Localisation updates from https://translatewiki.net.
[mediawiki.git] / includes / api / ApiCSPReport.php
blob5fec7716d630daffa484ea99f48f3a88f56dfce6
1 <?php
2 /**
3 * Copyright © 2015 Brian Wolff
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
15 * You should have received a copy of the GNU General Public License along
16 * with this program; if not, write to the Free Software Foundation, Inc.,
17 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
18 * http://www.gnu.org/copyleft/gpl.html
20 * @file
23 namespace MediaWiki\Api;
25 use MediaWiki\Json\FormatJson;
26 use MediaWiki\Logger\LoggerFactory;
27 use MediaWiki\MainConfigNames;
28 use MediaWiki\Request\ContentSecurityPolicy;
29 use MediaWiki\Utils\UrlUtils;
30 use Psr\Log\LoggerInterface;
31 use Wikimedia\ParamValidator\ParamValidator;
33 /**
34 * Api module to receive and log CSP violation reports
36 * @ingroup API
38 class ApiCSPReport extends ApiBase {
40 private LoggerInterface $log;
42 /**
43 * These reports should be small. Ignore super big reports out of paranoia
45 private const MAX_POST_SIZE = 8192;
47 private UrlUtils $urlUtils;
49 public function __construct(
50 ApiMain $main,
51 string $action,
52 UrlUtils $urlUtils
53 ) {
54 parent::__construct( $main, $action );
55 $this->urlUtils = $urlUtils;
58 /**
59 * Logs a content-security-policy violation report from web browser.
61 public function execute() {
62 $reportOnly = $this->getParameter( 'reportonly' );
63 $logname = $reportOnly ? 'csp-report-only' : 'csp';
64 $this->log = LoggerFactory::getInstance( $logname );
65 $userAgent = $this->getRequest()->getHeader( 'user-agent' );
67 $this->verifyPostBodyOk();
68 $report = $this->getReport();
69 $flags = $this->getFlags( $report, $userAgent );
71 $warningText = $this->generateLogLine( $flags, $report );
72 $this->logReport( $flags, $warningText, [
73 // XXX Is it ok to put untrusted data into log??
74 'csp-report' => $report,
75 'method' => __METHOD__,
76 'user_id' => $this->getUser()->getId() ?: 'logged-out',
77 'user-agent' => $userAgent,
78 'source' => $this->getParameter( 'source' ),
79 ] );
80 $this->getResult()->addValue( null, $this->getModuleName(), 'success' );
83 /**
84 * Log CSP report, with a different severity depending on $flags
85 * @param array $flags Flags for this report
86 * @param string $logLine text of log entry
87 * @param array $context logging context
89 private function logReport( $flags, $logLine, $context ) {
90 if ( in_array( 'false-positive', $flags ) ) {
91 // These reports probably don't matter much
92 $this->log->debug( $logLine, $context );
93 } else {
94 // Normal report.
95 $this->log->warning( $logLine, $context );
99 /**
100 * Get extra notes about the report.
102 * @param array $report The CSP report
103 * @param string $userAgent
104 * @return array
106 private function getFlags( $report, $userAgent ) {
107 $reportOnly = $this->getParameter( 'reportonly' );
108 $source = $this->getParameter( 'source' );
109 $falsePositives = $this->getConfig()->get( MainConfigNames::CSPFalsePositiveUrls );
111 $flags = [];
112 if ( $source !== 'internal' ) {
113 $flags[] = 'source=' . $source;
115 if ( $reportOnly ) {
116 $flags[] = 'report-only';
119 if (
121 ContentSecurityPolicy::falsePositiveBrowser( $userAgent ) &&
122 $report['blocked-uri'] === "self"
123 ) ||
125 isset( $report['blocked-uri'] ) &&
126 $this->matchUrlPattern( $report['blocked-uri'], $falsePositives )
127 ) ||
129 isset( $report['source-file'] ) &&
130 $this->matchUrlPattern( $report['source-file'], $falsePositives )
133 // False positive due to:
134 // https://bugzilla.mozilla.org/show_bug.cgi?id=1026520
136 $flags[] = 'false-positive';
138 return $flags;
142 * @param string $url
143 * @param string[] $patterns
144 * @return bool
146 private function matchUrlPattern( $url, array $patterns ) {
147 if ( isset( $patterns[ $url ] ) ) {
148 return true;
151 $bits = $this->urlUtils->parse( $url );
152 if ( !$bits ) {
153 return false;
156 unset( $bits['user'], $bits['pass'], $bits['query'], $bits['fragment'] );
157 $bits['path'] = '';
158 $serverUrl = UrlUtils::assemble( $bits );
159 if ( isset( $patterns[$serverUrl] ) ) {
160 // The origin of the url matches a pattern,
161 // e.g. "https://example.org" matches "https://example.org/foo/b?a#r"
162 return true;
164 foreach ( $patterns as $pattern => $val ) {
165 // We only use this pattern if it ends in a slash, this prevents
166 // "/foos" from matching "/foo", and "https://good.combo.bad" matching
167 // "https://good.com".
