-
-
Notifications
You must be signed in to change notification settings - Fork 9.6k
[3.2][WebProfilerBundle] Fix bundle usage in Content-Security-Policy context without unsafe-inline #18568
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[3.2][WebProfilerBundle] Fix bundle usage in Content-Security-Policy context without unsafe-inline #18568
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,265 @@ | ||
<?php | ||
|
||
/* | ||
* This file is part of the Symfony package. | ||
* | ||
* (c) Fabien Potencier <fabien@symfony.com> | ||
* | ||
* For the full copyright and license information, please view the LICENSE | ||
* file that was distributed with this source code. | ||
*/ | ||
|
||
namespace Symfony\Bundle\WebProfilerBundle\Csp; | ||
|
||
use Symfony\Component\HttpFoundation\Request; | ||
use Symfony\Component\HttpFoundation\Response; | ||
|
||
/** | ||
* Handles Content-Security-Policy HTTP header for the WebProfiler Bundle. | ||
* | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I suggest marking this class as There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. fixed |
||
* @author Romain Neutron <imprec@gmail.com> | ||
* | ||
* @internal | ||
*/ | ||
class ContentSecurityPolicyHandler | ||
{ | ||
private $nonceGenerator; | ||
private $cspDisabled = false; | ||
|
||
public function __construct(NonceGenerator $nonceGenerator) | ||
{ | ||
$this->nonceGenerator = $nonceGenerator; | ||
} | ||
|
||
/** | ||
* Returns an array of nonces to be used in Twig templates and Content-Security-Policy headers. | ||
* | ||
* Nonce can be provided by; | ||
* - The request - In case HTML content is fetched via AJAX and inserted in DOM, it must use the same nonce as origin | ||
* - The response - A call to getNonces() has already been done previously. Same nonce are returned | ||
* - They are otherwise randomly generated | ||
* | ||
* @return array | ||
*/ | ||
public function getNonces(Request $request, Response $response) | ||
{ | ||
if ($request->headers->has('X-SymfonyProfiler-Script-Nonce') && $request->headers->has('X-SymfonyProfiler-Style-Nonce')) { | ||
return array( | ||
'csp_script_nonce' => $request->headers->get('X-SymfonyProfiler-Script-Nonce'), | ||
'csp_style_nonce' => $request->headers->get('X-SymfonyProfiler-Style-Nonce'), | ||
); | ||
} | ||
|
||
if ($response->headers->has('X-SymfonyProfiler-Script-Nonce') && $response->headers->has('X-SymfonyProfiler-Style-Nonce')) { | ||
return array( | ||
'csp_script_nonce' => $response->headers->get('X-SymfonyProfiler-Script-Nonce'), | ||
'csp_style_nonce' => $response->headers->get('X-SymfonyProfiler-Style-Nonce'), | ||
); | ||
} | ||
|
||
$nonces = array( | ||
'csp_script_nonce' => $this->generateNonce(), | ||
'csp_style_nonce' => $this->generateNonce(), | ||
); | ||
|
||
$response->headers->set('X-SymfonyProfiler-Script-Nonce', $nonces['csp_script_nonce']); | ||
$response->headers->set('X-SymfonyProfiler-Style-Nonce', $nonces['csp_style_nonce']); | ||
|
||
return $nonces; | ||
} | ||
|
||
/** | ||
* Disables Content-Security-Policy. | ||
* | ||
* All related headers will be removed. | ||
*/ | ||
public function disableCsp() | ||
{ | ||
$this->cspDisabled = true; | ||
} | ||
|
||
/** | ||
* Cleanup temporary headers and updates Content-Security-Policy headers. | ||
* | ||
* @return array Nonces used by the bundle in Content-Security-Policy header | ||
*/ | ||
public function updateResponseHeaders(Request $request, Response $response) | ||
{ | ||
if ($this->cspDisabled) { | ||
$this->removeCspHeaders($response); | ||
|
||
return array(); | ||
} | ||
|
||
$nonces = $this->getNonces($request, $response); | ||
$this->cleanHeaders($response); | ||
$this->updateCspHeaders($response, $nonces); | ||
|
||
return $nonces; | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. returning something from an event listener looks weird to me There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. OK, this method is actually not an event listener. So the phpdoc is wrong (and the naming is not that good either) There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. fixed |
||
} | ||
|
||
private function cleanHeaders(Response $response) | ||
{ | ||
$response->headers->remove('X-SymfonyProfiler-Script-Nonce'); | ||
$response->headers->remove('X-SymfonyProfiler-Style-Nonce'); | ||
} | ||
|
||
private function removeCspHeaders(Response $response) | ||
{ | ||
$response->headers->remove('X-Content-Security-Policy'); | ||
$response->headers->remove('Content-Security-Policy'); | ||
} | ||
|
||
/** | ||
* Updates Content-Security-Policy headers in a response. | ||
* | ||
