Proyectos de Subversion Moodle

Rev

Rev 1 | | Comparar con el anterior | Ultima modificación | Ver Log |

Rev Autor Línea Nro. Línea
1 efrain 1
<?php
2
// This file is part of Moodle - http://moodle.org/
3
//
4
// Moodle is free software: you can redistribute it and/or modify
5
// it under the terms of the GNU General Public License as published by
6
// the Free Software Foundation, either version 3 of the License, or
7
// (at your option) any later version.
8
//
9
// Moodle is distributed in the hope that it will be useful,
10
// but WITHOUT ANY WARRANTY; without even the implied warranty of
11
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12
// GNU General Public License for more details.
13
//
14
// You should have received a copy of the GNU General Public License
15
// along with Moodle.  If not, see <http://www.gnu.org/licenses/>.
16
 
17
namespace core;
18
 
19
/**
20
 * cURL security test suite.
21
 *
22
 * Note: The curl_security_helper class performs forward and reverse DNS look-ups in some cases. This class will not attempt to test
23
 * this functionality as look-ups can vary from machine to machine. Instead, human testing with known inputs/outputs is recommended.
24
 *
25
 * @package    core
26
 * @copyright  2016 Jake Dallimore <jrhdallimore@gmail.com>
27
 * @license    http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later
28
 */
29
class curl_security_helper_test extends \advanced_testcase {
30
    /**
31
     * Test for \core\files\curl_security_helper::url_is_blocked().
32
     *
33
     * @param array $dns a mapping between hosts and IPs to be used instead of a real DNS lookup. The values must be arrays.
34
     * @param string $url the url to validate.
35
     * @param string $blockedhosts the list of blocked hosts.
36
     * @param string $allowedports the list of allowed ports.
37
     * @param bool $expected the expected result.
38
     * @dataProvider curl_security_url_data_provider
39
     */
11 efrain 40
    public function test_curl_security_helper_url_is_blocked($dns, $url, $blockedhosts, $allowedports, $expected): void {
1 efrain 41
        $this->resetAfterTest(true);
42
        $helper = $this->getMockBuilder('\core\files\curl_security_helper')
43
            ->onlyMethods(['get_host_list_by_name'])
44
            ->getMock();
45
 
46
        // Override the get host list method to return hard coded values based on a mapping provided by $dns.
47
        $helper->method('get_host_list_by_name')->will(
48
            $this->returnCallback(
49
                function($host) use ($dns) {
50
                    return isset($dns[$host]) ? $dns[$host] : [];
51
                }
52
            )
53
        );
54
 
55
        set_config('curlsecurityblockedhosts', $blockedhosts);
56
        set_config('curlsecurityallowedport', $allowedports);
57
        $this->assertEquals($expected, $helper->url_is_blocked($url));
58
    }
59
 
60
    /**
61
     * Data provider for test_curl_security_helper_url_is_blocked().
62
     *
63
     * @return array
64
     */
65
    public function curl_security_url_data_provider() {
66
        $simpledns = ['localhost' => ['127.0.0.1']];
67
        $multiplerecorddns = [
68
            'sub.example.com' => ['1.2.3.4', '5.6.7.8']
69
        ];
70
        // Format: url, blocked hosts, allowed ports, expected result.
71
        return [
72
            // Base set without the blocklist enabled - no checking takes place.
73
            [$simpledns, "http://localhost/x.png", "", "", false],       // IP=127.0.0.1, Port=80 (port inferred from http).
74
            [$simpledns, "http://localhost:80/x.png", "", "", false],    // IP=127.0.0.1, Port=80 (specific port overrides http scheme).
75
            [$simpledns, "https://localhost/x.png", "", "", false],      // IP=127.0.0.1, Port=443 (port inferred from https).
76
            [$simpledns, "http://localhost:443/x.png", "", "", false],   // IP=127.0.0.1, Port=443 (specific port overrides http scheme).
77
            [$simpledns, "localhost/x.png", "", "", false],              // IP=127.0.0.1, Port=80 (port inferred from http fallback).
78
            [$simpledns, "localhost:443/x.png", "", "", false],          // IP=127.0.0.1, Port=443 (port hard specified, despite http fallback).
79
            [$simpledns, "http://127.0.0.1/x.png", "", "", false],       // IP=127.0.0.1, Port=80 (port inferred from http).
80
            [$simpledns, "127.0.0.1/x.png", "", "", false],              // IP=127.0.0.1, Port=80 (port inferred from http fallback).
81
            [$simpledns, "http://localhost:8080/x.png", "", "", false],  // IP=127.0.0.1, Port=8080 (port hard specified).
82
            [$simpledns, "http://192.168.1.10/x.png", "", "", false],    // IP=192.168.1.10, Port=80 (port inferred from http).
83
            [$simpledns, "https://192.168.1.10/x.png", "", "", false],   // IP=192.168.1.10, Port=443 (port inferred from https).
84
            [$simpledns, "http://sub.example.com/x.png", "", "", false], // IP=::1, Port = 80 (port inferred from http).
85
            [$simpledns, "http://s-1.d-1.com/x.png", "", "", false],     // IP=::1, Port = 80 (port inferred from http).
86
 