168 if ( str_ends_with( $pattern, '/' ) && str_starts_with( $url, $pattern ) ) {
169 // The pattern starts with the same as the url
170 // e.g. "https://example.org/foo/" matches "https://example.org/foo/b?a#r"
171 return true;
175 return false;
179 * Output an api error if post body is obviously not OK.
181 private function verifyPostBodyOk() {
182 $req = $this->getRequest();
183 $contentType = $req->getHeader( 'content-type' );
184 if ( $contentType !== 'application/json'
185 && $contentType !== 'application/csp-report'
187 $this->error( 'wrongformat', __METHOD__ );
189 if ( $req->getHeader( 'content-length' ) > self::MAX_POST_SIZE ) {
190 $this->error( 'toobig', __METHOD__ );
195 * Get the report from post body and turn into associative array.
197 * @return array
199 private function getReport() {
200 $postBody = $this->getRequest()->getRawInput();
201 if ( strlen( $postBody ) > self::MAX_POST_SIZE ) {
202 // paranoia, already checked content-length earlier.
203 $this->error( 'toobig', __METHOD__ );
205 $status = FormatJson::parse( $postBody, FormatJson::FORCE_ASSOC );
206 if ( !$status->isGood() ) {
207 $msg = $status->getMessages()[0]->getKey();
208 $this->error( $msg, __METHOD__ );
211 $report = $status->getValue();
213 if ( !isset( $report['csp-report'] ) ) {
214 $this->error( 'missingkey', __METHOD__ );
216 return $report['csp-report'];
220 * Get text of log line.
222 * @param array $flags of additional markers for this report
223 * @param array $report the csp report
224 * @return string Text to put in log
226 private function generateLogLine( $flags, $report ) {
227 $flagText = '';
228 if ( $flags ) {
229 $flagText = '[' . implode( ', ', $flags ) . ']';
232 $blockedOrigin = isset( $report['blocked-uri'] )
233 ? $this->originFromUrl( $report['blocked-uri'] )
234 : 'n/a';
235 $page = $report['document-uri'] ?? 'n/a';
236 $line = isset( $report['line-number'] )
237 ? ':' . $report['line-number']
238 : '';
239 return $flagText .
240 ' Received CSP report: <' . $blockedOrigin . '>' .
241 ' blocked from being loaded on <' . $page . '>' . $line;
245 * @param string $url
246 * @return string
248 private function originFromUrl( $url ) {
249 $bits = $this->urlUtils->parse( $url ) ?? [];
250 unset( $bits['user'], $bits['pass'], $bits['query'], $bits['fragment'] );
251 $bits['path'] = '';
252 // e.g. "https://example.org" from "https://example.org/foo/b?a#r"
253 return UrlUtils::assemble( $bits );
257 * Stop processing the request, and output/log an error
259 * @param string $code error code
260 * @param string $method method that made error
261 * @throws ApiUsageException Always
263 private function error( $code, $method ) {
264 $this->log->info( 'Error reading CSP report: ' . $code, [
265 'method' => $method,
266 'user-agent' => $this->getRequest()->getHeader( 'user-agent' )
267 ] );
268 // Return 400 on error for user agents to display, e.g. to the console.
269 $this->dieWithError(
270 [ 'apierror-csp-report', wfEscapeWikiText( $code ) ], 'cspreport-' . $code, [], 400
274 public function getAllowedParams() {
275 return [
276 'reportonly' => [
277 ParamValidator::PARAM_TYPE => 'boolean',
278 ParamValidator::PARAM_DEFAULT => false
280 'source' => [
281 ParamValidator::PARAM_TYPE => 'string',
282 ParamValidator::PARAM_DEFAULT => 'internal',
283 ParamValidator::PARAM_REQUIRED => false
288 public function mustBePosted() {
289 return true;
293 * Mark as internal. This isn't meant to be used by normal api users
294 * @return bool
296 public function isInternal() {
297 return true;
301 * Even if you don't have read rights, we still want your report.
302 * @return bool
304 public function isReadMode() {
305 return false;
309 * Doesn't touch db, so max lag should be rather irrelevant.
311 * Also, this makes sure that reports aren't lost during lag events.
312 * @return bool
314 public function shouldCheckMaxLag() {
315 return false;
319 /** @deprecated class alias since 1.43 */
320 class_alias( ApiCSPReport::class, 'ApiCSPReport' );