xgqfrms™, xgqfrms® : xgqfrms's offical website of cnblogs! xgqfrms™, xgqfrms® : xgqfrms's offical website of GitHub!

Electron Security All In One

Electron Security All In One

https://www.electronjs.org/docs/tutorial/security

CSP

Content-Security-Policy


Electron Security Warning (Insecure Content-Security-Policy) This renderer process has either no Content Security Policy set or a policy with "unsafe-eval" enabled.
This exposes users of this app to unnecessary security risks.

For more information and help, consult
https://electronjs.org/docs/tutorial/security.
This warning will not show up
once the app is packaged.
(anonymous) @ electron/js2c/renderer_init.js:111

            "./lib/renderer/security-warnings.ts": /*!*******************************************!*\
  !*** ./lib/renderer/security-warnings.ts ***!
  \*******************************************/
            /*! no static exports found */
            function(e, t, r) {
                "use strict";
                (function(e) {
                    Object.defineProperty(t, "__esModule", {
                        value: !0
                    });
                    const n = r(/*! electron */
                    "./lib/renderer/api/exports/electron.ts")
                      , i = r(/*! @electron/internal/renderer/ipc-renderer-internal */
                    "./lib/renderer/ipc-renderer-internal.ts");
                    let o = null;
                    const {platform: s, execPath: a, env: c} = e
                      , getIsRemoteProtocol = function() {
                        if (window && window.location && window.location.protocol)
                            return /^(http|ftp)s?/gi.test(window.location.protocol)
                    }
                      , isLocalhost = function() {
                        return !(!window || !window.location) && "localhost" === window.location.hostname
                    }
                      , l = "\nFor more information and help, consult\nhttps://electronjs.org/docs/tutorial/security.\nThis warning will not show up\nonce the app is packaged."
                      , warnAboutInsecureCSP = function() {
                        n.webFrame._executeJavaScript(`(${(()=>{
                            try {
                                new Function("")
                            } catch {
                                return !1
                            }
                            return !0
                        }
                        ).toString()})()`, !1).then(e=>{
                            if (!e)
                                return;
                            const t = `This renderer process has either no Content Security\n    Policy set or a policy with "unsafe-eval" enabled. This exposes users of\n    this app to unnecessary security risks.\n${l}`;
                            console.warn("%cElectron Security Warning (Insecure Content-Security-Policy)", "font-weight: bold;", t)
                        }
                        )
                    }
                      , logSecurityWarnings = function(e, t) {
                        !function(e) {
                            if (e && !isLocalhost() && getIsRemoteProtocol()) {
                                const e = `This renderer process has Node.js integration enabled\n    and attempted to load remote content from '${window.location}'. This\n    exposes users of this app to severe security risks.\n${l}`;
                                console.warn("%cElectron Security Warning (Node.js Integration with Remote Content)", "font-weight: bold;", e)
                            }
                        }(t),
                        function(e) {
                            if (!e || !1 !== e.webSecurity)
                                return;
                            const t = `This renderer process has "webSecurity" disabled. This\n  exposes users of this app to severe security risks.\n${l}`;
                            console.warn("%cElectron Security Warning (Disabled webSecurity)", "font-weight: bold;", t)
                        }(e),
                        function() {
                            if (!window || !window.performance || !window.performance.getEntriesByType)
                                return;
                            const e = window.performance.getEntriesByType("resource").filter(({name: e})=>/^(http|ftp):/gi.test(e || "")).filter(({name: e})=>"localhost" !== new URL(e).hostname).map(({name: e})=>`- ${e}`).join("\n");
                            if (!e || 0 === e.length)
                                return;
                            const t = `This renderer process loads resources using insecure\n  protocols. This exposes users of this app to unnecessary security risks.\n  Consider loading the following resources over HTTPS or FTPS. \n${e}\n  \n${l}`;
                            console.warn("%cElectron Security Warning (Insecure Resources)", "font-weight: bold;", t)
                        }(),
                        function(e) {
                            if (!e || !e.allowRunningInsecureContent)
                                return;
                            const t = `This renderer process has "allowRunningInsecureContent"\n  enabled. This exposes users of this app to severe security risks.\n\n  ${l}`;
                            console.warn("%cElectron Security Warning (allowRunningInsecureContent)", "font-weight: bold;", t)
                        }(e),
