line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package HTTP::SecureHeaders; |
2
|
13
|
|
|
13
|
|
578244
|
use strict; |
|
13
|
|
|
|
|
89
|
|
|
13
|
|
|
|
|
279
|
|
3
|
13
|
|
|
13
|
|
49
|
use warnings; |
|
13
|
|
|
|
|
16
|
|
|
13
|
|
|
|
|
239
|
|
4
|
|
|
|
|
|
|
|
5
|
13
|
|
|
13
|
|
45
|
use Carp (); |
|
13
|
|
|
|
|
15
|
|
|
13
|
|
|
|
|
118
|
|
6
|
13
|
|
|
13
|
|
40
|
use Scalar::Util (); |
|
13
|
|
|
|
|
14
|
|
|
13
|
|
|
|
|
1034
|
|
7
|
|
|
|
|
|
|
|
8
|
|
|
|
|
|
|
our $VERSION = "0.01"; |
9
|
|
|
|
|
|
|
|
10
|
|
|
|
|
|
|
our %DEFAULT_HEADERS = ( |
11
|
|
|
|
|
|
|
content_security_policy => "default-src 'self' https:; font-src 'self' https: data:; img-src 'self' https: data:; object-src 'none'; script-src https:; style-src 'self' https: 'unsafe-inline'", |
12
|
|
|
|
|
|
|
strict_transport_security => 'max-age=631138519', |
13
|
|
|
|
|
|
|
x_content_type_options => 'nosniff', |
14
|
|
|
|
|
|
|
x_download_options => 'noopen', |
15
|
|
|
|
|
|
|
x_frame_options => 'SAMEORIGIN', |
16
|
|
|
|
|
|
|
x_permitted_cross_domain_policies => 'none', |
17
|
|
|
|
|
|
|
x_xss_protection => '1; mode=block', |
18
|
|
|
|
|
|
|
referrer_policy => 'strict-origin-when-cross-origin', |
19
|
|
|
|
|
|
|
); |
20
|
|
|
|
|
|
|
|
21
|
|
|
|
|
|
|
our %HTTP_FIELD_MAP = ( |
22
|
|
|
|
|
|
|
content_security_policy => 'Content-Security-Policy', |
23
|
|
|
|
|
|
|
strict_transport_security => 'Strict-Transport-Security', |
24
|
|
|
|
|
|
|
x_content_type_options => 'X-Content-Type-Options', |
25
|
|
|
|
|
|
|
x_download_options => 'X-Download-Options', |
26
|
|
|
|
|
|
|
x_frame_options => 'X-Frame-Options', |
27
|
|
|
|
|
|
|
x_permitted_cross_domain_policies => 'X-Permitted-Cross-Domain-Policies', |
28
|
|
|
|
|
|
|
x_xss_protection => 'X-XSS-Protection', |
29
|
|
|
|
|
|
|
referrer_policy => 'Referrer-Policy', |
30
|
|
|
|
|
|
|
); |
31
|
|
|
|
|
|
|
|
32
|
13
|
|
|
13
|
|
67
|
use constant OPT_OUT => \""; |
|
13
|
|
|
|
|
16
|
|
|
13
|
|
|
|
|
12936
|
|
33
|
|
|
|
|
|
|
|
34
|
|
|
|
|
|
|
sub new { |
35
|
20
|
|
|
20
|
1
|
34133
|
my ($class, %args) = @_; |
36
|
|
|
|
|
|
|
|
37
|
20
|
|
|
|
|
93
|
my %fields = (%DEFAULT_HEADERS, %args); |
38
|
|
|
|
|
|
|
|
39
|
20
|
|
|
|
|
68
|
for my $field (keys %fields) { |
40
|
147
|
100
|
|
|
|
223
|
unless (exists $HTTP_FIELD_MAP{$field}) { |
41
|
1
|
|
|
|
|
115
|
Carp::croak sprintf('unknown HTTP field. %s', $field); |
42
|
|
|
|
|
|
|
} |
43
|
|
|
|
|
|
|
|
44
|
146
|
|
|
|
|
164
|
my $value = $fields{$field}; |
45
|
146
|
|
|
|
|
351
|
my $checker = $class->can("check_$field"); |
46
|
146
|
100
|
|
|
|
237
|
unless ($checker) { |
47
|
1
|
|
|
|
|
69
|
Carp::croak sprintf('cannot find check function. %s', "check_$field") |
48
|
|
|
|
|
|
|
} |
49
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
|
# undef value is available for optout from headers |
51
|
145
|
100
|
|
|
|
170
|
next unless defined $value; |
52
|
|
|
|
|
|
|
|
