popup.fingerprinting_more_more') }}
+ It is also worth noting that as of version 3.0 Haketilo does not make
+ guarantees about the browser fingerprint. Despite best efforts, there are
+ still other aspects that might make a Haketilo user distinguishable to a
+ website even when popup is disabled.
{% endcall %}
{% endcall %}
{% call section() %}
- {{ medium_heading(_('doc.popup.h_medium.other_caveats')) }}
+ {{ medium_heading('Other caveats') }}
{% call paragraph() %}
- {{ _('doc.popup.other_caveats.intro') }}
+ Some other potential issues related to the popup are described below.
{% endcall %}
{% endcall %}
{% call section() %}
- {{ small_heading(_('doc.popup.h_small.site_interference')) }}
+ {{ small_heading('Interference with the site') }}
{% call paragraph() %}
- {{ _('doc.popup.site_interference.text') }}
+ The popup gets injected by Haketilo into the actual web page. Although
+ care was taken to make accidental breakage unlikely, it might still happen
+ under some specific conditions.
{% endcall %}
{% endcall %}
{% call section() %}
- {{ small_heading(_('doc.popup.h_small.content_blockers_interference')) }}
+ {{ small_heading('Interference with other script-blocking tools') }}
{% call paragraph() %}
- {{ _('doc.popup.content_blockers_interference.text') }}
+ The popup is driven by a piece of JavaScript code injected by Haketilo to
+ pages. Haketilo by itself makes sure neither the policies specified by the
+ page nor its own script-blocking mechanisms interfere with this particular
+ piece. In spite of that, a browser extension or web browser's own settings
+ might prevent the popup script from executing, making the dialog
+ unavailable.
{% endcall %}
{% endcall %}
{% call section() %}
- {{ small_heading(_('doc.popup.h_small.url_mismatch')) }}
+ {{ small_heading('URL mismatch') }}
{% call paragraph() %}
- {{ _('doc.popup.url_mismatch.text')|safe }}
+ Sometimes a page might change parts of its address visible in browser's
+ URL bar. E.g. after opening <code>https://entraide.chatons.org/</code> in
+ the browser we might see <code>https://entraide.chatons.org/en/</code> as
+ the current address even though no reload happened. In addition, some
+ browsers hide URL's traling dash ("/") from the user. Regardless of that,
+ Haketilo's popup always presents the original URL under which the current
+ page was served. Although this the intended behavior, it might cause
+ confusion and therefore has been documented here.
{% endcall %}
{% endcall %}
{% endblock main %}
diff --git a/src/hydrilla/proxy/self_doc/script_blocking.html.jinja b/src/hydrilla/proxy/self_doc/script_blocking.html.jinja
index 63b647e..c0a5275 100644
--- a/src/hydrilla/proxy/self_doc/script_blocking.html.jinja
+++ b/src/hydrilla/proxy/self_doc/script_blocking.html.jinja
@@ -20,84 +20,106 @@ code in a proprietary work, I am not going to enforce this in court.
#}
{% extends "doc_base.html.jinja" %}
-{% block title %}{{ _('doc.script_blocking.title') }}{% endblock %}
+{% block title %} Script blocking {% endblock %}
{% block main %}
- {{ big_heading(_('doc.script_blocking.h_big')) }}
+ {{ big_heading('Script blocking in Haketilo') }}
{% call section() %}
{% call paragraph() %}
- {{ _('doc.script_blocking.intro') }}
+ Modern web browsers allow sites to execute software on users'
+ devices. This software is usually written in a language called JavaScript
+ and abbreviated as JS. It can serve various purposes - from small
+ enhancements to deployment of heavy applications inside the
+ browser. Because Haketilo aims to give users control over their web
+ browsing, one of its supported features is blocking of JavaScript
+ execution on per-page and per-site basis.
{% endcall %}
{% call paragraph() %}
- {% set fmt = _('doc.script_blocking.html.see_here_for_{packages_link}') %}
- {% set link_text = _('doc.script_blocking.see_here_for.packages_link_text') %}
- {% set link = doc_page_link(link_text|e, 'packages') %}
- {{ fmt.format(packages_link=link)|safe }}
+ Besides the casual script-blocking discussed here, Haketilo also blocks
+ page's JavaScript when injecting the user-specified
+ {{ doc_page_link('script payloads', 'packages') }}. That functionality is
+ described on its own documentation page.
