| |
| |
| |
|
|
| |
|
|
| use std::path::{Path, PathBuf}; |
|
|
| use html5ever::{ |
| interface::QualName, |
| namespace_url, ns, |
| serialize::{HtmlSerializer, SerializeOpts, Serializer, TraversalScope}, |
| tendril::TendrilSink, |
| LocalName, |
| }; |
| pub use kuchiki::NodeRef; |
| use kuchiki::{Attribute, ExpandedName, NodeData}; |
| use serde::Serialize; |
| #[cfg(feature = "isolation")] |
| use serialize_to_javascript::DefaultTemplate; |
|
|
| #[cfg(feature = "isolation")] |
| use crate::pattern::isolation::IsolationJavascriptCodegen; |
| use crate::{ |
| assets::{SCRIPT_NONCE_TOKEN, STYLE_NONCE_TOKEN}, |
| config::{DisabledCspModificationKind, PatternKind}, |
| }; |
|
|
| |
| fn serialize_node_ref_internal<S: Serializer>( |
| node: &NodeRef, |
| serializer: &mut S, |
| traversal_scope: TraversalScope, |
| ) -> crate::Result<()> { |
| match (traversal_scope, node.data()) { |
| (ref scope, NodeData::Element(element)) => { |
| if *scope == TraversalScope::IncludeNode { |
| let attrs = element.attributes.borrow(); |
|
|
| |
| let attrs = attrs |
| .map |
| .iter() |
| .map(|(name, attr)| { |
| ( |
| QualName::new(attr.prefix.clone(), name.ns.clone(), name.local.clone()), |
| &attr.value, |
| ) |
| }) |
| .collect::<Vec<_>>(); |
|
|
| serializer.start_elem( |
| element.name.clone(), |
| attrs.iter().map(|&(ref name, value)| (name, &**value)), |
| )? |
| } |
|
|
| let children = match element.template_contents.as_ref() { |
| Some(template_root) => template_root.children(), |
| None => node.children(), |
| }; |
| for child in children { |
| serialize_node_ref_internal(&child, serializer, TraversalScope::IncludeNode)? |
| } |
|
|
| if *scope == TraversalScope::IncludeNode { |
| serializer.end_elem(element.name.clone())? |
| } |
| Ok(()) |
| } |
|
|
| (_, &NodeData::DocumentFragment) | (_, &NodeData::Document(_)) => { |
| for child in node.children() { |
| serialize_node_ref_internal(&child, serializer, TraversalScope::IncludeNode)? |
| } |
| Ok(()) |
| } |
|
|
| (TraversalScope::ChildrenOnly(_), _) => Ok(()), |
|
|
| (TraversalScope::IncludeNode, NodeData::Doctype(doctype)) => { |
| serializer.write_doctype(&doctype.name).map_err(Into::into) |
| } |
| (TraversalScope::IncludeNode, NodeData::Text(text)) => { |
| serializer.write_text(&text.borrow()).map_err(Into::into) |
| } |
| (TraversalScope::IncludeNode, NodeData::Comment(text)) => { |
| serializer.write_comment(&text.borrow()).map_err(Into::into) |
| } |
| (TraversalScope::IncludeNode, NodeData::ProcessingInstruction(contents)) => { |
| let contents = contents.borrow(); |
| serializer |
| .write_processing_instruction(&contents.0, &contents.1) |
| .map_err(Into::into) |
| } |
| } |
| } |
|
|
| |
| pub fn serialize_node(node: &NodeRef) -> Vec<u8> { |
| let mut u8_vec = Vec::new(); |
| let mut ser = HtmlSerializer::new( |
| &mut u8_vec, |
| SerializeOpts { |
| traversal_scope: TraversalScope::IncludeNode, |
| ..Default::default() |
| }, |
| ); |
| serialize_node_ref_internal(node, &mut ser, TraversalScope::IncludeNode).unwrap(); |
| u8_vec |
| } |
|
|
| |
| pub fn parse(html: String) -> NodeRef { |
| kuchiki::parse_html().one(html).document_node |
| } |
|
|
| fn with_head<F: FnOnce(&NodeRef)>(document: &NodeRef, f: F) { |
| if let Ok(ref node) = document.select_first("head") { |
| f(node.as_node()) |
| } else { |
| let node = NodeRef::new_element( |
| QualName::new(None, ns!(html), LocalName::from("head")), |
| None, |
| ); |
| f(&node); |
| document.prepend(node) |
| } |
| } |
|
|
| fn inject_nonce(document: &NodeRef, selector: &str, token: &str) { |
| if let Ok(elements) = document.select(selector) { |
| for target in elements { |
| let node = target.as_node(); |
| let element = node.as_element().unwrap(); |
|
|
| let mut attrs = element.attributes.borrow_mut(); |
| |
| if attrs.get("nonce").is_some() { |
| continue; |
| } |
| attrs.insert("nonce", token.into()); |
| } |
| } |
| } |
|
|
| |
| pub fn inject_nonce_token( |
| document: &NodeRef, |
| dangerous_disable_asset_csp_modification: &DisabledCspModificationKind, |
| ) { |
| if dangerous_disable_asset_csp_modification.can_modify("script-src") { |
| inject_nonce(document, "script[src^='http']", SCRIPT_NONCE_TOKEN); |
| } |
| if dangerous_disable_asset_csp_modification.can_modify("style-src") { |
| inject_nonce(document, "style", STYLE_NONCE_TOKEN); |
| } |
| } |
|
|
| |
| pub fn inject_csp(document: &NodeRef, csp: &str) { |