53
|
142
|
100
|
|
|
|
169
|
unless ($checker->($value)) { |
54
|
1
|
|
|
|
|
66
|
Carp::croak sprintf('invalid HTTP header value. %s:%s', $field, $value); |
55
|
|
|
|
|
|
|
} |
56
|
|
|
|
|
|
|
} |
57
|
|
|
|
|
|
|
|
58
|
17
|
|
|
|
|
49
|
bless \%fields, $class; |
59
|
|
|
|
|
|
|
} |
60
|
|
|
|
|
|
|
|
61
|
|
|
|
|
|
|
sub apply { |
62
|
16
|
|
|
16
|
1
|
6248
|
my ($self, $headers) = @_; |
63
|
|
|
|
|
|
|
|
64
|
16
|
|
|
|
|
40
|
my @fields = keys %$self; |
65
|
16
|
|
|
|
|
23
|
for my $field (@fields) { |
66
|
100
|
|
|
|
|
498
|
$self->_apply($headers, $field); |
67
|
|
|
|
|
|
|
} |
68
|
|
|
|
|
|
|
} |
69
|
|
|
|
|
|
|
|
70
|
|
|
|
|
|
|
sub _apply { |
71
|
100
|
|
|
100
|
|
112
|
my ($self, $headers, $field) = @_; |
72
|
|
|
|
|
|
|
|
73
|
100
|
|
|
|
|
106
|
my $http_field = $HTTP_FIELD_MAP{$field}; |
74
|
|
|
|
|
|
|
|
75
|
100
|
100
|
|
|
|
178
|
unless (Scalar::Util::blessed($headers)) { |
76
|
1
|
|
|
|
|
94
|
Carp::croak sprintf('headers must be HTTP::Headers or HasMethods["exists","get","set"]. %s', $headers); |
77
|
|
|
|
|
|
|
} |
78
|
|
|
|
|
|
|
|
79
|
99
|
100
|
100
|
|
|
357
|
if ($headers->isa('HTTP::Headers')) { |
|
|
100
|
100
|
|
|
|
|
80
|
48
|
100
|
|
|
|
161
|
if (defined $headers->header($http_field)) { |
81
|
2
|
100
|
|
|
|
10
|
if ($headers->header($http_field) eq OPT_OUT) { |
82
|
1
|
|
|
|
|
7
|
$headers->header($http_field, undef) |
83
|
|
|
|
|
|
|
} |
84
|
|
|
|
|
|
|
} |
85
|
|
|
|
|
|
|
else { |
86
|
46
|
|
|
|
|
229
|
$headers->header($http_field, $self->{$field}) |
87
|
|
|
|
|
|
|
} |
88
|
|
|
|
|
|
|
} |
89
|
|
|
|
|
|
|
elsif ($headers->can('exists') && $headers->can('get') && $headers->can('set')) { |
90
|
48
|
100
|
|
|
|
69
|
if (defined $headers->get($http_field)) { |
|
|
100
|
|
|
|
|
|
91
|
2
|
100
|
|
|
|
9
|
if ($headers->get($http_field) eq OPT_OUT) { |
92
|
1
|
|
|
|
|
5
|
$headers->set($http_field, undef); |
93
|
|
|
|
|
|
|
} |
94
|
|
|
|
|
|
|
} |
95
|
|
|
|
|
|
|
elsif (!$headers->exists($http_field)) { |
96
|
45
|
|
|
|
|
286
|
$headers->set($http_field, $self->{$field}) |
97
|
|
|
|
|
|
|
} |
98
|
|
|
|
|
|
|
} |
99
|
|
|
|
|
|
|
else { |
100
|
3
|
|
|
|
|
196
|
Carp::croak sprintf('unknown headers: %s', $headers); |
101
|
|
|
|
|
|
|
} |
102
|
|
|
|
|
|
|
} |
103
|
|
|
|
|
|
|
|
104
|
|
|
|
|
|
|
# refs https://w3c.github.io/webappsec-csp/#csp-header |
105
|
|
|
|
|
|
|
{ |
106
|
|
|
|
|
|
|
my $directive_map = { |
107
|
|
|
|
|
|
|
# TODO implements directive_value checker |
108
|
|
|
|
|
|
|
'child-src' => sub { 1 }, # serialized-source-list |
109
|
|
|
|
|
|
|
'connect-src' => sub { 1 }, # serialized-source-list |
110
|
|
|
|
|
|
|
'default-src' => sub { 1 }, # serialized-source-list |
111
|
|
|
|
|
|
|
'font-src' => sub { 1 }, # serialized-source-list |
112
|
|
|
|
|
|
|
'frame-src' => sub { 1 }, # serialized-source-list |
113
|
|
|
|
|
|
|
'img-src' => sub { 1 }, # serialized-source-list |
114
|
|
|
|
|
|
|
