mirror of
https://github.com/jhbruhn/respira.git
synced 2026-01-27 02:13:41 +00:00
Merge pull request #21 from jhbruhn/fix/security-headers-and-csp
Some checks failed
Build, Test, and Lint / Build, Test, and Lint (push) Has been cancelled
Draft Release / Draft Release (push) Has been cancelled
Draft Release / Build Web App (push) Has been cancelled
Draft Release / Build Release - macos-latest (push) Has been cancelled
Draft Release / Build Release - ubuntu-latest (push) Has been cancelled
Draft Release / Build Release - windows-latest (push) Has been cancelled
Draft Release / Upload to GitHub Release (push) Has been cancelled
Some checks failed
Build, Test, and Lint / Build, Test, and Lint (push) Has been cancelled
Draft Release / Draft Release (push) Has been cancelled
Draft Release / Build Web App (push) Has been cancelled
Draft Release / Build Release - macos-latest (push) Has been cancelled
Draft Release / Build Release - ubuntu-latest (push) Has been cancelled
Draft Release / Build Release - windows-latest (push) Has been cancelled
Draft Release / Upload to GitHub Release (push) Has been cancelled
Fix: security headers and csp
This commit is contained in:
commit
d31cb2f29e
2 changed files with 193 additions and 32 deletions
192
electron/main.ts
192
electron/main.ts
|
|
@ -1,5 +1,5 @@
|
||||||
import { app, BrowserWindow, ipcMain, dialog } from "electron";
|
import { app, BrowserWindow, ipcMain, dialog, protocol } from "electron";
|
||||||
import { join } from "path";
|
import { join, resolve, normalize, isAbsolute } from "path";
|
||||||
import { promises as fs } from "fs";
|
import { promises as fs } from "fs";
|
||||||
import Store from "electron-store";
|
import Store from "electron-store";
|
||||||
import { updateElectronApp, UpdateSourceType } from "update-electron-app";
|
import { updateElectronApp, UpdateSourceType } from "update-electron-app";
|
||||||
|
|
@ -22,8 +22,79 @@ updateElectronApp({
|
||||||
app.commandLine.appendSwitch("enable-web-bluetooth", "true");
|
app.commandLine.appendSwitch("enable-web-bluetooth", "true");
|
||||||
app.commandLine.appendSwitch("enable-experimental-web-platform-features");
|
app.commandLine.appendSwitch("enable-experimental-web-platform-features");
|
||||||
|
|
||||||
|
// Register custom protocol for serving app files with proper COOP/COEP headers
|
||||||
|
// This is required for SharedArrayBuffer support in production builds
|
||||||
|
protocol.registerSchemesAsPrivileged([
|
||||||
|
{
|
||||||
|
scheme: "app",
|
||||||
|
privileges: {
|
||||||
|
standard: true,
|
||||||
|
secure: true,
|
||||||
|
supportFetchAPI: true,
|
||||||
|
corsEnabled: false,
|
||||||
|
bypassCSP: false,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
]);
|
||||||
|
|
||||||
const store = new Store();
|
const store = new Store();
|
||||||
|
|
||||||
|
// Setup custom protocol handler for production builds
|
||||||
|
async function setupCustomProtocol() {
|
||||||
|
protocol.handle("app", async (request) => {
|
||||||
|
// Parse the URL to get the file path
|
||||||
|
const url = new URL(request.url);
|
||||||
|
let filePath = decodeURIComponent(url.pathname);
|
||||||
|
|
||||||
|
// Handle Windows paths (remove leading slash)
|
||||||
|
if (process.platform === "win32" && filePath.startsWith("/")) {
|
||||||
|
filePath = filePath.slice(1);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Resolve relative to app resources
|
||||||
|
const resourcePath = join(
|
||||||
|
__dirname,
|
||||||
|
"..",
|
||||||
|
"renderer",
|
||||||
|
MAIN_WINDOW_VITE_NAME,
|
||||||
|
filePath,
|
||||||
|
);
|
||||||
|
|
||||||
|
try {
|
||||||