{% endcall %}
{% endcall %}
{% call section() %}
- {{ medium_heading(_('doc.script_blocking.h_medium.configuring')) }}
+ {{ medium_heading('Configuring script blocking') }}
{% call paragraph() %}
- {% set fmt = _('doc.script_blocking.configuring.html.rules_{rules_link}_{patterns_link}_{policy_link}') %}
- {% set rules_link_text = _('doc.script_blocking.configuring.rules.rules_link_text') %}
- {% set rules_link = hkt_link(rules_link_text|e, 'rules.rules') %}
- {% set patterns_link_text = _('doc.script_blocking.configuring.rules.patterns_link_text') %}
- {% set patterns_link = doc_page_link(patterns_link_text|e, 'url_patterns') %}
- {% set policy_link_text = _('doc.script_blocking.configuring.rules.policy_link_text') %}
- {% set policy_link = doc_page_link(policy_link_text|e, 'policy_selection') %}
+ User can
{{
- fmt.format(
- rules_link = rules_link,
- patterns_link = patterns_link,
- policy_link = policy_link
- )|safe
+ hkt_link('define script-blocking and -allowing rules', 'rules.rules')
}}
+ using {{ doc_page_link('URL patterns', 'url_patterns') }}. Each such rule
+ tells Haketilo to either block or allow scripts on pages matched by its
+ pattern. Rules with more specific patterns can override those with less
+ specific ones as described on the
+ {{ doc_page_link('policy selection page', 'policy_selection') }}.
{% endcall %}
{% call paragraph() %}
- {{ _('doc.script_blocking.configuring.html.rules_example')|safe }}
+ As an example, if we want all scripts on english Wikipedia pages to be
+ blocked, we can add a blocking rule with
+ pattern <code>https://en.wikipedia.org/***</code>. If we then wanted to
+ make an exception just for the "List of emoticons" page, we could create
+ an additional allowing rule with
+ <code>https://en.wikipedia.org/wiki/List_of_emoticons</code> as its
+ pattern. It would take effect on that page while all the other english
+ Wikipedia pages would still have their scripts blocked.
{% endcall %}
{% call paragraph() %}
- {% set fmt = _('doc.script_blocking.configuring.html.fallback_{settings_link}') %}
- {% set link_text = _('doc.script_blocking.configuring.html.fallback.settings_link_text') %}
- {% set link = hkt_link(link_text|e, 'home.home') %}
- {{ fmt.format(settings_link=link)|safe }}
+ It is also possible to configure whether scripts should be blocked by
+ dafault on pages where no explicit rule and no payload is used. The
+ relevant option can be found on Haketilo
+ {{ hkt_link('settings page', 'home.home') }}.
{% endcall %}
{% endcall %}
{% call section() %}
- {{ medium_heading(_('doc.script_blocking.medium_h.with_other_tools')) }}
+ {{ medium_heading('Use with other script-blocking tools') }}
{% call paragraph() %}
- {{ _('doc.script_blocking.with_other_tools.haketilo_independently') }}
+ Various browsers and browser extension can also be configured to block
+ JavaScript. Haketilo works independently of those tools. If the user
+ desires to have scripts on certain page to execute normally, both Haketilo
+ and other tools must be configured to allow that.
{% endcall %}
{% call paragraph() %}
- {% set fmt = _('doc.script_blocking.with_other_tools.html.breakages_{popup_link}') %}
- {% set link_text = _('doc.script_blocking.with_other_tools.breakages.popup_link_text') %}
- {% set link = doc_page_link(link_text|e, 'popup') %}
- {{ fmt.format(popup_link=link)|safe }}
+ Unlike most similar tools, Haketilo operates outside the web browser. As a
+ result, it is relatively unlikely for Haketilo to cause these to
+ malfunction. At the same time, it is relatively easy to have another
+ script blocker break some Haketilo functionality (e.g. its
+ {{ doc_page_link('popup', 'popup') }}).
