1
1
'use strict'
2
2
3
3
const { redirectStatus, badPorts, referrerPolicy : referrerPolicyTokens } = require ( './constants' )
4
+ const { getGlobalOrigin } = require ( './global' )
4
5
const { performance } = require ( 'perf_hooks' )
5
6
const { isBlobLike, toUSVString, ReadableStreamFrom } = require ( '../core/util' )
6
7
const assert = require ( 'assert' )
@@ -36,9 +37,11 @@ function responseLocationURL (response, requestFragment) {
36
37
// `Location` and response’s header list.
37
38
let location = response . headersList . get ( 'location' )
38
39
39
- // 3. If location is a value, then set location to the result of parsing
40
- // location with response’s URL.
41
- location = location ? new URL ( location , responseURL ( response ) ) : null
40
+ // 3. If location is a header value, then set location to the result of
41
+ // parsing location with response’s URL.
42
+ if ( location !== null && isValidHeaderValue ( location ) ) {
43
+ location = new URL ( location , responseURL ( response ) )
44
+ }
42
45
43
46
// 4. If location is a URL whose fragment is null, then set location’s
44
47
// fragment to requestFragment.
@@ -267,7 +270,7 @@ function appendRequestOriginHeader (request) {
267
270
// 2. If request’s response tainting is "cors" or request’s mode is "websocket", then append (`Origin`, serializedOrigin) to request’s header list.
268
271
if ( request . responseTainting === 'cors' || request . mode === 'websocket' ) {
269
272
if ( serializedOrigin ) {
270
- request . headersList . append ( 'Origin ' , serializedOrigin )
273
+ request . headersList . append ( 'origin ' , serializedOrigin )
271
274
}
272
275
273
276
// 3. Otherwise, if request’s method is neither `GET` nor `HEAD`, then:
@@ -298,7 +301,7 @@ function appendRequestOriginHeader (request) {
298
301
299
302
if ( serializedOrigin ) {
300
303
// 2. Append (`Origin`, serializedOrigin) to request’s header list.
301
- request . headersList . append ( 'Origin ' , serializedOrigin )
304
+ request . headersList . append ( 'origin ' , serializedOrigin )
302
305
}
303
306
}
304
307
}
@@ -340,106 +343,77 @@ function clonePolicyContainer () {
340
343
// https://w3c.github.io/webappsec-referrer-policy/#determine-requests-referrer
341
344
function determineRequestsReferrer ( request ) {
342
345
// 1. Let policy be request's referrer policy.
343
- const policy = request . referrerPolicy
346
+ // TODO(@KhafraDev): referrerPolicy is supposed to be non-null & not an empty string.
347
+ // this is because we don't implement policyContainer.
348
+ const policy = request . referrerPolicy ?? 'strict-origin-when-cross-origin'
344
349
345
- // Return no-referrer when empty or policy says so
346
- if ( policy == null || policy === '' || policy === 'no-referrer' ) {
347
- return 'no-referrer'
348
- }
350
+ // 2. Let environment be request’s client.
349
351
350
- // 2. Let environment be the request client
351
- const environment = request . client
352
352
let referrerSource = null
353
353
354
- /**
355
- * 3, Switch on request’s referrer:
356
- "client"
357
- If environment’s global object is a Window object, then
358
- Let document be the associated Document of environment’s global object.
359
- If document’s origin is an opaque origin, return no referrer.
360
- While document is an iframe srcdoc document,
361
- let document be document’s browsing context’s browsing context container’s node document.
362
- Let referrerSource be document’s URL.
363
-
364
- Otherwise, let referrerSource be environment’s creation URL.
365
-
366
- a URL
367
- Let referrerSource be request’s referrer.
368
- */
354
+ // 3. Switch on request’s referrer:
369
355
if ( request . referrer === 'client' ) {
370
- // Not defined in Node but part of the spec
371
- if ( request . client ?. globalObject ?. constructor ?. name === 'Window' ) { // eslint-disable-line
372
- const origin = environment . globalObject . self ?. origin ?? environment . globalObject . location ?. origin
373
-
374
- // If document’s origin is an opaque origin, return no referrer.