|
const data = await fs.readFile(resourcePath);
|
||||||
|
|
||||||
|
// Determine content type from extension
|
||||||
|
const ext = filePath.split(".").pop()?.toLowerCase();
|
||||||
|
const contentTypes: Record<string, string> = {
|
||||||
|
html: "text/html",
|
||||||
|
js: "application/javascript",
|
||||||
|
css: "text/css",
|
||||||
|
json: "application/json",
|
||||||
|
png: "image/png",
|
||||||
|
jpg: "image/jpeg",
|
||||||
|
jpeg: "image/jpeg",
|
||||||
|
svg: "image/svg+xml",
|
||||||
|
wasm: "application/wasm",
|
||||||
|
whl: "application/zip",
|
||||||
|
};
|
||||||
|
const contentType = contentTypes[ext || ""] || "application/octet-stream";
|
||||||
|
|
||||||
|
// Return response with proper COOP/COEP/CORP headers
|
||||||
|
return new Response(data, {
|
||||||
|
headers: {
|
||||||
|
"Content-Type": contentType,
|
||||||
|
"Cross-Origin-Opener-Policy": "same-origin",
|
||||||
|
"Cross-Origin-Embedder-Policy": "require-corp",
|
||||||
|
"Cross-Origin-Resource-Policy": "same-origin",
|
||||||
|
},
|
||||||
|
});
|
||||||
|
} catch (err) {
|
||||||
|
console.error("[CustomProtocol] Failed to load:", resourcePath, err);
|
||||||
|
return new Response("Not Found", { status: 404 });
|
||||||
|
}
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
function createWindow() {
|
function createWindow() {
|
||||||
const mainWindow = new BrowserWindow({
|
const mainWindow = new BrowserWindow({
|
||||||
width: 1600,
|
width: 1600,
|
||||||
|
|
@ -38,8 +109,7 @@ function createWindow() {
|
||||||
contextIsolation: true,
|
contextIsolation: true,
|
||||||
sandbox: true,
|
sandbox: true,
|
||||||
webSecurity: true,
|
webSecurity: true,
|
||||||
// Enable SharedArrayBuffer for Pyodide
|
// SharedArrayBuffer enabled via proper COOP/COEP headers below
|
||||||
additionalArguments: ["--enable-features=SharedArrayBuffer"],
|
|
||||||
},
|
},
|
||||||
});
|
});
|
||||||
|
|
||||||
|
|
@ -106,21 +176,16 @@ function createWindow() {
|
||||||
// Set COOP/COEP headers for Pyodide SharedArrayBuffer support
|
// Set COOP/COEP headers for Pyodide SharedArrayBuffer support
|
||||||
mainWindow.webContents.session.webRequest.onHeadersReceived(
|
mainWindow.webContents.session.webRequest.onHeadersReceived(
|
||||||
(details, callback) => {
|
(details, callback) => {
|
||||||
// Apply headers to ALL resources including workers
|
// Apply security headers to enable cross-origin isolation (needed for SharedArrayBuffer)
|
||||||
const headers: Record<string, string[]> = {
|
const headers: Record<string, string[]> = {
|
||||||
...details.responseHeaders,
|
...details.responseHeaders,
|
||||||
"Cross-Origin-Opener-Policy": ["unsafe-none"],
|
"Cross-Origin-Opener-Policy": ["same-origin"],
|
||||||
"Cross-Origin-Embedder-Policy": ["unsafe-none"],
|
"Cross-Origin-Embedder-Policy": ["require-corp"],
|
||||||
|
// Add CORP to ALL resources since this is a local-only app
|
||||||
|
// This allows workers, Pyodide assets, and all other resources to load
|
||||||
|
"Cross-Origin-Resource-Policy": ["same-origin"],
|
||||||
};
|
};
|
||||||
|
|
||||||
// For same-origin resources (including workers), add CORP header
|
|
||||||
if (
|
|
||||||
details.url.startsWith("http://localhost") ||
|
|
||||||
details.url.startsWith("file://")
|
|
||||||
) {
|
|
||||||
headers["Cross-Origin-Resource-Policy"] = ["same-origin"];
|
|
||||||
}
|
|
||||||
|
|
||||||
callback({ responseHeaders: headers });
|
callback({ responseHeaders: headers });
|
||||||
},
|
},
|
||||||
);
|
);
|
||||||
|
|
@ -131,14 +196,18 @@ function createWindow() {
|
||||||
mainWindow.loadURL(MAIN_WINDOW_VITE_DEV_SERVER_URL);
|