                        function(e) {
                            if (!e || !e.experimentalFeatures)
                                return;
                            const t = `This renderer process has "experimentalFeatures" enabled.\n  This exposes users of this app to some security risk. If you do not need\n  this feature, you should disable it.\n${l}`;
                            console.warn("%cElectron Security Warning (experimentalFeatures)", "font-weight: bold;", t)
                        }(e),
                        function(e) {
                            if (!e || !Object.prototype.hasOwnProperty.call(e, "enableBlinkFeatures") || e.enableBlinkFeatures && 0 === e.enableBlinkFeatures.length)
                                return;
                            const t = `This renderer process has additional "enableBlinkFeatures"\n  enabled. This exposes users of this app to some security risk. If you do not\n  need this feature, you should disable it.\n${l}`;
                            console.warn("%cElectron Security Warning (enableBlinkFeatures)", "font-weight: bold;", t)
                        }(e),
                        warnAboutInsecureCSP(),
                        function() {
                            if (document && document.querySelectorAll) {
                                const e = document.querySelectorAll("[allowpopups]");
                                if (!e || 0 === e.length)
                                    return;
                                const t = `A <webview> has "allowpopups" set to true. This exposes\n    users of this app to some security risk, since popups are just\n    BrowserWindows. If you do not need this feature, you should disable it.\n\n    ${l}`;
                                console.warn("%cElectron Security Warning (allowpopups)", "font-weight: bold;", t)
                            }
                        }(),
                        function(e) {
                            if (!e || isLocalhost())
                                return;
                            if ((null == e.enableRemoteModule || !!e.enableRemoteModule) && getIsRemoteProtocol()) {
                                const e = `This renderer process has "enableRemoteModule" enabled\n    and attempted to load remote content from '${window.location}'. This\n    exposes users of this app to unnecessary security risks.\n${l}`;
                                console.warn("%cElectron Security Warning (enableRemoteModule)", "font-weight: bold;", e)
                            }
                        }(e)
                    };
                    t.securityWarnings = function securityWarnings(e) {
                        window.addEventListener("load", (async function() {
                            if (function() {
                                if (null !== o)
                                    return o;
                                switch (s) {
                                case "darwin":
                                    o = a.endsWith("MacOS/Electron") || a.includes("Electron.app/Contents/Frameworks/");
                                    break;
                                case "freebsd":
                                case "linux":
                                    o = a.endsWith("/electron");
                                    break;
                                case "win32":
                                    o = a.endsWith("\\electron.exe");
                                    break;
                                default:
                                    o = !1
                                }
                                return (c && c.ELECTRON_DISABLE_SECURITY_WARNINGS || window && window.ELECTRON_DISABLE_SECURITY_WARNINGS) && (o = !1),
                                (c && c.ELECTRON_ENABLE_SECURITY_WARNINGS || window && window.ELECTRON_ENABLE_SECURITY_WARNINGS) && (o = !0),
                                o
                            }()) {
                                const t = await async function() {
                                    try {
                                        return i.ipcRendererInternal.invoke("ELECTRON_BROWSER_GET_LAST_WEB_PREFERENCES")
                                    } catch (e) {
                                        console.warn(`getLastWebPreferences() failed: ${e}`)
                                    }
                                }();
                                logSecurityWarnings(t, e)
                            }
                        }
                        ), {
                            once: !0
                        })
                    }
                }
                ).call(this, r(/*! @electron/internal/renderer/webpack-provider */
                "./lib/renderer/webpack-provider.ts").process)
            },

refs



©xgqfrms 2012-2020

www.cnblogs.com 发布文章使用:只允许注册用户才可以访问!


posted @   xgqfrms  阅读(901)  评论(0编辑  收藏  举报
编辑推荐:
· AI与.NET技术实操系列(二):开始使用ML.NET
· 记一次.NET内存居高不下排查解决与启示
· 探究高空视频全景AR技术的实现原理
· 理解Rust引用及其生命周期标识(上)
· 浏览器原生「磁吸」效果!Anchor Positioning 锚点定位神器解析
阅读排行:
· DeepSeek 开源周回顾「GitHub 热点速览」
· 记一次.NET内存居高不下排查解决与启示
· 物流快递公司核心技术能力-地址解析分单基础技术分享
· .NET 10首个预览版发布:重大改进与新特性概览!
· .NET10 - 预览版1新功能体验(一)
历史上的今天:
2019-11-16 敏捷开发 Agile Development
2019-11-16 CSS 实现文本的竖向排版 All In One
2018-11-16 iMuseum
2018-11-16 React & shit Antd
2018-11-16 Github & DMCA Takedown Policy
2018-11-16 CSS3 Filter Effects All In One
2018-11-16 Documentation & Markdown
点击右上角即可分享
微信分享提示