{% endcall %}
{% endcall %}
{% call section() %}
- {{ medium_heading(_('doc.script_blocking.medium_h.technical')) }}
+ {{ medium_heading('Technical details') }}
{% call paragraph() %}
- {{ _('doc.script_blocking.technical.general') }}
+ From technical point of view, Haketilo, as of version 3.0, blocks
+ JavaScript by altering the Content-Security-Policy (abbreviated CSP)
+ headers in HTTP responses. The original CSP directives sent by site are
+ retained, with exception of those which would result in CSP violation
+ reports being sent. Haketilo's own script-blocking directives are then
+ added to produce the final CSP which user's web browser eventually sees.
{% endcall %}
{% call paragraph() %}
- {{ _('doc.script_blocking.technical.means_no_reports') }}
+ The above means that neither the scripts that would be blocked by page's
+ own rules nor those that are blocked by Haketilo are going to cause CSP
+ reports to be sent.
{% endcall %}
{% call paragraph() %}
- {{ _('doc.script_blocking.technical.popup_script') }}
+ In addition, even when a page has JavaScript nominally blocked, Haketilo
+ 3.0 may nevertheless inject into it its own script responsible for making
+ the popup available. The CSP is then modified appropriately to allow only
+ that script to run.
{% endcall %}
{% endcall %}
{% endblock main %}
diff --git a/src/hydrilla/proxy/self_doc/url_patterns.html.jinja b/src/hydrilla/proxy/self_doc/url_patterns.html.jinja
index 7d2718f..f3415c5 100644
--- a/src/hydrilla/proxy/self_doc/url_patterns.html.jinja
+++ b/src/hydrilla/proxy/self_doc/url_patterns.html.jinja
@@ -20,123 +20,210 @@ code in a proprietary work, I am not going to enforce this in court.
#}
{% extends "doc_base.html.jinja" %}
-{% block title %}{{ _('doc.url_patterns.title') }}{% endblock %}
+{% block title %} URL patterns {% endblock %}
{% block main %}
- {{ big_heading(_('doc.url_patterns.h_big')) }}
+ {{ big_heading('Haketio URL patterns') }}
{% call section() %}
{% call paragraph() %}
- {{ _('doc.url_patterns.html.intro')|safe }}
+ We want to be able to apply different rules and custom scripts for
+ different websites. However, merely specifying "do this for all documents
+ under <code>https://example.com</code>" is not enough. Single site's pages
+ might differ strongly and require different custom scripts to be
+ loaded. Always matching against a full URL like
+ <code>https://example.com/something/somethingelse</code> is also not
+ a good option. It doesn't allow us to properly handle a site that serves
+ similar pages for multiple values substituted for
+ <code>somethingelse</code>.
{% endcall %}
{% endcall %}
{% call section() %}
- {{ medium_heading(_('doc.url_patterns.h_medium.employed_solution')) }}
+ {{ medium_heading('Employed solution') }}
{% call paragraph() %}
- {{ _('doc.url_patterns.html.wildcards_intro')|safe }}
+ Wildcards are being used to address the problem. Each payload and rule in
+ Haketilo has a URL pattern that specifies to which internet pages it
+ applies. A URL pattern can be as as simple as literal URL in which case it
+ only matches itself. It can also contain wildcards in the form of one or
+ more asterisks (<code>*</code>) that correspond to multiple possible
+ strings occurring in that place.
{% endcall %}
{% call paragraph() %}
- {{ _('doc.url_patterns.html.wildcards_types_introduced')|safe }}
+ Wildcards can appear in URL's domain and path that follows it. These 2
+ types of wildcards are handled separately.
{% endcall %}
{% endcall %}
{% call section() %}
- {{ small_heading(_('doc.url_patterns.h_small.domain_wildcards')) }}
+ {{ small_heading('Domain wildcards') }}
{% call paragraph() %}
- {{ _('doc.url_patterns.html.domain_wildcards_intro')|safe }}
+ A domain wildcard takes the form of one, two or three asterisks occurring
+ in place of a single domain name segment at the beginning
+ (left). Depending on the number of asterisks, the meaning is as follows
{% endcall %}
{% call unordered_list() %}
{% call list_entry() %}
- {{ _('doc.url_patterns.html.domain_no_asterisks_example')|safe }}
+ no asterisks (e.g. <code>example.com</code>) - match domain name exactly
+ (e.g. <code>example.com</code>)
{% endcall %}
{% call list_entry() %}
- {{ _('doc.url_patterns.html.domain_one_asterisk_example')|safe }}
+ one asterisk (e.g. <code>*.example.com</code>) - match all domains
+ resulting from substituting <code>*</code> with a
+ <span class="bold">single</span> segment (e.g.
