2018-11-30 08:51:45 -06:00
|
|
|
# frozen_string_literal: true
|
2018-10-22 12:22:23 -05:00
|
|
|
require 'rails_helper'
|
|
|
|
|
|
|
|
describe ContentSecurityPolicy do
|
2018-11-30 08:51:45 -06:00
|
|
|
before { ContentSecurityPolicy.base_url = nil }
|
|
|
|
|
2018-10-22 12:22:23 -05:00
|
|
|
describe 'report-uri' do
|
|
|
|
it 'is enabled by SiteSetting' do
|
|
|
|
SiteSetting.content_security_policy_collect_reports = true
|
2018-11-30 08:51:45 -06:00
|
|
|
report_uri = parse(policy)['report-uri'].first
|
|
|
|
expect(report_uri).to eq('http://test.localhost/csp_reports')
|
2018-10-22 12:22:23 -05:00
|
|
|
|
|
|
|
SiteSetting.content_security_policy_collect_reports = false
|
2018-11-30 08:51:45 -06:00
|
|
|
report_uri = parse(policy)['report-uri']
|
2018-10-22 12:22:23 -05:00
|
|
|
expect(report_uri).to eq(nil)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-01-09 14:04:50 -06:00
|
|
|
describe 'base-uri' do
|
|
|
|
it 'is set to none' do
|
|
|
|
base_uri = parse(policy)['base-uri']
|
|
|
|
expect(base_uri).to eq(["'none'"])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'object-src' do
|
|
|
|
it 'is set to none' do
|
|
|
|
object_srcs = parse(policy)['object-src']
|
|
|
|
expect(object_srcs).to eq(["'none'"])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-11-16 15:25:21 -06:00
|
|
|
describe 'worker-src' do
|
|
|
|
it 'always has self and blob' do
|
2018-11-30 08:51:45 -06:00
|
|
|
worker_srcs = parse(policy)['worker-src']
|
2018-11-16 15:25:21 -06:00
|
|
|
expect(worker_srcs).to eq(%w[
|
|
|
|
'self'
|
|
|
|
blob:
|
|
|
|
])
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'script-src' do
|
|
|
|
it 'always has self, logster, sidekiq, and assets' do
|
2018-11-30 08:51:45 -06:00
|
|
|
script_srcs = parse(policy)['script-src']
|
|
|
|
expect(script_srcs).to include(*%w[
|
2018-11-15 11:14:16 -06:00
|
|
|
'unsafe-eval'
|
2018-12-14 07:17:31 -06:00
|
|
|
'report-sample'
|
2018-11-15 11:14:16 -06:00
|
|
|
http://test.localhost/logs/
|
|
|
|
http://test.localhost/sidekiq/
|
|
|
|
http://test.localhost/mini-profiler-resources/
|
|
|
|
http://test.localhost/assets/
|
|
|
|
http://test.localhost/brotli_asset/
|
|
|
|
http://test.localhost/extra-locales/
|
|
|
|
http://test.localhost/highlight-js/
|
|
|
|
http://test.localhost/javascripts/
|
2018-11-16 15:25:21 -06:00
|
|
|
http://test.localhost/plugins/
|
2018-11-15 11:14:16 -06:00
|
|
|
http://test.localhost/theme-javascripts/
|
2018-11-26 15:49:57 -06:00
|
|
|
http://test.localhost/svg-sprite/
|
2018-11-15 11:14:16 -06:00
|
|
|
])
|
2018-10-22 12:22:23 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'whitelists Google Analytics and Tag Manager when integrated' do
|
|
|
|
SiteSetting.ga_universal_tracking_code = 'UA-12345678-9'
|
|
|
|
SiteSetting.gtm_container_id = 'GTM-ABCDEF'
|
|
|
|
|
2018-11-30 08:51:45 -06:00
|
|
|
script_srcs = parse(policy)['script-src']
|
2018-12-14 07:17:31 -06:00
|
|
|
expect(script_srcs).to include('https://www.google-analytics.com/analytics.js')
|
|
|
|
expect(script_srcs).to include('https://www.googletagmanager.com/gtm.js')
|
2018-10-22 12:22:23 -05:00
|
|
|
end
|
|
|
|
|
2018-11-15 11:14:16 -06:00
|
|
|
it 'whitelists CDN assets when integrated' do
|
|
|
|
set_cdn_url('https://cdn.com')
|
|
|
|
|
2018-11-30 08:51:45 -06:00
|
|
|
script_srcs = parse(policy)['script-src']
|
2018-11-15 11:14:16 -06:00
|
|
|
expect(script_srcs).to include(*%w[
|
|
|
|
https://cdn.com/assets/
|
|
|
|
https://cdn.com/brotli_asset/
|
|
|
|
https://cdn.com/highlight-js/
|
|
|
|
https://cdn.com/javascripts/
|
2018-11-16 15:25:21 -06:00
|
|
|
https://cdn.com/plugins/
|
2018-11-15 11:14:16 -06:00
|
|
|
https://cdn.com/theme-javascripts/
|
|
|
|
http://test.localhost/extra-locales/
|
|
|
|
])
|
|
|
|
|
|
|
|
global_setting(:s3_cdn_url, 'https://s3-cdn.com')
|
2018-10-22 12:22:23 -05:00
|
|
|
|
2018-11-30 08:51:45 -06:00
|
|
|
script_srcs = parse(policy)['script-src']
|
2018-11-15 11:14:16 -06:00
|
|
|
expect(script_srcs).to include(*%w[
|
|
|
|
https://s3-cdn.com/assets/
|
|
|
|
https://s3-cdn.com/brotli_asset/
|
|
|
|
https://cdn.com/highlight-js/
|
|
|
|
https://cdn.com/javascripts/
|
2018-11-16 15:25:21 -06:00
|
|
|
https://cdn.com/plugins/
|
2018-11-15 11:14:16 -06:00
|
|
|
https://cdn.com/theme-javascripts/
|
|
|
|
http://test.localhost/extra-locales/
|
|
|
|
])
|
2018-10-22 12:22:23 -05:00
|
|
|
end
|
2018-11-30 08:51:45 -06:00
|
|
|
end
|
2018-10-22 12:22:23 -05:00
|
|
|
|
2018-11-30 08:51:45 -06:00
|
|
|
it 'can be extended by plugins' do
|
|
|
|
plugin = Class.new(Plugin::Instance) do
|
|
|
|
attr_accessor :enabled
|
2018-12-03 21:48:13 -06:00
|
|
|
def enabled?