375
- if ( origin == null || origin === 'null' ) return 'no-referrer'
376
-
377
- // Let referrerSource be document’s URL.
378
- referrerSource = new URL ( environment . globalObject . location . href )
379
- } else {
380
- // 3(a)(II) If environment's global object is not Window,
381
- // Let referrerSource be environments creationURL
382
- if ( environment ?. globalObject ?. location == null ) {
383
- return 'no-referrer'
384
- }
356
+ // Note: node isn't a browser and doesn't implement document/iframes,
357
+ // so we bypass this step and replace it with our own.
358
+
359
+ const globalOrigin = getGlobalOrigin ( )
385
360
386
- referrerSource = new URL ( environment . globalObject . location . href )
361
+ if ( ! globalOrigin || globalOrigin . origin === 'null' ) {
362
+ return 'no-referrer'
387
363
}
364
+
365
+ // note: we need to clone it as it's mutated
366
+ referrerSource = new URL ( globalOrigin )
388
367
} else if ( request . referrer instanceof URL ) {
389
- // 3(b) If requests's referrer is a URL instance, then make
390
- // referrerSource be requests's referrer.
368
+ // Let referrerSource be request’s referrer.
391
369
referrerSource = request . referrer
392
- } else {
393
- // If referrerSource neither client nor instance of URL
394
- // then return "no-referrer".
395
- return 'no-referrer'
396
370
}
397
371
398
- const urlProtocol = referrerSource . protocol
372
+ // 4. Let request’s referrerURL be the result of stripping referrerSource for
373
+ // use as a referrer.
374
+ let referrerURL = stripURLForReferrer ( referrerSource )
399
375
400
- // If url's scheme is a local scheme (i.e. one of "about", "data", "javascript", "file")
401
- // then return "no-referrer".
402
- if (
403
- urlProtocol === 'about:' || urlProtocol === 'data:' ||
404
- urlProtocol === 'blob:'
405
- ) {
406
- return 'no-referrer'
376
+ // 5. Let referrerOrigin be the result of stripping referrerSource for use as
377
+ // a referrer, with the origin-only flag set to true.
378
+ const referrerOrigin = stripURLForReferrer ( referrerSource , true )
379
+
380
+ // 6. If the result of serializing referrerURL is a string whose length is
381
+ // greater than 4096, set referrerURL to referrerOrigin.
382
+ if ( referrerURL . toString ( ) . length > 4096 ) {
383
+ referrerURL = referrerOrigin
407
384
}
408
385
409
- let temp
410
- let referrerOrigin
411
- // 4. Let requests's referrerURL be the result of stripping referrer
412
- // source for use as referrer (using util function, without origin only)
413
- const referrerUrl = ( temp = stripURLForReferrer ( referrerSource ) ) . length > 4096
414
- // 5. Let referrerOrigin be the result of stripping referrer
415
- // source for use as referrer (using util function, with originOnly true)
416
- ? ( referrerOrigin = stripURLForReferrer ( referrerSource , true ) )
417
- // 6. If result of seralizing referrerUrl is a string whose length is greater than
418
- // 4096, then set referrerURL to referrerOrigin
419
- : temp
420
- const areSameOrigin = sameOrigin ( request , referrerUrl )
421
- const isNonPotentiallyTrustWorthy = isURLPotentiallyTrustworthy ( referrerUrl ) &&
386
+ const areSameOrigin = sameOrigin ( request , referrerURL )
387
+ const isNonPotentiallyTrustWorthy = isURLPotentiallyTrustworthy ( referrerURL ) &&
422
388
! isURLPotentiallyTrustworthy ( request . url )
423
389
424
- // NOTE: How to treat step 7?