| with_head(document, |head| { |
| head.append(create_csp_meta_tag(csp)); |
| }); |
| } |
|
|
| fn create_csp_meta_tag(csp: &str) -> NodeRef { |
| NodeRef::new_element( |
| QualName::new(None, ns!(html), LocalName::from("meta")), |
| vec![ |
| ( |
| ExpandedName::new(ns!(), LocalName::from("http-equiv")), |
| Attribute { |
| prefix: None, |
| value: "Content-Security-Policy".into(), |
| }, |
| ), |
| ( |
| ExpandedName::new(ns!(), LocalName::from("content")), |
| Attribute { |
| prefix: None, |
| value: csp.into(), |
| }, |
| ), |
| ], |
| ) |
| } |
|
|
| |
| #[derive(Debug, Serialize)] |
| #[serde(rename_all = "lowercase", tag = "pattern")] |
| pub enum PatternObject { |
| |
| Brownfield, |
| |
| Isolation { |
| |
| side: IsolationSide, |
| }, |
| } |
|
|
| impl From<&PatternKind> for PatternObject { |
| fn from(pattern_kind: &PatternKind) -> Self { |
| match pattern_kind { |
| PatternKind::Brownfield => Self::Brownfield, |
| PatternKind::Isolation { .. } => Self::Isolation { |
| side: IsolationSide::default(), |
| }, |
| } |
| } |
| } |
|
|
| |
| #[derive(Debug, Serialize, Default)] |
| #[serde(rename_all = "lowercase")] |
| pub enum IsolationSide { |
| |
| #[default] |
| Original, |
| |
| Secure, |
| } |
|
|
| |
| |
| |
| #[cfg(feature = "isolation")] |
| pub fn inject_codegen_isolation_script(document: &NodeRef) { |
| with_head(document, |head| { |
| let script = NodeRef::new_element( |
| QualName::new(None, ns!(html), "script".into()), |
| vec![( |
| ExpandedName::new(ns!(), LocalName::from("nonce")), |
| Attribute { |
| prefix: None, |
| value: SCRIPT_NONCE_TOKEN.into(), |
| }, |
| )], |
| ); |
| script.append(NodeRef::new_text( |
| IsolationJavascriptCodegen {} |
| .render_default(&Default::default()) |
| .expect("unable to render codegen isolation script template") |
| .into_string(), |
| )); |
|
|
| head.prepend(script); |
| }); |
| } |
|
|
| |
| |
| |
| |
| pub fn inline_isolation(document: &NodeRef, dir: &Path) { |
| for script in document |
| .select("script[src]") |
| .expect("unable to parse document for scripts") |
| { |
| let src = { |
| let attributes = script.attributes.borrow(); |
| attributes |
| .get(LocalName::from("src")) |
| .expect("script with src attribute has no src value") |
| .to_string() |
| }; |
|
|
| let mut path = PathBuf::from(src); |
| if path.has_root() { |
| path = path |
| .strip_prefix("/") |
| .expect("Tauri \"Isolation\" Pattern only supports relative or absolute (`/`) paths.") |
| .into(); |
| } |
|
|
| let file = std::fs::read_to_string(dir.join(path)).expect("unable to find isolation file"); |
| script.as_node().append(NodeRef::new_text(file)); |
|
|
| let mut attributes = script.attributes.borrow_mut(); |
| attributes.remove(LocalName::from("src")); |
| } |
| } |
|
|
| |
| |
| |
| |
| |
| pub fn normalize_script_for_csp(input: &[u8]) -> Vec<u8> { |
| let mut output = Vec::with_capacity(input.len()); |
|
|
| let mut i = 0; |
| while i < input.len() { |
| match input[i] { |
| b'\r' => { |
| if i + 1 < input.len() && input[i + 1] == b'\n' { |
| |
| output.push(b'\n'); |
| i += 2; |
| } else { |
| |
| output.push(b'\n'); |
| i += 1; |
| } |
| } |
| _ => { |
| output.push(input[i]); |
| i += 1; |
| } |
| } |
| } |
|
|
| output |
| } |
|
|
| #[cfg(test)] |
| mod tests { |
|
|
| #[test] |
| fn csp() { |
| let htmls = vec![ |
| "<html><head></head></html>".to_string(), |
| "<html></html>".to_string(), |
| ]; |
| for html in htmls { |
| let document = super::parse(html); |
| let csp = "csp-string"; |
| super::inject_csp(&document, csp); |
| assert_eq!( |
| document.to_string(), |
| format!( |
| r#"<html><head><meta http-equiv="Content-Security-Policy" content="{csp}"></head><body></body></html>"#, |
| ) |
| ); |
| } |
| } |
|
|
| #[test] |
| fn normalize_script_for_csp() { |
| let js = "// Copyright 2019-2024 Tauri Programme within The Commons Conservancy\r// SPDX-License-Identifier: Apache-2.0\n// SPDX-License-Identifier: MIT\r\n\r\nwindow.__TAURI_ISOLATION_HOOK__ = (payload, options) => {\r\n return payload\r\n}\r\n"; |
| let expected = "// Copyright 2019-2024 Tauri Programme within The Commons Conservancy\n// SPDX-License-Identifier: Apache-2.0\n// SPDX-License-Identifier: MIT\n\nwindow.__TAURI_ISOLATION_HOOK__ = (payload, options) => {\n return payload\n}\n"; |
| assert_eq!( |
| super::normalize_script_for_csp(js.as_bytes()), |
| expected.as_bytes() |
| ) |
| } |
| } |
|
|