2018-11-30 09:51:45 -05:00
|
|
|
# frozen_string_literal: true
|
|
|
|
require_dependency 'content_security_policy'
|
|
|
|
|
|
|
|
class ContentSecurityPolicy
|
|
|
|
class Middleware
|
|
|
|
def initialize(app)
|
|
|
|
@app = app
|
|
|
|
end
|
|
|
|
|
|
|
|
def call(env)
|
|
|
|
request = Rack::Request.new(env)
|
|
|
|
_, headers, _ = response = @app.call(env)
|
|
|
|
|
|
|
|
return response unless html_response?(headers)
|
2020-03-19 15:54:42 -04:00
|
|
|
|
|
|
|
# The EnforceHostname middleware ensures request.host_with_port can be trusted
|
|
|
|
protocol = (SiteSetting.force_https || request.ssl?) ? "https://" : "http://"
|
|
|
|
base_url = protocol + request.host_with_port + Discourse.base_uri
|
2018-11-30 09:51:45 -05:00
|
|
|
|
2019-02-11 07:32:04 -05:00
|
|
|
theme_ids = env[:resolved_theme_ids]
|
2019-12-30 07:17:12 -05:00
|
|
|
|
2020-03-19 15:54:42 -04:00
|
|
|
headers['Content-Security-Policy'] = policy(theme_ids, base_url: base_url, path_info: env["PATH_INFO"]) if SiteSetting.content_security_policy
|
|
|
|
headers['Content-Security-Policy-Report-Only'] = policy(theme_ids, base_url: base_url, path_info: env["PATH_INFO"]) if SiteSetting.content_security_policy_report_only
|
2018-11-30 09:51:45 -05:00
|
|
|
|
|
|
|
response
|
|
|
|
end
|
|
|
|
|
|
|
|
private
|
|
|
|
|
|
|
|
delegate :policy, to: :ContentSecurityPolicy
|
|
|
|
|
|
|
|
def html_response?(headers)
|
|
|
|
headers['Content-Type'] && headers['Content-Type'] =~ /html/
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|