chrome-devtools-frontend
Version:
Chrome DevTools UI
115 lines (100 loc) • 4.36 kB
text/typescript
// Copyright 2025 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
import * as i18n from '../../core/i18n/i18n.js';
import type * as SDK from '../../core/sdk/sdk.js';
import * as Protocol from '../../generated/protocol.js';
import {Issue, IssueCategory, IssueKind} from './Issue.js';
import {
type LazyMarkdownIssueDescription,
type MarkdownIssueDescription,
resolveLazyDescription,
} from './MarkdownIssueDescription.js';
const UIStrings = {
/**
*@description Title for HTTP Message Signatures specification url
*/
httpMessageSignatures: 'HTTP Message Signatures (RFC9421)',
/**
*@description Title for Signature-based Integrity specification url
*/
signatureBasedIntegrity: 'Signature-based Integrity',
} as const;
const str_ = i18n.i18n.registerUIStrings('models/issues_manager/SRIMessageSignatureIssue.ts', UIStrings);
const i18nLazyString = i18n.i18n.getLazilyComputedLocalizedString.bind(undefined, str_);
function generateGroupingIssueCode(details: Protocol.Audits.SRIMessageSignatureIssueDetails): string {
const issueCode = `${Protocol.Audits.InspectorIssueCode.SRIMessageSignatureIssue}::${details.error}`;
if (details.error === Protocol.Audits.SRIMessageSignatureError.ValidationFailedSignatureMismatch) {
// Signature mismatch errors should be grouped by "signature base".
return issueCode + details.signatureBase;
}
if (details.error === Protocol.Audits.SRIMessageSignatureError.ValidationFailedIntegrityMismatch) {
// Integrity mismatch errors should be grouped by integrity assertion.
return issueCode + details.integrityAssertions.join();
}
// Otherwise, simply group by issue type:
return issueCode;
}
export class SRIMessageSignatureIssue extends Issue<string> {
readonly #issueDetails: Protocol.Audits.SRIMessageSignatureIssueDetails;
constructor(issueDetails: Protocol.Audits.SRIMessageSignatureIssueDetails, issuesModel: SDK.IssuesModel.IssuesModel) {
super(
{
code: generateGroupingIssueCode(issueDetails),
umaCode: `${Protocol.Audits.InspectorIssueCode.SRIMessageSignatureIssue}::${issueDetails.error}`,
},
issuesModel);
this.#issueDetails = issueDetails;
}
details(): Protocol.Audits.SRIMessageSignatureIssueDetails {
return this.#issueDetails;
}
// Overriding `Issue<String>`:
override primaryKey(): string {
return JSON.stringify(this.details());
}
override getDescription(): MarkdownIssueDescription|null {
const description: LazyMarkdownIssueDescription = {
file: `sri${this.details().error}.md`,
links: [
{
link: 'https://www.rfc-editor.org/rfc/rfc9421.html',
linkTitle: i18nLazyString(UIStrings.httpMessageSignatures),
},
{
link: 'https://wicg.github.io/signature-based-sri/',
linkTitle: i18nLazyString(UIStrings.signatureBasedIntegrity),
}
],
substitutions: new Map()
};
if (this.#issueDetails.error === Protocol.Audits.SRIMessageSignatureError.ValidationFailedSignatureMismatch) {
description.substitutions?.set('PLACEHOLDER_signatureBase', () => this.#issueDetails.signatureBase);
}
if (this.#issueDetails.error === Protocol.Audits.SRIMessageSignatureError.ValidationFailedIntegrityMismatch) {
description.substitutions?.set('PLACEHOLDER_integrityAssertions', () => {
const prefix = '\n<li>';
return prefix + this.details().integrityAssertions.join(prefix);
});
}
return resolveLazyDescription(description);
}
override getCategory(): IssueCategory {
return IssueCategory.OTHER;
}
override getKind(): IssueKind {
return IssueKind.PAGE_ERROR;
}
override requests(): Iterable<Protocol.Audits.AffectedRequest> {
return this.details().request ? [this.details().request] : [];
}
static fromInspectorIssue(issuesModel: SDK.IssuesModel.IssuesModel, inspectorIssue: Protocol.Audits.InspectorIssue):
SRIMessageSignatureIssue[] {
const details = inspectorIssue.details.sriMessageSignatureIssueDetails;
if (!details) {
console.warn('SRI Message Signature issue without details received.');
return [];
}
return [new SRIMessageSignatureIssue(details, issuesModel)];
}
}