'manifest-src' => sub { 1 }, # serialized-source-list |
115
|
|
|
|
|
|
|
'media-src' => sub { 1 }, # serialized-source-list |
116
|
|
|
|
|
|
|
'object-src' => sub { 1 }, # serialized-source-list |
117
|
|
|
|
|
|
|
'prefetch-src' => sub { 1 }, # serialized-source-list |
118
|
|
|
|
|
|
|
'script-src' => sub { 1 }, # serialized-source-list |
119
|
|
|
|
|
|
|
'script-src-elem' => sub { 1 }, # serialized-source-list |
120
|
|
|
|
|
|
|
'script-src-attr' => sub { 1 }, # serialized-source-list |
121
|
|
|
|
|
|
|
'style-src' => sub { 1 }, # serialized-source-list |
122
|
|
|
|
|
|
|
'style-src-elem' => sub { 1 }, # serialized-source-list |
123
|
|
|
|
|
|
|
'style-src-attr' => sub { 1 }, # serialized-source-list |
124
|
|
|
|
|
|
|
'webrtc' => sub { $_[0] eq "'allow'" or $_[0] eq "'block'" }, |
125
|
|
|
|
|
|
|
'worker-src' => sub { 1 }, # serialized-source-list |
126
|
|
|
|
|
|
|
'base-uri' => sub { 1 }, # serialized-source-list |
127
|
|
|
|
|
|
|
'sandbox' => sub { 1 }, # "" / token *( required-ascii-whitespace token ), |
128
|
|
|
|
|
|
|
'form-action' => sub { 1 }, # serialized-source-list |
129
|
|
|
|
|
|
|
'frame-ancestors' => sub { 1 }, # ancestor-source-list |
130
|
|
|
|
|
|
|
'navigate-to' => sub { 1 }, # serialized-source-list |
131
|
|
|
|
|
|
|
'report-uri' => sub { 1 }, # uri-reference *( required-ascii-whitespace uri-reference ) |
132
|
|
|
|
|
|
|
'report-to' => sub { 1 }, # token |
133
|
|
|
|
|
|
|
}; |
134
|
|
|
|
|
|
|
|
135
|
|
|
|
|
|
|
sub check_content_security_policy { |
136
|
|
|
|
|
|
|
# serialized-directive *( optional-ascii-whitespace ";" [ optional-ascii-whitespace serialized-directive ] ) |
137
|
|
|
|
|
|
|
|
138
|
|
|
|
|
|
|
# serialized-directive = directive-name [ required-ascii-whitespace directive-value ] |
139
|
|
|
|
|
|
|
# directive-name = 1*( ALPHA / DIGIT / "-" ) |
140
|
|
|
|
|
|
|
# directive-value = *( required-ascii-whitespace / ( %x21-%x2B / %x2D-%x3A / %x3C-%x7E ) ) |
141
|
|
|
|
|
|
|
# ; Directive values may contain whitespace and VCHAR characters, |
142
|
|
|
|
|
|
|
# ; excluding ";" and ",". The second half of the definition |
143
|
|
|
|
|
|
|
# ; above represents all VCHAR characters (%x21-%x7E) |
144
|
|
|
|
|
|
|
# ; without ";" and "," (%x3B and %x2C respectively) |
145
|
|
|
|
|
|
|
|
146
|
29
|
|
|
29
|
0
|
6694
|
my @directives = split ';', $_[0]; |
147
|
29
|
|
|
|
|
51
|
for my $directive (@directives) { |
148
|
109
|
|
|
|
|
367
|
my ($name, $value) = $directive =~ m!\s?([A-Za-z0-9\-]+)\s([^\s;,][^;,]+)!; |
149
|
109
|
100
|
66
|
|
|
298
|
unless ($name && $value) { |
150
|
4
|
|
|
|
|
16
|
return !!0 |
151
|
|
|
|
|
|
|
} |
152
|
105
|
|
|
|
|
147
|
my $checker = $directive_map->{$name}; |
153
|
105
|
100
|
|
|
|
136
|
unless ($checker) { |
154
|
2
|
|
|
|
|
10
|
return !!0 |
155
|
|
|
|
|
|
|
} |
156
|
103
|
100
|
|
|
|
143
|
unless ($checker->($value)) { |
157
|
1
|
|
|
|
|
5
|
return !!0 |
158
|
|
|
|
|
|
|
} |
