mirror of
https://github.com/MercuryWorkshop/scramjet.git
synced 2025-05-13 06:20:02 -04:00
265 lines
7.6 KiB
TypeScript
265 lines
7.6 KiB
TypeScript
import { BareResponseFetch } from "@mercuryworkshop/bare-mux";
|
|
import IDBMap from "@webreflection/idb-map";
|
|
import { ParseResultType } from "parse-domain";
|
|
import { parse } from "path";
|
|
|
|
declare global {
|
|
interface Window {
|
|
ScramjetServiceWorker;
|
|
}
|
|
}
|
|
|
|
self.ScramjetServiceWorker = class ScramjetServiceWorker {
|
|
client: typeof self.$scramjet.shared.util.BareClient.prototype;
|
|
config: typeof self.$scramjet.config;
|
|
|
|
constructor(config = self.$scramjet.config) {
|
|
this.client = new self.$scramjet.shared.util.BareClient();
|
|
if (!config.prefix) config.prefix = "/scramjet/";
|
|
this.config = config;
|
|
}
|
|
|
|
route({ request }: FetchEvent) {
|
|
if (request.url.startsWith(location.origin + this.config.prefix))
|
|
return true;
|
|
else return false;
|
|
}
|
|
|
|
async fetch({ request }: FetchEvent) {
|
|
const urlParam = new URLSearchParams(new URL(request.url).search);
|
|
const { encodeUrl, decodeUrl } = self.$scramjet.shared.url;
|
|
const {
|
|
rewriteHeaders,
|
|
rewriteHtml,
|
|
rewriteJs,
|
|
rewriteCss,
|
|
rewriteWorkers,
|
|
} = self.$scramjet.shared.rewrite;
|
|
const { parseDomain } = self.$scramjet.shared.util;
|
|
|
|
if (urlParam.has("url")) {
|
|
return Response.redirect(
|
|
encodeUrl(urlParam.get("url"), new URL(urlParam.get("url")))
|
|
);
|
|
}
|
|
|
|
try {
|
|
const url = new URL(decodeUrl(request.url));
|
|
|
|
const cookieStore = new IDBMap(url.host, {
|
|
durability: "relaxed",
|
|
prefix: "Cookies",
|
|
});
|
|
|
|
const response: BareResponseFetch = await this.client.fetch(url, {
|
|
method: request.method,
|
|
body: request.body,
|
|
headers: request.headers,
|
|
credentials: "omit",
|
|
mode: request.mode === "cors" ? request.mode : "same-origin",
|
|
cache: request.cache,
|
|
redirect: request.redirect,
|
|
//@ts-ignore why the fuck is this not typed mircosoft
|
|
duplex: "half",
|
|
});
|
|
|
|
let responseBody;
|
|
const responseHeaders = rewriteHeaders(response.rawHeaders, url);
|
|
|
|
for (const cookie of (responseHeaders["set-cookie"] || []) as string[]) {
|
|
let cookieParsed = cookie.split(";").map((x) => x.trim().split("="));
|
|
|
|
let [key, value] = cookieParsed.shift();
|
|
value = value.replace('"', "");
|
|
|
|
const hostArg = cookieParsed.find((x) => x[0] === "Domain");
|
|
cookieParsed = cookieParsed.filter((x) => x[0] !== "Domain");
|
|
let host = hostArg ? hostArg[1] : undefined;
|
|
|
|
if (url.protocol === "http" && cookieParsed.includes(["Secure"]))
|
|
continue;
|
|
if (
|
|
cookieParsed.includes(["SameSite", "None"]) &&
|
|
!cookieParsed.includes(["Secure"])
|
|
)
|
|
continue;
|
|
|
|
if (host && host !== url.host) {
|
|
if (host.startsWith(".")) host = host.slice(1);
|
|
const urlDomain = parseDomain(url.hostname);
|
|
|
|
if (urlDomain.type === ParseResultType.Listed) {
|
|
const { subDomains: _, domain, topLevelDomains } = urlDomain;
|
|
if (!host.endsWith([domain, ...topLevelDomains].join(".")))
|
|
continue;
|
|
} else {
|
|
continue;
|
|
}
|
|
|
|
const realCookieStore = new IDBMap(host, {
|
|
durability: "relaxed",
|
|
prefix: "Cookies",
|
|
});
|
|
realCookieStore.set(key, {
|
|
value: value,
|
|
args: cookieParsed,
|
|
subdomain: true,
|
|
});
|
|
} else {
|
|
cookieStore.set(key, {
|
|
value: value,
|
|
args: cookieParsed,
|
|
subdomain: false,
|
|
});
|
|
}
|
|
}
|
|
|
|
for (let header in responseHeaders) {
|
|
// flatten everything past here
|
|
if (responseHeaders[header] instanceof Array)
|
|
responseHeaders[header] = responseHeaders[header][0];
|
|
}
|
|
|
|
if (response.body) {
|
|
switch (request.destination) {
|
|
case "iframe":
|
|
case "document":
|
|
if (
|
|
responseHeaders["content-type"]
|
|
?.toString()
|
|
?.startsWith("text/html")
|
|
) {
|
|
responseBody = rewriteHtml(await response.text(), url);
|
|
} else {
|
|
responseBody = response.body;
|
|
}
|
|
break;
|
|
case "script":
|
|
responseBody = rewriteJs(await response.text(), url);
|
|
break;
|
|
case "style":
|
|
responseBody = rewriteCss(await response.text(), url);
|
|
break;
|
|
case "sharedworker":
|
|
case "worker":
|
|
responseBody = rewriteWorkers(await response.text(), url);
|
|
break;
|
|
default:
|
|
responseBody = response.body;
|
|
break;
|
|
}
|
|
}
|
|
// downloads
|
|
if (["document", "iframe"].includes(request.destination)) {
|
|
const header = responseHeaders["content-disposition"];
|
|
|
|
// validate header and test for filename
|
|
if (!/\s*?((inline|attachment);\s*?)filename=/i.test(header)) {
|
|
// if filename= wasn"t specified then maybe the remote specified to download this as an attachment?