* @return array | ||
*/ | ||
private function updateCspHeaders(Response $response, array $nonces = array()) | ||
{ | ||
$nonces = array_replace(array( | ||
'csp_script_nonce' => $this->generateNonce(), | ||
'csp_style_nonce' => $this->generateNonce(), | ||
), $nonces); | ||
|
||
$ruleIsSet = false; | ||
|
||
$headers = $this->getCspHeaders($response); | ||
|
||
foreach ($headers as $header => $directives) { | ||
foreach (array('script-src' => 'csp_script_nonce', 'style-src' => 'csp_style_nonce') as $type => $tokenName) { | ||
if ($this->authorizesInline($directives, $type)) { | ||
continue; | ||
} | ||
if (!isset($headers[$header][$type])) { | ||
if (isset($headers[$header]['default-src'])) { | ||
$headers[$header][$type] = $headers[$header]['default-src']; | ||
} else { | ||
$headers[$header][$type] = array(); | ||
} | ||
} | ||
$ruleIsSet = true; | ||
if (!in_array('\'unsafe-inline\'', $headers[$header][$type], true)) { | ||
$headers[$header][$type][] = '\'unsafe-inline\''; | ||
} | ||
$headers[$header][$type][] = sprintf('\'nonce-%s\'', $nonces[$tokenName]); | ||
} | ||
} | ||
|
||
if (!$ruleIsSet) { | ||
return $nonces; | ||
} | ||
|
||
foreach ($headers as $header => $directives) { | ||
$response->headers->set($header, $this->generateCspHeader($directives)); | ||
} | ||
|
||
return $nonces; | ||
} | ||
|
||
/** | ||
* Generates a valid Content-Security-Policy nonce. | ||
* | ||
* @return string | ||
*/ | ||
private function generateNonce() | ||
{ | ||
return $this->nonceGenerator->generate(); | ||
} | ||
|
||
/** | ||
* Converts a directive set array into Content-Security-Policy header. | ||
* | ||
* @param array $directives The directive set | ||
* | ||
* @return string The Content-Security-Policy header | ||
*/ | ||
private function generateCspHeader(array $directives) | ||
{ | ||
return array_reduce(array_keys($directives), function ($res, $name) use ($directives) { | ||
return ($res !== '' ? $res.'; ' : '').sprintf('%s %s', $name, implode(' ', $directives[$name])); | ||
}, ''); | ||
} | ||
|
||
/** | ||
* Converts a Content-Security-Policy header value into a directive set array. | ||
* | ||
* @param string $header The header value | ||
* | ||
* @return array The directive set | ||
*/ | ||
private function parseDirectives($header) | ||
{ | ||
$directives = array(); | ||
|
||
foreach (explode(';', $header) as $directive) { | ||
$parts = explode(' ', trim($directive)); | ||
if (count($parts) < 1) { | ||
continue; | ||
} | ||
$name = array_shift($parts); | ||
$directives[$name] = $parts; | ||
} | ||
|
||
return $directives; | ||
} | ||
|
||
/** | ||
* Detects if the 'unsafe-inline' is prevented for a directive within the directive set. | ||
* | ||
* @param array $directivesSet The directive set | ||
* @param string $type The name of the directive to check | ||
* | ||
* @return bool | ||
*/ | ||
private function authorizesInline(array $directivesSet, $type) | ||
{ | ||
if (isset($directivesSet[$type])) { | ||
$directives = $directivesSet[$type]; | ||
} elseif (isset($directivesSet['default-src'])) { | ||
$directives = $directivesSet['default-src']; | ||
} else { | ||
return false; | ||
} | ||
|
||
return in_array('\'unsafe-inline\'', $directives, true) && !$this->hasHashOrNonce($directives); | ||
} | ||
|
||
private function hasHashOrNonce(array $directives) | ||
{ | ||
foreach ($directives as $directive) { | ||
if ('\'' !== substr($directive, -1)) { | ||
continue; | ||
} | ||
if ('\'nonce-' === substr($directive, 0, 7)) { | ||
return true; | ||
} | ||
if (in_array(substr($directive, 0, 8), array('\'sha256-', '\'sha384-', '\'sha512-'), true)) { | ||
return true; | ||
} | ||
} | ||
|
||
return false; | ||
} | ||
|
||
/** | ||
* Retrieves the Content-Security-Policy headers (either X-Content-Security-Policy or Content-Security-Policy) from | ||
* a response. | ||
* | ||
* @return array An associative array of headers | ||
*/ | ||
private function getCspHeaders(Response $response) | ||
{ | ||
$headers = array(); | ||
|
||
if ($response->headers->has('Content-Security-Policy')) { | ||
$headers['Content-Security-Policy'] = $this->parseDirectives($response->headers->get('Content-Security-Policy')); | ||
} | ||
|
||
if ($response->headers->has('X-Content-Security-Policy')) { | ||
$headers['X-Content-Security-Policy'] = $this->parseDirectives($response->headers->get('X-Content-Security-Policy')); | ||
} | ||
|
||
return $headers; | ||
} | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@nicolas-grekas what was the reason for this one ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Toggle nested levels in the toolbar