+ <code>banana.example.com</code> or <code>pineapple.example.com</code>
+ but <span class="bold">not</span> <code>pineapple.pen.example.com</code>
+ nor <code>example.com</code>)
{% endcall %}
{% call list_entry() %}
- {{ _('doc.url_patterns.html.domain_two_asterisks_example')|safe }}
+ two asterisks (e.g. <code>**.example.com</code>) - match all domains
+ resulting from substituting <code>**</code> with
+ <span class="bold">two or more</span> segments (e.g.
+ <code>monad.breakfast.example.com</code> or
+ <code>pure.monad.breakfast.example.com</code> but
+ <span class="bold">not</span> <code>cabalhell.example.com</code> nor
+ <code>example.com</code>)
{% endcall %}
{% call list_entry() %}
- {{ _('doc.url_patterns.html.domain_three_asterisks_example')|safe }}
+ three asterisks (e.g. <code>***.example.com</code>) - match all domains
+ resulting from substituting <code>***</code> with
+ <span class="bold">zero or more</span> segments (e.g.
+ <code>hello.parkmeter.example.com</code> or
+ <code>iliketrains.example.com</code> or <code>example.com</code>)
{% endcall %}
{% endcall %}
{% endcall %}
{% call section() %}
- {{ small_heading(_('doc.url_patterns.h_small.path_wildcards')) }}
+ {{ small_heading('Path wildcards') }}
{% call paragraph() %}
- {{ _('doc.url_patterns.html.path_wildcards_intro')|safe }}
+ A path wildcard takes the form of one, two or three asterisks occurring in
+ place of a single path segment at the end of path (right). Depending on
+ the number of asterisks, the meaning is as follows
{% endcall %}
{% call unordered_list() %}
{% call list_entry() %}
- {{ _('doc.url_patterns.html.path_no_asterisks_example')|safe }}
+ no asterisks (e.g. <code>/joke/clowns</code>) - match path exactly (e.g.
+ <code>/joke/clowns</code>)
{% endcall %}
{% call list_entry() %}
- {{ _('doc.url_patterns.html.path_one_asterisk_example')|safe }}
+ one asterisk (e.g. <code>/itscalled/*</code>) - match all paths
+ resulting from substituting <code>*</code> with a
+ <span class="bold">single</span> segment (e.g.
+ <code>/itscalled/gnulinux</code> or <code>/itscalled/glamp</code> but
+ <span class="bold">not</span> <code>/itscalled/</code> nor
+ <code>/itscalled/gnu/linux</code>)
{% endcall %}
{% call list_entry() %}
- {{ _('doc.url_patterns.html.path_two_asterisks_example')|safe }}
+ two asterisks (e.g. <code>/another/**</code>) - match all paths
+ resulting from substituting <code>**</code> with
+ <span class="bold">two or more</span> segments (e.g.
+ <code>/another/nsa/backdoor</code> or
+ <code>/another/best/programming/language</code> but
+ <span class="bold">not</span> <code>/another/apibreak</code> nor
+ <code>/another</code>)
{% endcall %}
{% call list_entry() %}
- {{ _('doc.url_patterns.html.path_three_asterisks_example')|safe }}
+ three asterisks (e.g. <code>/mail/dmarc/***</code>) - match all paths
+ resulting from substituting <code>***</code> with
+ <span class="bold">zero or more</span> segments (e.g.
+ <code>/mail/dmarc/spf</code>, <code>/mail/dmarc</code> or
+ <code>/mail/dmarc/dkim/failure</code> but
+ <span class="bold">not</span> <code>/mail/</code>)
{% endcall %}
{% endcall %}
{% call paragraph() %}
- {{ _('doc.url_patterns.html.path_trailing_slash')|safe }}
+ If pattern ends <span class="bold">without</span> a trailing slash, it
+ mathes paths with any number of trailing slashes, including zero. If
+ pattern ends <span class="bold">with</span> a trailing slash, it only
+ mathes paths with one or more trailing slashes. For example,
+ <code>/itscalled/*</code> matches <code>/itscalled/gnulinux</code>,
+ <code>/itscalled/gnulinux/</code> and <code>/itscalled/gnulinux//</code>
+ while <code>/itscalled/*/</code> only matches
+ <code>/itscalled/gnulinux/</code> and <code>/itscalled/gnulinux//</code>
+ out of those three.