mainWindow.loadURL(MAIN_WINDOW_VITE_DEV_SERVER_URL);
|
||||||
mainWindow.webContents.openDevTools();
|
mainWindow.webContents.openDevTools();
|
||||||
} else {
|
} else {
|
||||||
// MAIN_WINDOW_VITE_NAME is the renderer name from forge.config.js
|
// Production: Use custom protocol to serve files with proper COOP/COEP/CORP headers
|
||||||
mainWindow.loadFile(
|
// This enables SharedArrayBuffer support for Pyodide
|
||||||
join(__dirname, `../renderer/${MAIN_WINDOW_VITE_NAME}/index.html`),
|
mainWindow.loadURL("app://./index.html");
|
||||||
);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
app.whenReady().then(createWindow);
|
app.whenReady().then(async () => {
|
||||||
|
// Setup custom protocol for production builds
|
||||||
|
await setupCustomProtocol();
|
||||||
|
|
||||||
|
createWindow();
|
||||||
|
});
|
||||||
|
|
||||||
app.on("window-all-closed", () => {
|
app.on("window-all-closed", () => {
|
||||||
if (process.platform !== "darwin") {
|
if (process.platform !== "darwin") {
|
||||||
|
|
@ -235,6 +304,9 @@ ipcMain.handle("dialog:openFile", async (_event, options) => {
|
||||||
const filePath = result.filePaths[0];
|
const filePath = result.filePaths[0];
|
||||||
const fileName = filePath.split(/[\\/]/).pop() || "";
|
const fileName = filePath.split(/[\\/]/).pop() || "";
|
||||||
|
|
||||||
|
// Approve path for file operations since user explicitly selected it
|
||||||
|
approvePath(filePath);
|
||||||
|
|
||||||
console.log("[Dialog] File selected:", fileName);
|
console.log("[Dialog] File selected:", fileName);
|
||||||
return { filePath, fileName };
|
return { filePath, fileName };
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
|
|
@ -254,6 +326,9 @@ ipcMain.handle("dialog:saveFile", async (_event, options) => {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Approve path for file operations since user explicitly selected it
|
||||||
|
approvePath(result.filePath);
|
||||||
|
|
||||||
console.log("[Dialog] Save file selected:", result.filePath);
|
console.log("[Dialog] Save file selected:", result.filePath);
|
||||||
return result.filePath;
|
return result.filePath;
|
||||||
} catch (err) {
|
} catch (err) {
|
||||||
|
|
@ -262,8 +337,67 @@ ipcMain.handle("dialog:saveFile", async (_event, options) => {
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
// File system handlers
|
// File system handlers with dialog-based path validation
|
||||||
ipcMain.handle("fs:readFile", async (_event, filePath) => {
|
// Track paths approved by user through OS file dialogs
|
||||||
|
// This prevents arbitrary file access while allowing users full freedom
|
||||||
|
const userApprovedPaths = new Set<string>();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Validates that a file path was approved by the user through a dialog
|
||||||
|
* Also performs basic sanitization to prevent obvious attacks
|
||||||
|
*/
|
||||||
|
function isPathApproved(filePath: string): boolean {
|
||||||
|
// Reject empty, null, or undefined paths
|
||||||
|
if (!filePath) {
|
||||||
|
console.warn("[FS Security] Rejected empty path");
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Reject relative paths - must be absolute
|
||||||
|
if (!isAbsolute(filePath)) {
|
||||||
|
console.warn("[FS Security] Rejected relative path:", filePath);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Reject paths with null bytes (security vulnerability)
|
||||||
|
if (filePath.includes("\0")) {
|
||||||
|
console.warn("[FS Security] Rejected path with null byte:", filePath);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Normalize the path to prevent traversal tricks