|
|
|
|
@enabled
|
|
|
|
end
|
2018-11-30 08:51:45 -06:00
|
|
|
end.new(nil, "#{Rails.root}/spec/fixtures/plugins/csp_extension/plugin.rb")
|
|
|
|
|
|
|
|
plugin.activate!
|
|
|
|
Discourse.plugins << plugin
|
|
|
|
|
|
|
|
plugin.enabled = true
|
|
|
|
expect(parse(policy)['script-src']).to include('https://from-plugin.com')
|
2019-01-09 14:33:42 -06:00
|
|
|
expect(parse(policy)['object-src']).to include('https://test-stripping.com')
|
|
|
|
expect(parse(policy)['object-src']).to_not include("'none'")
|
2018-11-30 08:51:45 -06:00
|
|
|
|
|
|
|
plugin.enabled = false
|
|
|
|
expect(parse(policy)['script-src']).to_not include('https://from-plugin.com')
|
|
|
|
|
|
|
|
Discourse.plugins.pop
|
|
|
|
end
|
|
|
|
|
2019-02-11 06:32:04 -06:00
|
|
|
context "with a theme" do
|
|
|
|
let!(:theme) {
|
|
|
|
Fabricate(:theme).tap do |t|
|
|
|
|
settings = <<~YML
|
|
|
|
extend_content_security_policy:
|
|
|
|
type: list
|
|
|
|
default: 'script-src: from-theme.com'
|
|
|
|
YML
|
|
|
|
t.set_field(target: :settings, name: :yaml, value: settings)
|
|
|
|
t.save!
|
|
|
|
end
|
|
|
|
}
|
|
|
|
|
|
|
|
def theme_policy
|
|
|
|
policy([theme.id])
|
|
|
|
end
|
2018-11-30 08:51:45 -06:00
|
|
|
|
2019-02-11 06:32:04 -06:00
|
|
|
it 'can be extended by themes' do
|
|
|
|
policy # call this first to make sure further actions clear the cache
|
2018-11-30 08:51:45 -06:00
|
|
|
|
2019-02-11 06:32:04 -06:00
|
|
|
expect(parse(policy)['script-src']).not_to include('from-theme.com')
|
2018-11-30 08:51:45 -06:00
|
|
|
|
2019-02-11 06:32:04 -06:00
|
|
|
expect(parse(theme_policy)['script-src']).to include('from-theme.com')
|
2018-11-30 08:51:45 -06:00
|
|
|
|
2019-02-11 06:32:04 -06:00
|
|
|
theme.update_setting(:extend_content_security_policy, "script-src: https://from-theme.net|worker-src: from-theme.com")
|
|
|
|
theme.save!
|
2018-11-30 08:51:45 -06:00
|
|
|
|
2019-02-11 06:32:04 -06:00
|
|
|
expect(parse(theme_policy)['script-src']).to_not include('from-theme.com')
|
|
|
|
expect(parse(theme_policy)['script-src']).to include('https://from-theme.net')
|
|
|
|
expect(parse(theme_policy)['worker-src']).to include('from-theme.com')
|
2018-11-30 08:51:45 -06:00
|
|
|
|
2019-02-11 06:32:04 -06:00
|
|
|
theme.destroy!
|
|
|
|
|
|
|
|
expect(parse(theme_policy)['script-src']).to_not include('https://from-theme.net')
|
|
|
|
expect(parse(theme_policy)['worker-src']).to_not include('from-theme.com')
|
|
|
|
end
|
2018-11-30 08:51:45 -06:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'can be extended by site setting' do
|
|
|
|
SiteSetting.content_security_policy_script_src = 'from-site-setting.com|from-site-setting.net'
|
|
|
|
|
|
|
|
expect(parse(policy)['script-src']).to include('from-site-setting.com', 'from-site-setting.net')
|
2018-10-22 12:22:23 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def parse(csp_string)
|
|
|
|
csp_string.split(';').map do |policy|
|
|
|
|
directive, *sources = policy.split
|
|
|
|
[directive, sources]
|
|
|
|
end.to_h
|
|
|
|
end
|
2018-11-30 08:51:45 -06:00
|
|
|
|
2019-02-11 06:32:04 -06:00
|
|
|
def policy(theme_ids = [])
|
|
|
|
ContentSecurityPolicy.policy(theme_ids)
|
2018-11-30 08:51:45 -06:00
|
|
|
end
|
2018-10-22 12:22:23 -05:00
|
|
|
end
|