159
|
|
|
|
|
|
|
} |
160
|
22
|
|
|
|
|
68
|
return !!1; |
161
|
|
|
|
|
|
|
} |
162
|
|
|
|
|
|
|
} |
163
|
|
|
|
|
|
|
|
164
|
|
|
|
|
|
|
|
165
|
|
|
|
|
|
|
# refs https://datatracker.ietf.org/doc/html/rfc6797 |
166
|
|
|
|
|
|
|
# refs https://www.chromium.org/hsts/ |
167
|
|
|
|
|
|
|
sub check_strict_transport_security { |
168
|
33
|
|
|
33
|
0
|
5844
|
$_[0] =~ m!\Amax-age=(?:[0-9]+)(?:\s?;\s?includeSubDomains)?(?:\s?;\s?preload)?\z! |
169
|
|
|
|
|
|
|
} |
170
|
|
|
|
|
|
|
|
171
|
|
|
|
|
|
|
# refs http://blogs.msdn.com/b/ie/archive/2008/07/02/ie8-security-part-v-comprehensive-protection.aspx |
172
|
|
|
|
|
|
|
sub check_x_content_type_options { |
173
|
20
|
|
|
20
|
0
|
2739
|
$_[0] eq 'nosniff' |
174
|
|
|
|
|
|
|
} |
175
|
|
|
|
|
|
|
|
176
|
|
|
|
|
|
|
# refs http://blogs.msdn.com/b/ie/archive/2008/07/02/ie8-security-part-v-comprehensive-protection.aspx |
177
|
|
|
|
|
|
|
sub check_x_download_options { |
178
|
19
|
|
|
19
|
0
|
2606
|
$_[0] eq 'noopen' |
179
|
|
|
|
|
|
|
} |
180
|
|
|
|
|
|
|
|
181
|
|
|
|
|
|
|
# refs https://www.rfc-editor.org/rfc/rfc7034#section-2 |
182
|
|
|
|
|
|
|
sub check_x_frame_options { |
183
|
24
|
100
|
|
24
|
0
|
3581
|
$_[0] eq 'SAMEORIGIN' or |
184
|
|
|
|
|
|
|
$_[0] eq 'DENY' |
185
|
|
|
|
|
|
|
# ALLOW-FROM # deprecated |
186
|
|
|
|
|
|
|
} |
187
|
|
|
|
|
|
|
|
188
|
|
|
|
|
|
|
# refs https://www.adobe.com/devnet-docs/acrobatetk/tools/AppSec/CrossDomain_PolicyFile_Specification.pdf |
189
|
|
|
|
|
|
|
sub check_x_permitted_cross_domain_policies { |
190
|
25
|
|
|
25
|
0
|
3865
|
$_[0] =~ m!\A(?:none|master-only|by-content-type|by-ftp-filename|all)\z! |
191
|
|
|
|
|
|
|
} |
192
|
|
|
|
|
|
|
|
193
|
|
|
|
|
|
|
# refs https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection |
194
|
|
|
|
|
|
|
sub check_x_xss_protection { |
195
|
23
|
100
|
100
|
23
|
0
|
4443
|
$_[0] eq '0' or |
196
|
|
|
|
|
|
|
$_[0] eq '1' or |
197
|
|
|
|
|
|
|
$_[0] eq '1; mode=block' |
198
|
|
|
|
|
|
|
|
199
|
|
|
|
|
|
|
# `report=` directive not recommend |
200
|
|
|
|
|
|
|
} |
201
|
|
|
|
|
|
|
|
202
|
|
|
|
|
|
|
# refs https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-header |
203
|
|
|
|
|
|
|
{ |
204
|
|
|
|
|
|
|
my $referrer_policy_values = { |
205
|
|
|
|
|
|
|
'strict-origin-when-cross-origin' => 1, |
206
|
|
|
|
|
|
|
'no-referrer' => 1, |
207
|
|
|
|
|
|
|
'no-referrer-when-downgrade' => 1, |
208
|
|
|
|
|
|
|
'same-origin' => 1, |
209
|
|
|
|
|
|
|
'origin' => 1, |
210
|
|
|
|
|
|
|
'strict-origin' => 1, |
211
|
|
|
|
|
|
|
'origin-when-cross-origin' => 1, |
212
|
|
|
|
|
|
|
'unsafe-url' => 1, |
213
|
|
|
|
|
|
|
}; |
214
|
|
|
|
|
|
|
|
215
|
|
|
|
|
|
|
# empty string cannot pass. |
216
|
|
|
|
|
|
|
sub check_referrer_policy { |
217
|
29
|
|
|
29
|
0
|
4576
|
exists $referrer_policy_values->{$_[0]} |
218
|
|
|
|
|
|
|
} |
219
|
|
|
|
|
|
|
} |
220
|
|
|
|
|
|
|
|
221
|
|
|
|
|
|
|
1; |
222
|
|
|
|
|
|
|
__END__ |