|
||||||
|
const normalizedPath = normalize(resolve(filePath));
|
||||||
|
|
||||||
|
// Check if path was approved through a dialog
|
||||||
|
const isApproved = userApprovedPaths.has(normalizedPath);
|
||||||
|
|
||||||
|
if (!isApproved) {
|
||||||
|
console.warn(
|
||||||
|
"[FS Security] Rejected path - not approved through file dialog:",
|
||||||
|
filePath,
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
return isApproved;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Approves a path for file operations after user selection via dialog
|
||||||
|
*/
|
||||||
|
function approvePath(filePath: string): void {
|
||||||
|
const normalizedPath = normalize(resolve(filePath));
|
||||||
|
userApprovedPaths.add(normalizedPath);
|
||||||
|
console.log("[FS Security] Approved path:", normalizedPath);
|
||||||
|
}
|
||||||
|
|
||||||
|
ipcMain.handle("fs:readFile", async (_event, filePath: string) => {
|
||||||
|
// Validate path was approved by user
|
||||||
|
if (!isPathApproved(filePath)) {
|
||||||
|
throw new Error(
|
||||||
|
"Access denied: File path not approved. Please select the file through the file dialog.",
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
const buffer = await fs.readFile(filePath);
|
const buffer = await fs.readFile(filePath);
|
||||||
console.log("[FS] Read file:", filePath, "Size:", buffer.length);
|
console.log("[FS] Read file:", filePath, "Size:", buffer.length);
|
||||||
|
|
@ -274,7 +408,16 @@ ipcMain.handle("fs:readFile", async (_event, filePath) => {
|
||||||
}
|
}
|
||||||
});
|
});
|
||||||
|
|
||||||
ipcMain.handle("fs:writeFile", async (_event, filePath, data) => {
|
ipcMain.handle(
|
||||||
|
"fs:writeFile",
|
||||||
|
async (_event, filePath: string, data: number[]) => {
|
||||||
|
// Validate path was approved by user
|
||||||
|
if (!isPathApproved(filePath)) {
|
||||||
|
throw new Error(
|
||||||
|
"Access denied: File path not approved. Please select the file through the save dialog.",
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
await fs.writeFile(filePath, Buffer.from(data));
|
await fs.writeFile(filePath, Buffer.from(data));
|
||||||
console.log("[FS] Wrote file:", filePath);
|
console.log("[FS] Wrote file:", filePath);
|
||||||
|
|
@ -283,4 +426,5 @@ ipcMain.handle("fs:writeFile", async (_event, filePath, data) => {
|
||||||
console.error("[FS] Failed to write file:", err);
|
console.error("[FS] Failed to write file:", err);
|
||||||
throw err;
|
throw err;
|
||||||
}
|
}
|
||||||
});
|
},
|
||||||
|
);
|
||||||
|
|
|
||||||
17
index.html
17
index.html
|
|
@ -2,6 +2,23 @@
|
||||||
<html lang="en">
|
<html lang="en">
|
||||||
<head>
|
<head>
|
||||||
<meta charset="UTF-8" />
|
<meta charset="UTF-8" />
|
||||||
|
<!-- Content Security Policy - Strict local-only configuration -->
|
||||||
|
<meta
|
||||||
|
http-equiv="Content-Security-Policy"
|
||||||
|
content="
|
||||||
|
default-src 'self' app:;
|
||||||
|
script-src 'self' app: 'wasm-unsafe-eval';
|
||||||
|
style-src 'self' app: 'unsafe-inline';
|
||||||
|
img-src 'self' app: data: blob:;
|
||||||
|
font-src 'self' app: data:;
|
||||||
|
connect-src 'self' app:;
|
||||||
|
worker-src 'self' app: blob:;
|
||||||
|
child-src 'none';
|
||||||
|
object-src 'none';
|
||||||
|
base-uri 'self';
|
||||||
|
form-action 'none';
|
||||||
|
"
|
||||||
|
/>
|
||||||
<link rel="icon" type="image/svg+xml" href="/icon.svg" />
|
<link rel="icon" type="image/svg+xml" href="/icon.svg" />
|
||||||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||||||
<title>Respira</title>
|
<title>Respira</title>
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue