diff --git a/src/worker/error.ts b/src/worker/error.ts new file mode 100644 index 0000000..a7dcb57 --- /dev/null +++ b/src/worker/error.ts @@ -0,0 +1,66 @@ + +export function errorTemplate(trace: string, fetchedURL: string) { + // turn script into a data URI so we don"t have to escape any HTML values + const script = ` + errorTrace.value = ${JSON.stringify(trace)}; + fetchedURL.textContent = ${JSON.stringify(fetchedURL)}; + for (const node of document.querySelectorAll("#hostname")) node.textContent = ${JSON.stringify( + location.hostname + )}; + reload.addEventListener("click", () => location.reload()); + version.textContent = "0.0.1"; + `; + + return ` + +
+ +Failed to load
+Internal Server Error
+ +Try:
+If you"re the administrator of , try:
+Scramjet v
+ + + + `; +} + +export function renderError(err: unknown, fetchedURL: string) { + const headers = { + "content-type": "text/html", + }; + if (crossOriginIsolated) { + headers["Cross-Origin-Embedder-Policy"] = "require-corp"; + } + + return new Response(errorTemplate(String(err), fetchedURL), { + status: 500, + headers: headers, + }); +} + diff --git a/src/worker/fetch.ts b/src/worker/fetch.ts new file mode 100644 index 0000000..d19d8c4 --- /dev/null +++ b/src/worker/fetch.ts @@ -0,0 +1,173 @@ +import { BareResponseFetch } from "@mercuryworkshop/bare-mux"; +import IDBMap from "@webreflection/idb-map"; +import { ParseResultType } from "parse-domain"; +import { ScramjetServiceWorker } from "."; +import { renderError } from "./error"; + +export async function swfetch(this: ScramjetServiceWorker, { request }: FetchEvent) { + const urlParam = new URLSearchParams(new URL(request.url).search); + const { encodeUrl, decodeUrl } = self.$scramjet.shared.url; + const { + rewriteHeaders, + rewriteHtml, + rewriteJs, + rewriteCss, + rewriteWorkers, + } = self.$scramjet.shared.rewrite; + const { parseDomain } = self.$scramjet.shared.util; + + if (urlParam.has("url")) { + return Response.redirect( + encodeUrl(urlParam.get("url"), new URL(urlParam.get("url"))) + ); + } + + try { + const url = new URL(decodeUrl(request.url)); + + const cookieStore = new IDBMap(url.host, { + durability: "relaxed", + prefix: "Cookies", + }); + + const response: BareResponseFetch = await this.client.fetch(url, { + method: request.method, + body: request.body, + headers: request.headers, + credentials: "omit", + mode: request.mode === "cors" ? request.mode : "same-origin", + cache: request.cache, + redirect: request.redirect, + //@ts-ignore why the fuck is this not typed mircosoft + duplex: "half", + }); + + let responseBody; + const responseHeaders = rewriteHeaders(response.rawHeaders, url); + + for (const cookie of (responseHeaders["set-cookie"] || []) as string[]) { + let cookieParsed = cookie.split(";").map((x) => x.trim().split("=")); + + let [key, value] = cookieParsed.shift(); + if (!value) continue; + value = value.replace("\"", ""); + + const hostArg = cookieParsed.find((x) => x[0] === "Domain"); + cookieParsed = cookieParsed.filter((x) => x[0] !== "Domain"); + let host = hostArg ? hostArg[1] : undefined; + + if (url.protocol === "http" && cookieParsed.includes(["Secure"])) + continue; + if ( + cookieParsed.includes(["SameSite", "None"]) && + !cookieParsed.includes(["Secure"]) + ) + continue; + + if (host && host !== url.host) { + if (host.startsWith(".")) host = host.slice(1); + const urlDomain = parseDomain(url.hostname); + + if (urlDomain.type === ParseResultType.Listed) { + const { subDomains: domain, topLevelDomains } = urlDomain; + if (!host.endsWith([domain, ...topLevelDomains].join("."))) + continue; + } else { + continue; + } + + const realCookieStore = new IDBMap(host, { + durability: "relaxed", + prefix: "Cookies", + }); + realCookieStore.set(key, { + value: value, + args: cookieParsed, + subdomain: true, + }); + } else { + cookieStore.set(key, { + value: value, + args: cookieParsed, + subdomain: false, + }); + } + } + + for (const header in responseHeaders) { + // flatten everything past here + if (Array.isArray(responseHeaders[header])) + responseHeaders[header] = responseHeaders[header][0]; + } + + if (response.body) { + switch (request.destination) { + case "iframe": + case "document": + if ( + responseHeaders["content-type"] + ?.toString() + ?.startsWith("text/html") + ) { + responseBody = rewriteHtml(await response.text(), url); + } else { + responseBody = response.body; + } + break; + case "script": + // responseBody = rewriteJs(await response.text(), url); + responseBody = rewriteJs(await response.text()); + break; + case "style": + responseBody = rewriteCss(await response.text(), url); + break; + case "sharedworker": + case "worker": + responseBody = rewriteWorkers(await response.text(), url); + break; + default: + responseBody = response.body; + break; + } + } + // downloads + if (["document", "iframe"].includes(request.destination)) { + const header = responseHeaders["content-disposition"]; + + // validate header and test for filename + if (!/\s*?((inline|attachment);\s*?)filename=/i.test(header)) { + // if filename= wasn"t specified then maybe the remote specified to download this as an attachment? + // if it"s invalid then we can still possibly test for the attachment/inline type + const type = /^\s*?attachment/i.test(header) + ? "attachment" + : "inline"; + + // set the filename + const [filename] = new URL(response.finalURL).pathname + .split("/") + .slice(-1); + + responseHeaders["content-disposition"] = + `${type}; filename=${JSON.stringify(filename)}`; + } + } + if (responseHeaders["accept"] === "text/event-stream") { + responseHeaders["content-type"] = "text/event-stream"; + } + if (crossOriginIsolated) { + responseHeaders["Cross-Origin-Embedder-Policy"] = "require-corp"; + } + + return new Response(responseBody, { + headers: responseHeaders as HeadersInit, + status: response.status, + statusText: response.statusText, + }); + } catch (err) { + console.error("ERROR FROM SERVICE WORKER FETCH", err); + if (!["document", "iframe"].includes(request.destination)) + return new Response(undefined, { status: 500 }); + + return renderError(err, decodeUrl(request.url)); + } +} diff --git a/src/worker/index.ts b/src/worker/index.ts index 364d2b0..1c471e2 100644 --- a/src/worker/index.ts +++ b/src/worker/index.ts @@ -1,15 +1,13 @@ -import { BareResponseFetch } from "@mercuryworkshop/bare-mux"; -import IDBMap from "@webreflection/idb-map"; -import { ParseResultType } from "parse-domain"; -// import { parse } from "path"; +import { swfetch } from "./fetch"; declare global { interface Window { ScramjetServiceWorker; + ScramjetThread; } } -self.ScramjetServiceWorker = class ScramjetServiceWorker { +export class ScramjetServiceWorker { client: typeof self.$scramjet.shared.util.BareClient.prototype; config: typeof self.$scramjet.config; @@ -25,243 +23,10 @@ self.ScramjetServiceWorker = class ScramjetServiceWorker { else return false; } - async fetch({ request }: FetchEvent) { - const urlParam = new URLSearchParams(new URL(request.url).search); - const { encodeUrl, decodeUrl } = self.$scramjet.shared.url; - const { - rewriteHeaders, - rewriteHtml, - rewriteJs, - rewriteCss, - rewriteWorkers, - } = self.$scramjet.shared.rewrite; - const { parseDomain } = self.$scramjet.shared.util; - - if (urlParam.has("url")) { - return Response.redirect( - encodeUrl(urlParam.get("url"), new URL(urlParam.get("url"))) - ); - } - - try { - const url = new URL(decodeUrl(request.url)); - - const cookieStore = new IDBMap(url.host, { - durability: "relaxed", - prefix: "Cookies", - }); - - const response: BareResponseFetch = await this.client.fetch(url, { - method: request.method, - body: request.body, - headers: request.headers, - credentials: "omit", - mode: request.mode === "cors" ? request.mode : "same-origin", - cache: request.cache, - redirect: request.redirect, - //@ts-ignore why the fuck is this not typed mircosoft - duplex: "half", - }); - - let responseBody; - const responseHeaders = rewriteHeaders(response.rawHeaders, url); - - for (const cookie of (responseHeaders["set-cookie"] || []) as string[]) { - let cookieParsed = cookie.split(";").map((x) => x.trim().split("=")); - - let [key, value] = cookieParsed.shift(); - if (!value) continue; - value = value.replace("\"", ""); - - const hostArg = cookieParsed.find((x) => x[0] === "Domain"); - cookieParsed = cookieParsed.filter((x) => x[0] !