script/
security_manager.rs1use content_security_policy as csp;
6use headers::{ContentType, HeaderMap, HeaderMapExt};
7use net_traits::request::{
8 CredentialsMode, Destination, RequestBody, RequestId, create_request_body_with_content,
9};
10use net_traits::{FetchMetadata, NetworkError, ResourceFetchTiming};
11use servo_url::ServoUrl;
12use stylo_atoms::Atom;
13
14use crate::conversions::Convert;
15use crate::dom::bindings::inheritance::Castable;
16use crate::dom::bindings::refcounted::Trusted;
17use crate::dom::bindings::root::DomRoot;
18use crate::dom::csp::Violation;
19use crate::dom::csppolicyviolationreport::{
20 CSPReportUriViolationReport, SecurityPolicyViolationReport,
21};
22use crate::dom::event::{Event, EventBubbles, EventCancelable, EventComposed};
23use crate::dom::eventtarget::EventTarget;
24use crate::dom::performance::performanceresourcetiming::InitiatorType;
25use crate::dom::reportingobserver::ReportingObserver;
26use crate::dom::securitypolicyviolationevent::SecurityPolicyViolationEvent;
27use crate::dom::types::GlobalScope;
28use crate::fetch::{RequestWithGlobalScope, create_a_potential_cors_request};
29use crate::network_listener::{FetchResponseListener, ResourceTimingListener, submit_timing};
30use crate::script_runtime::CanGc;
31use crate::task::TaskOnce;
32
33pub(crate) struct CSPViolationReportTask {
34 global: Trusted<GlobalScope>,
35 event_target: Trusted<EventTarget>,
36 violation_report: SecurityPolicyViolationReport,
37 violation_policy: csp::Policy,
38}
39
40impl CSPViolationReportTask {
41 pub fn new(
42 global: Trusted<GlobalScope>,
43 event_target: Trusted<EventTarget>,
44 violation_report: SecurityPolicyViolationReport,
45 violation_policy: csp::Policy,
46 ) -> CSPViolationReportTask {
47 CSPViolationReportTask {
48 global,
49 event_target,
50 violation_report,
51 violation_policy,
52 }
53 }
54
55 fn fire_violation_event(&self, can_gc: CanGc) {
56 let event = SecurityPolicyViolationEvent::new(
57 &self.global.root(),
58 Atom::from("securitypolicyviolation"),
59 EventBubbles::Bubbles,
60 EventCancelable::NotCancelable,
61 EventComposed::Composed,
62 &self.violation_report.clone().convert(),
63 can_gc,
64 );
65
66 event
67 .upcast::<Event>()
68 .fire(&self.event_target.root(), can_gc);
69 }
70
71 fn serialize_violation(&self) -> Option<RequestBody> {
73 let report_body = CSPReportUriViolationReport {
74 csp_report: self.violation_report.clone().into(),
76 };
77 Some(create_request_body_with_content(
79 &serde_json::to_string(&report_body).unwrap_or("".to_owned()),
80 ))
81 }
82
83 fn post_csp_violation_to_report_uri(&self, report_uri_directive: &csp::Directive) {
85 let global = self.global.root();
86 if self
89 .violation_policy
90 .contains_a_directive_whose_name_is("report-to")
91 {
92 return;
93 }
94 for token in &report_uri_directive.value {
96 let Ok(endpoint) = ServoUrl::parse_with_base(Some(&global.get_url()), token) else {
102 continue;
104 };
105 let mut headers = HeaderMap::with_capacity(1);
107 headers.typed_insert(ContentType::from(
108 "application/csp-report".parse::<mime::Mime>().unwrap(),
109 ));
110 let request_body = self.serialize_violation();
111 let request = create_a_potential_cors_request(
112 None,
113 endpoint.clone(),
114 Destination::Report,
115 None,
116 None,
117 global.get_referrer(),
118 )
119 .with_global_scope(&global)
120 .method(http::Method::POST)
121 .body(request_body)
122 .credentials_mode(CredentialsMode::CredentialsSameOrigin)
123 .headers(headers);
124 global.fetch(
126 request,
127 CSPReportUriFetchListener {
128 endpoint,
129 global: Trusted::new(&global),
130 },
131 global.task_manager().networking_task_source().into(),
132 );
133 }
134 }
135}
136
137impl TaskOnce for CSPViolationReportTask {
141 fn run_once(self, cx: &mut js::context::JSContext) {
142 self.fire_violation_event(CanGc::from_cx(cx));
146 if let Some(report_uri_directive) = self
148 .violation_policy
149 .directive_set
150 .iter()
151 .find(|directive| directive.name == "report-uri")
152 {
153 self.post_csp_violation_to_report_uri(report_uri_directive);
154 }
155 if let Some(report_to_directive) = self
157 .violation_policy
158 .directive_set
159 .iter()
160 .find(|directive| directive.name == "report-to")
161 {
162 let body = self.violation_report.clone().convert();
164 ReportingObserver::generate_and_queue_a_report(
167 &self.global.root(),
168 "csp-violation".into(),
169 Some(body),
170 report_to_directive.value.join(" ").into(),
171 )
172 }
173 }
174}
175
176struct CSPReportUriFetchListener {
177 endpoint: ServoUrl,
179 global: Trusted<GlobalScope>,
181}
182
183impl FetchResponseListener for CSPReportUriFetchListener {
184 fn process_request_body(&mut self, _: RequestId) {}
185
186 fn process_request_eof(&mut self, _: RequestId) {}
187
188 fn process_response(
189 &mut self,
190 _: RequestId,
191 fetch_metadata: Result<FetchMetadata, NetworkError>,
192 ) {
193 _ = fetch_metadata;
194 }
195
196 fn process_response_chunk(&mut self, _: RequestId, chunk: Vec<u8>) {
197 _ = chunk;
198 }
199
200 fn process_response_eof(
201 self,
202 _: RequestId,
203 response: Result<(), NetworkError>,
204 timing: ResourceFetchTiming,
205 ) {
206 submit_timing(&self, &response, &timing, CanGc::note())
207 }
208
209 fn process_csp_violations(&mut self, _request_id: RequestId, _violations: Vec<Violation>) {}
210}
211
212impl ResourceTimingListener for CSPReportUriFetchListener {
213 fn resource_timing_information(&self) -> (InitiatorType, ServoUrl) {
214 (InitiatorType::Other, self.endpoint.clone())
215 }
216
217 fn resource_timing_global(&self) -> DomRoot<GlobalScope> {
218 self.global.root()
219 }
220}