|
|
// if it"s invalid then we can still possibly test for the attachment/inline type
|
|
const type = /^\s*?attachment/i.test(header)
|
|
? "attachment"
|
|
: "inline";
|
|
|
|
// set the filename
|
|
const [filename] = new URL(response.finalURL).pathname
|
|
.split("/")
|
|
.slice(-1);
|
|
|
|
responseHeaders["content-disposition"] =
|
|
`${type}; filename=${JSON.stringify(filename)}`;
|
|
}
|
|
}
|
|
if (responseHeaders["accept"] === "text/event-stream") {
|
|
responseHeaders["content-type"] = "text/event-stream";
|
|
}
|
|
if (crossOriginIsolated) {
|
|
responseHeaders["Cross-Origin-Embedder-Policy"] = "require-corp";
|
|
}
|
|
|
|
return new Response(responseBody, {
|
|
headers: responseHeaders as HeadersInit,
|
|
status: response.status,
|
|
statusText: response.statusText,
|
|
});
|
|
} catch (err) {
|
|
if (!["document", "iframe"].includes(request.destination))
|
|
return new Response(undefined, { status: 500 });
|
|
|
|
console.error(err);
|
|
|
|
return renderError(err, decodeUrl(request.url));
|
|
}
|
|
}
|
|
};
|
|
|
|
function errorTemplate(trace: string, fetchedURL: string) {
|
|
// turn script into a data URI so we don"t have to escape any HTML values
|
|
const script = `
|
|
errorTrace.value = ${JSON.stringify(trace)};
|
|
fetchedURL.textContent = ${JSON.stringify(fetchedURL)};
|
|
for (const node of document.querySelectorAll("#hostname")) node.textContent = ${JSON.stringify(
|
|
location.hostname
|
|
)};
|
|
reload.addEventListener("click", () => location.reload());
|
|
version.textContent = "0.0.1";
|
|
`;
|
|
|
|
return `<!DOCTYPE html>
|
|
<html>
|
|
<head>
|
|
<meta charset="utf-8" />
|
|
<title>Error</title>
|
|
<style>
|
|
* { background-color: white }
|
|
</style>
|
|
</head>
|
|
<body>
|
|
<h1 id="errorTitle">Error processing your request</h1>
|
|
<hr />
|
|
<p>Failed to load <b id="fetchedURL"></b></p>
|
|
<p id="errorMessage">Internal Server Error</p>
|
|
<textarea id="errorTrace" cols="40" rows="10" readonly></textarea>
|
|
<p>Try:</p>
|
|
<ul>
|
|
<li>Checking your internet connection</li>
|
|
<li>Verifying you entered the correct address</li>
|
|
<li>Clearing the site data</li>
|
|
<li>Contacting <b id="hostname"></b>"s administrator</li>
|
|
<li>Verify the server isn"t censored</li>
|
|
</ul>
|
|
<p>If you"re the administrator of <b id="hostname"></b>, try:</p>
|
|
<ul>
|
|
<li>Restarting your server</li>
|
|
<li>Updating Scramjet</li>
|
|
<li>Troubleshooting the error on the <a href="https://github.com/MercuryWorkshop/scramjet" target="_blank">GitHub repository</a></li>
|
|
</ul>
|
|
<button id="reload">Reload</button>
|
|
<hr />
|
|
<p><i>Scramjet v<span id="version"></span></i></p>
|
|
<script src="${
|
|
"data:application/javascript," + encodeURIComponent(script)
|
|
}"></script>
|
|
</body>
|
|
</html>
|
|
`;
|
|
}
|
|
|
|
/**
|
|
*
|
|
* @param {unknown} err
|
|
* @param {string} fetchedURL
|
|
*/
|
|
function renderError(err, fetchedURL) {
|
|
const headers = {
|
|
"content-type": "text/html",
|
|
};
|
|
if (crossOriginIsolated) {
|
|
headers["Cross-Origin-Embedder-Policy"] = "require-corp";
|
|
}
|
|
|
|
return new Response(errorTemplate(String(err), fetchedURL), {
|
|
status: 500,
|
|
headers: headers,
|
|
});
|
|
}
|