{% endcall %}
{% call paragraph() %}
- {{ _('doc.url_patterns.html.path_trailing_slash_priority')|safe }}
+ If two patterns only differ by the presence of a trailing slash,
+ pattern <span class="bold">with</span> a trailing slash is considered
+ <span class="bold">more specific</span>.
{% endcall %}
{% call paragraph() %}
- {{ _('doc.url_patterns.html.path_literal_trailing_asterisks')|safe }}
+ Additionally, any path with literal trailing asterisks is matched by
+ itself, even if such pattern would otherwise be treated as wildcard
+ (e.g. <code>/gobacktoxul/**</code> matches <code>/gobacktoxul/**</code>).
+ This is likely to change in the future and would best not be relied upon.
+ Appending three additional asterisks to path pattern to represent literal
+ asterisks is being considered.
{% endcall %}
{% endcall %}
{% call section() %}
- {{ small_heading(_('doc.url_patterns.h_small.protocol_wildcards')) }}
+ {{ small_heading('URL scheme wildcard') }}
{% call paragraph() %}
- {{ _('doc.url_patterns.html.protocol_wildcards')|safe }}
+ <code>http://</code> and <code>https://</code> shemes in the URL are
+ matched exactly. However, starting with Haketilo 3.0, it is also possible
+ for scheme pseudo-wildcard of <code>http*://</code> to be used. Use of URL
+ pattern with this scheme is equivalent to the use of 2 separate patterns
+ starting with <code>http://</code> and <code>https://</code>,
+ respectively. For example, pattern <code>http*://example.com</code> shall
+ match both <code>https://example.com</code> and
+ <code>http://example.com</code>.
{% endcall %}
{% call paragraph() %}
- {{ _('doc.url_patterns.html.protocol_wildcards_are_aliases')|safe }}
+ <code>http*://</code> may be considered not to be a true wildcard but
+ rather an alias for either of the other 2 values. As of Haketilo 3.0, the
+ speicificity of a URL pattern starting with <code>http*://</code> is
+ considered to be the same as that of the corresponding URL pattern
+ starting with <code>http://</code> or <code>https://</code>. In case of a
+ conflict, the order of precedence of such patterns is unspecified. This
+ behavior is likely to change in the future versions of Haketilo.
{% endcall %}
{% endcall %}
{% call section() %}
- {{ small_heading(_('doc.url_patterns.h_small.wildcard_priorities')) }}
+ {{ small_heading('Wildcard pattern priorities and querying') }}
{% call paragraph() %}
- {{ _('doc.url_patterns.priorities_intro') }}
+ In case multiple patterns match some URL, the more specific one is
+ preferred. Specificity is considered as follows
{% endcall %}
{% call unordered_list() %}
{% call list_entry() %}
- {{ _('doc.url_patterns.priorities_rule_path_ending')|safe }}
+ If patterns only differ in the final path segment, the one with least
+ wildcard asterisks in that segment if preferred.
{% endcall %}
{% call list_entry() %}
- {{ _('doc.url_patterns.priorities_rule_path_length')|safe }}
+ If patterns, besides the above, only differ in path length, one with
+ longer path is preferred. Neither final wildcard segment nor trailing
+ dashes account for path length.
{% endcall %}
{% call list_entry() %}
- {{ _('doc.url_patterns.priorities_rule_domain_beginning')|safe }}
+ If patterns, besides the above, only differ in the initial domain
+ segment, one with least wildcard asterisks in that segment is preferred.
{% endcall %}
{% call list_entry() %}
- {{ _('doc.url_patterns.priorities_rule_domain_length')|safe }}
+ If patterns differ in domain length, one with longer domain is
+ preferred. Initial wildcard segment does not account for domain length.