425
390
// 8. Execute the switch statements corresponding to the value of policy:
426
391
switch ( policy ) {
427
392
case 'origin' : return referrerOrigin != null ? referrerOrigin : stripURLForReferrer ( referrerSource , true )
428
- case 'unsafe-url' : return referrerUrl
393
+ case 'unsafe-url' : return referrerURL
429
394
case 'same-origin' :
430
395
return areSameOrigin ? referrerOrigin : 'no-referrer'
431
396
case 'origin-when-cross-origin' :
432
- return areSameOrigin ? referrerUrl : referrerOrigin
433
- case 'strict-origin-when-cross-origin' :
434
- /**
435
- * 1. If the origin of referrerURL and the origin of request’s current URL are the same,
436
- * then return referrerURL.
437
- * 2. If referrerURL is a potentially trustworthy URL and request’s current URL is not a
438
- * potentially trustworthy URL, then return no referrer.
439
- * 3. Return referrerOrigin
440
- */
441
- if ( areSameOrigin ) return referrerOrigin
442
- // else return isNonPotentiallyTrustWorthy ? 'no-referrer' : referrerOrigin
397
+ return areSameOrigin ? referrerURL : referrerOrigin
398
+ case 'strict-origin-when-cross-origin' : {
399
+ const currentURL = requestCurrentURL ( request )
400
+
401
+ // 1. If the origin of referrerURL and the origin of request’s current
402
+ // URL are the same, then return referrerURL.
403
+ if ( sameOrigin ( referrerURL , currentURL ) ) {
404
+ return referrerURL
405
+ }
406
+
407
+ // 2. If referrerURL is a potentially trustworthy URL and request’s
408
+ // current URL is not a potentially trustworthy URL, then return no
409
+ // referrer.
410
+ if ( isURLPotentiallyTrustworthy ( referrerURL ) && ! isURLPotentiallyTrustworthy ( currentURL ) ) {
411
+ return 'no-referrer'
412
+ }
413
+
414
+ // 3. Return referrerOrigin.
415
+ return referrerOrigin
416
+ }
443
417
case 'strict-origin' : // eslint-disable-line
444
418
/**
445
419
* 1. If referrerURL is a potentially trustworthy URL and
@@ -458,15 +432,42 @@ function determineRequestsReferrer (request) {
458
432
default : // eslint-disable-line
459
433
return isNonPotentiallyTrustWorthy ? 'no-referrer' : referrerOrigin
460
434
}
435
+ }
461
436
462
- function stripURLForReferrer ( url , originOnly = false ) {
463
- const urlObject = new URL ( url . href )
464
- urlObject . username = ''
465
- urlObject . password = ''
466
- urlObject . hash = ''
437
+ /**
438
+ * @see https://w3c.github.io/webappsec-referrer-policy/#strip-url
439
+ * @param {URL } url
440
+ * @param {boolean|undefined } originOnly
441
+ */
442
+ function stripURLForReferrer ( url , originOnly ) {
443
+ // 1. Assert: url is a URL.
444
+ assert ( url instanceof URL )
467
445
468
- return originOnly ? urlObject . origin : urlObject . href
446
+ // 2. If url’s scheme is a local scheme, then return no referrer.
447
+ if ( url . protocol === 'file:' || url . protocol === 'about:' || url . protocol === 'blank:' ) {
448
+ return 'no-referrer'
469
449
}
450
+
451
+ // 3. Set url’s username to the empty string.
452
+ url . username = ''
453
+
454
+ // 4. Set url’s password to the empty string.
455
+ url . password = ''
456
+
457
+ // 5. Set url’s fragment to null.
458
+ url . hash = ''
459
+
460
+ // 6. If the origin-only flag is true, then:
461
+ if ( originOnly ) {
462
+ // 1. Set url’s path to « the empty string ».
463
+ url . pathname = ''
464
+
465
+ // 2. Set url’s query to null.
466
+ url . search = ''
467
+ }
468
+
469
+ // 7. Return url.
470
+ return url
470
471
}
471
472
472
473
function isURLPotentiallyTrustworthy ( url ) {
0 commit comments