== "Domain"); - let host = hostArg ? hostArg[1] : undefined; - - if (url.protocol === "http" && cookieParsed.includes(["Secure"])) - continue; - if ( - cookieParsed.includes(["SameSite", "None"]) && - !cookieParsed.includes(["Secure"]) - ) - continue; - - if (host && host !== url.host) { - if (host.startsWith(".")) host = host.slice(1); - const urlDomain = parseDomain(url.hostname); - - if (urlDomain.type === ParseResultType.Listed) { - const { subDomains: domain, topLevelDomains } = urlDomain; - if (!host.endsWith([domain, ...topLevelDomains].join("."))) - continue; - } else { - continue; - } - - const realCookieStore = new IDBMap(host, { - durability: "relaxed", - prefix: "Cookies", - }); - realCookieStore.set(key, { - value: value, - args: cookieParsed, - subdomain: true, - }); - } else { - cookieStore.set(key, { - value: value, - args: cookieParsed, - subdomain: false, - }); - } - } - - for (const header in responseHeaders) { - // flatten everything past here - if (Array.isArray(responseHeaders[header])) - responseHeaders[header] = responseHeaders[header][0]; - } - - if (response.body) { - switch (request.destination) { - case "iframe": - case "document": - if ( - responseHeaders["content-type"] - ?.toString() - ?.startsWith("text/html") - ) { - responseBody = rewriteHtml(await response.text(), url); - } else { - responseBody = response.body; - } - break; - case "script": - // responseBody = rewriteJs(await response.text(), url); - responseBody = rewriteJs(await response.text()); - break; - case "style": - responseBody = rewriteCss(await response.text(), url); - break; - case "sharedworker": - case "worker": - responseBody = rewriteWorkers(await response.text(), url); - break; - default: - responseBody = response.body; - break; - } - } - // downloads - if (["document", "iframe"].includes(request.destination)) { - const header = responseHeaders["content-disposition"]; - - // validate header and test for filename - if (!/\s*?((inline|attachment);\s*?)filename=/i.test(header)) { - // if filename= wasn"t specified then maybe the remote specified to download this as an attachment? - // if it"s invalid then we can still possibly test for the attachment/inline type - const type = /^\s*?attachment/i.test(header) - ? "attachment" - : "inline"; - - // set the filename - const [filename] = new URL(response.finalURL).pathname - .split("/") - .slice(-1); - - responseHeaders["content-disposition"] = - `${type}; filename=${JSON.stringify(filename)}`; - } - } - if (responseHeaders["accept"] === "text/event-stream") { - responseHeaders["content-type"] = "text/event-stream"; - } - if (crossOriginIsolated) { - responseHeaders["Cross-Origin-Embedder-Policy"] = "require-corp"; - } - - return new Response(responseBody, { - headers: responseHeaders as HeadersInit, - status: response.status, - statusText: response.statusText, - }); - } catch (err) { - if (!["document", "iframe"].includes(request.destination)) - return new Response(undefined, { status: 500 }); - - console.log("FOUND ERROR"); - console.error(err); - - return renderError(err, decodeUrl(request.url)); - } - } + public fetch = swfetch; }; -function errorTemplate(trace: string, fetchedURL: string) { - // turn script into a data URI so we don"t have to escape any HTML values - const script = ` - errorTrace.value = ${JSON.stringify(trace)}; - fetchedURL.textContent = ${JSON.stringify(fetchedURL)}; - for (const node of document.querySelectorAll("#hostname")) node.textContent = ${JSON.stringify( - location.hostname - )}; - reload.addEventListener("click", () => location.reload()); - version.textContent = "0.0.1"; - `; - return ` - - - -Failed to load
-Internal Server Error
- -Try:
-If you"re the administrator of , try:
-Scramjet v
- - - - `; -} -/** - * - * @param {unknown} err - * @param {string} fetchedURL - */ -function renderError(err, fetchedURL) { - const headers = { - "content-type": "text/html", - }; - if (crossOriginIsolated) { - headers["Cross-Origin-Embedder-Policy"] = "require-corp"; - } - return new Response(errorTemplate(String(err), fetchedURL), { - status: 500, - headers: headers, - }); -} +self.ScramjetServiceWorker = ScramjetServiceWorker;