{% endcall %}
{% endcall %}
{% call paragraph() %}
- {{ _('doc.url_patterns.html.priorities_example1_intro')|safe }}
+ As an example, consider the URL
+ <code>http://settings.query.example.com/google/tries/destroy/adblockers//</code>.
+ Patterns matching it are, in the following order
{% endcall %}
{% call verbatim() %}
@@ -263,11 +350,13 @@ http://***.example.com/***
{% endcall %}
{% call paragraph() %}
- {{ _('doc.url_patterns.html.priorities_example1_note')|safe }}
+ Variants of those patterns starting with <code>http*://</code> would of
+ course match as well. They have been omitted for simplicity.
{% endcall %}
{% call paragraph() %}
- {{ _('doc.url_patterns.html.priorities_example2_intro')|safe }}
+ For a simpler URL like <code>https://example.com</code> the patterns would
+ be
{% endcall %}
{% call verbatim() %}
@@ -278,31 +367,43 @@ https://***.example.com/***
{% endcall %}
{% call paragraph() %}
- {{ _('doc.url_patterns.html.priorities_example2_note')|safe }}
+ Variants of those patterns with a trailing dash added
+ would <span class="bold">not</span> match the URL. Also, the pattern
+ variants starting with <code>http*://</code> have been once again omitted.
{% endcall %}
{% endcall %}
{% call section() %}
- {{ small_heading(_('doc.url_patterns.h_small.limits')) }}
+ {{ small_heading('Limits') }}
{% call paragraph() %}
- {{ _('doc.url_patterns.limits')|safe }}
+ In order to prevent some easy-to-conduct DoS attacks, older versions of
+ Haketilo and Hydrilla limited the lengths of domain and path parts of
+ processed URLs. This is no longer the case.
{% endcall %}
{% endcall %}
{% call section() %}
- {{ medium_heading(_('doc.url_patterns.h_medium.alt_solution')) }}
+ {{ medium_heading('Alternative solution idea: mimicking web server mechanics') }}
{% call paragraph() %}
- {{ _('doc.url_patterns.url_pattern_drawbacks') }}
+ While wildcard patterns as presented give a lot of flexibility, they are
+ not the only viable approach to specifying what URLs to apply
+ rules/payloads to. In fact, wildcards are different from how the server
+ side of a typical website decides what to return for a given URL request.
{% endcall %}
{% call paragraph() %}
- {{ _('doc.url_patterns.server_behavior_mimicking_idea') }}
+ In a typical scenario, an HTTP server like Apache reads configuration
+ files provided by its administrator and uses various (virtual host,
+ redirect, request rewrite, CGI, etc.) instructions to decide how to handle
+ given URL. Perhps using a scheme that mimics the configuration options
+ typically used with web servers would give more efficiency in specifying
+ what page settings to apply when.
{% endcall %}
{% call paragraph() %}
- {{ _('doc.url_patterns.approach_may_be_considered') }}
+ This approach may be considered in the future.
{% endcall %}
{% endcall %}
{% endblock main %}
diff --git a/src/hydrilla/proxy/web_ui/root.py b/src/hydrilla/proxy/web_ui/root.py
index 917c063..4eea860 100644
--- a/src/hydrilla/proxy/web_ui/root.py
+++ b/src/hydrilla/proxy/web_ui/root.py
@@ -45,7 +45,7 @@ import jinja2
import flask
import werkzeug
-from ...translations import translation as make_translation
+from ... import translations
from ... import versions
from ... import item_infos
from ... import common_jinja_templates
@@ -188,8 +188,14 @@ def home_doc(page: str) -> str:
if page not in self_doc.page_names:
flask.abort(404)
+ locale = translations.select_best_locale()
+ if locale == translations.default_locale:
+ prefix = ''
+ else:
+ prefix = f'{locale}/'
+
return flask.render_template(
- f'{page}.html.jinja',
+ f'{prefix}{page}.html.jinja',
doc_output = 'html_hkt_mitm_it'
)
@@ -239,7 +245,8 @@ def process_request(
with app._haketilo_app_lock:
app._haketilo_state = state
- app.jinja_env.install_gettext_translations(make_translation())
+ best_translations = translations.translation()
+ app.jinja_env.install_gettext_translations(best_translations)
flask_response = app.test_client().open(
path = path,