-
-
Notifications
You must be signed in to change notification settings - Fork 5.5k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add more checks in migration code (#21011)
When migrating add several more important sanity checks: * SHAs must be SHAs * Refs must be valid Refs * URLs must be reasonable Signed-off-by: Andrew Thornton <[email protected]> Signed-off-by: Andrew Thornton <[email protected]> Co-authored-by: techknowlogick <[email protected]>
- Loading branch information
1 parent
93a610a
commit e6b3be4
Showing
24 changed files
with
693 additions
and
281 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,82 @@ | ||
// Copyright 2022 The Gitea Authors. All rights reserved. | ||
// Use of this source code is governed by a MIT-style | ||
// license that can be found in the LICENSE file. | ||
|
||
package migrations | ||
|
||
import ( | ||
"fmt" | ||
"strings" | ||
|
||
admin_model "code.gitea.io/gitea/models/admin" | ||
"code.gitea.io/gitea/modules/git" | ||
"code.gitea.io/gitea/modules/log" | ||
base "code.gitea.io/gitea/modules/migration" | ||
) | ||
|
||
// WarnAndNotice will log the provided message and send a repository notice | ||
func WarnAndNotice(fmtStr string, args ...interface{}) { | ||
log.Warn(fmtStr, args...) | ||
if err := admin_model.CreateRepositoryNotice(fmt.Sprintf(fmtStr, args...)); err != nil { | ||
log.Error("create repository notice failed: ", err) | ||
} | ||
} | ||
|
||
func hasBaseURL(toCheck, baseURL string) bool { | ||
if len(baseURL) > 0 && baseURL[len(baseURL)-1] != '/' { | ||
baseURL += "/" | ||
} | ||
return strings.HasPrefix(toCheck, baseURL) | ||
} | ||
|
||
// CheckAndEnsureSafePR will check that a given PR is safe to download | ||
func CheckAndEnsureSafePR(pr *base.PullRequest, commonCloneBaseURL string, g base.Downloader) bool { | ||
valid := true | ||
// SECURITY: the patchURL must be checked to have the same baseURL as the current to prevent open redirect | ||
if pr.PatchURL != "" && !hasBaseURL(pr.PatchURL, commonCloneBaseURL) { | ||
// TODO: Should we check that this url has the expected format for a patch url? | ||
WarnAndNotice("PR #%d in %s has invalid PatchURL: %s baseURL: %s", pr.Number, g, pr.PatchURL, commonCloneBaseURL) | ||
pr.PatchURL = "" | ||
valid = false | ||
} | ||
|
||
// SECURITY: the headCloneURL must be checked to have the same baseURL as the current to prevent open redirect | ||
if pr.Head.CloneURL != "" && !hasBaseURL(pr.Head.CloneURL, commonCloneBaseURL) { | ||
// TODO: Should we check that this url has the expected format for a patch url? | ||
WarnAndNotice("PR #%d in %s has invalid HeadCloneURL: %s baseURL: %s", pr.Number, g, pr.Head.CloneURL, commonCloneBaseURL) | ||
pr.Head.CloneURL = "" | ||
valid = false | ||
} | ||
|
||
// SECURITY: SHAs Must be a SHA | ||
if pr.MergeCommitSHA != "" && !git.IsValidSHAPattern(pr.MergeCommitSHA) { | ||
WarnAndNotice("PR #%d in %s has invalid MergeCommitSHA: %s", pr.Number, g, pr.MergeCommitSHA) | ||
pr.MergeCommitSHA = "" | ||
} | ||
if pr.Head.SHA != "" && !git.IsValidSHAPattern(pr.Head.SHA) { | ||
WarnAndNotice("PR #%d in %s has invalid HeadSHA: %s", pr.Number, g, pr.Head.SHA) | ||
pr.Head.SHA = "" | ||
valid = false | ||
} | ||
if pr.Base.SHA != "" && !git.IsValidSHAPattern(pr.Base.SHA) { | ||
WarnAndNotice("PR #%d in %s has invalid BaseSHA: %s", pr.Number, g, pr.Base.SHA) | ||
pr.Base.SHA = "" | ||
valid = false | ||
} | ||
|
||
// SECURITY: Refs must be valid refs or SHAs | ||
if pr.Head.Ref != "" && !git.IsValidRefPattern(pr.Head.Ref) { | ||
WarnAndNotice("PR #%d in %s has invalid HeadRef: %s", pr.Number, g, pr.Head.Ref) | ||
pr.Head.Ref = "" | ||
valid = false | ||
} | ||
if pr.Base.Ref != "" && !git.IsValidRefPattern(pr.Base.Ref) { | ||
WarnAndNotice("PR #%d in %s has invalid BaseRef: %s", pr.Number, g, pr.Base.Ref) | ||
pr.Base.Ref = "" | ||
valid = false | ||
} | ||
|
||
pr.EnsuredSafe = true | ||
|
||
return valid | ||
} |
Oops, something went wrong.