You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

migrate_test.go 4.1KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116
  1. // Copyright 2019 The Gitea Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package migrations
  5. import (
  6. "net"
  7. "path/filepath"
  8. "testing"
  9. "code.gitea.io/gitea/models/unittest"
  10. user_model "code.gitea.io/gitea/models/user"
  11. "code.gitea.io/gitea/modules/setting"
  12. "github.com/stretchr/testify/assert"
  13. )
  14. func TestMigrateWhiteBlocklist(t *testing.T) {
  15. assert.NoError(t, unittest.PrepareTestDatabase())
  16. adminUser := unittest.AssertExistsAndLoadBean(t, &user_model.User{Name: "user1"}).(*user_model.User)
  17. nonAdminUser := unittest.AssertExistsAndLoadBean(t, &user_model.User{Name: "user2"}).(*user_model.User)
  18. setting.Migrations.AllowedDomains = "github.com"
  19. setting.Migrations.AllowLocalNetworks = false
  20. assert.NoError(t, Init())
  21. err := IsMigrateURLAllowed("https://gitlab.com/gitlab/gitlab.git", nonAdminUser)
  22. assert.Error(t, err)
  23. err = IsMigrateURLAllowed("https://github.com/go-gitea/gitea.git", nonAdminUser)
  24. assert.NoError(t, err)
  25. err = IsMigrateURLAllowed("https://gITHUb.com/go-gitea/gitea.git", nonAdminUser)
  26. assert.NoError(t, err)
  27. setting.Migrations.AllowedDomains = ""
  28. setting.Migrations.BlockedDomains = "github.com"
  29. assert.NoError(t, Init())
  30. err = IsMigrateURLAllowed("https://gitlab.com/gitlab/gitlab.git", nonAdminUser)
  31. assert.NoError(t, err)
  32. err = IsMigrateURLAllowed("https://github.com/go-gitea/gitea.git", nonAdminUser)
  33. assert.Error(t, err)
  34. err = IsMigrateURLAllowed("https://10.0.0.1/go-gitea/gitea.git", nonAdminUser)
  35. assert.Error(t, err)
  36. setting.Migrations.AllowLocalNetworks = true
  37. assert.NoError(t, Init())
  38. err = IsMigrateURLAllowed("https://10.0.0.1/go-gitea/gitea.git", nonAdminUser)
  39. assert.NoError(t, err)
  40. old := setting.ImportLocalPaths
  41. setting.ImportLocalPaths = false
  42. err = IsMigrateURLAllowed("/home/foo/bar/goo", adminUser)
  43. assert.Error(t, err)
  44. setting.ImportLocalPaths = true
  45. abs, err := filepath.Abs(".")
  46. assert.NoError(t, err)
  47. err = IsMigrateURLAllowed(abs, adminUser)
  48. assert.NoError(t, err)
  49. err = IsMigrateURLAllowed(abs, nonAdminUser)
  50. assert.Error(t, err)
  51. nonAdminUser.AllowImportLocal = true
  52. err = IsMigrateURLAllowed(abs, nonAdminUser)
  53. assert.NoError(t, err)
  54. setting.ImportLocalPaths = old
  55. }
  56. func TestAllowBlockList(t *testing.T) {
  57. init := func(allow, block string, local bool) {
  58. setting.Migrations.AllowedDomains = allow
  59. setting.Migrations.BlockedDomains = block
  60. setting.Migrations.AllowLocalNetworks = local
  61. assert.NoError(t, Init())
  62. }
  63. // default, allow all external, block none, no local networks
  64. init("", "", false)
  65. assert.NoError(t, checkByAllowBlockList("domain.com", []net.IP{net.ParseIP("1.2.3.4")}))
  66. assert.Error(t, checkByAllowBlockList("domain.com", []net.IP{net.ParseIP("127.0.0.1")}))
  67. // allow all including local networks (it could lead to SSRF in production)
  68. init("", "", true)
  69. assert.NoError(t, checkByAllowBlockList("domain.com", []net.IP{net.ParseIP("1.2.3.4")}))
  70. assert.NoError(t, checkByAllowBlockList("domain.com", []net.IP{net.ParseIP("127.0.0.1")}))
  71. // allow wildcard, block some subdomains. if the domain name is allowed, then the local network check is skipped
  72. init("*.domain.com", "blocked.domain.com", false)
  73. assert.NoError(t, checkByAllowBlockList("sub.domain.com", []net.IP{net.ParseIP("1.2.3.4")}))
  74. assert.NoError(t, checkByAllowBlockList("sub.domain.com", []net.IP{net.ParseIP("127.0.0.1")}))
  75. assert.Error(t, checkByAllowBlockList("blocked.domain.com", []net.IP{net.ParseIP("1.2.3.4")}))
  76. assert.Error(t, checkByAllowBlockList("sub.other.com", []net.IP{net.ParseIP("1.2.3.4")}))
  77. // allow wildcard (it could lead to SSRF in production)
  78. init("*", "", false)
  79. assert.NoError(t, checkByAllowBlockList("domain.com", []net.IP{net.ParseIP("1.2.3.4")}))
  80. assert.NoError(t, checkByAllowBlockList("domain.com", []net.IP{net.ParseIP("127.0.0.1")}))
  81. // local network can still be blocked
  82. init("*", "127.0.0.*", false)
  83. assert.NoError(t, checkByAllowBlockList("domain.com", []net.IP{net.ParseIP("1.2.3.4")}))
  84. assert.Error(t, checkByAllowBlockList("domain.com", []net.IP{net.ParseIP("127.0.0.1")}))
  85. // reset
  86. init("", "", false)
  87. }