87
            // Test set using domain name filters but with all ports allowed (empty).
88
            [$simpledns, "http://localhost/x.png", "localhost", "", true],
89
            [$simpledns, "localhost/x.png", "localhost", "", true],
90
            [$simpledns, "localhost:0/x.png", "localhost", "", true],
91
            [$simpledns, "ftp://localhost/x.png", "localhost", "", true],
92
            [$simpledns, "http://sub.example.com/x.png", "localhost", "", false],
93
            [$simpledns, "http://example.com/x.png", "example.com", "", true],
94
            [$simpledns, "http://sub.example.com/x.png", "example.com", "", false],
95
 
96
            // Test set using wildcard domain name filters but with all ports allowed (empty).
97
            [$simpledns, "http://sub.example.com/x.png", "*.com", "", true],
98
            [$simpledns, "http://example.com/x.png", "*.example.com", "", false],
99
            [$simpledns, "http://sub.example.com/x.png", "*.example.com", "", true],
100
            [$simpledns, "http://sub.example.com/x.png", "*.sub.example.com", "", false],
101
            [$simpledns, "http://sub.example.com/x.png", "*.example", "", false],
102
 
103
            // Test set using IP address filters but with all ports allowed (empty).
104
            [$simpledns, "http://localhost/x.png", "127.0.0.1", "", true],
105
            [$simpledns, "http://127.0.0.1/x.png", "127.0.0.1", "", true],
106
 
107
            // Test set using CIDR IP range filters but with all ports allowed (empty).
108
            [$simpledns, "http://localhost/x.png", "127.0.0.0/24", "", true],
109
            [$simpledns, "http://127.0.0.1/x.png", "127.0.0.0/24", "", true],
110
 
111
            // Test set using last-group range filters but with all ports allowed (empty).
112
            [$simpledns, "http://localhost/x.png", "127.0.0.0-30", "", true],
113
            [$simpledns, "http://127.0.0.1/x.png", "127.0.0.0-30", "", true],
114
 
115
            // Test set using port filters but with all hosts allowed (empty).
116
            [$simpledns, "http://localhost/x.png", "", "80\n443", false],
117
            [$simpledns, "http://localhost:80/x.png", "", "80\n443", false],
118
            [$simpledns, "https://localhost/x.png", "", "80\n443", false],
119
            [$simpledns, "http://localhost:443/x.png", "", "80\n443", false],
120
            [$simpledns, "http://sub.example.com:8080/x.png", "", "80\n443", true],
121
            [$simpledns, "http://sub.example.com:-80/x.png", "", "80\n443", true],
122
            [$simpledns, "http://sub.example.com:aaa/x.png", "", "80\n443", true],
123
 
124
            // Test set using port filters and hosts filters.
125
            [$simpledns, "http://localhost/x.png", "127.0.0.1", "80\n443", true],
126
            [$simpledns, "http://127.0.0.1/x.png", "127.0.0.1", "80\n443", true],
127
 
128
            // Test using multiple A records.
129
            // Multiple record DNS gives two IPs for the same host, we want to make
130
            // sure that if we block one of those (doesn't matter which one)
131
            // the request is blocked.
132
            [$multiplerecorddns, "http://sub.example.com", '1.2.3.4', "", true],
133
            [$multiplerecorddns, "http://sub.example.com", '5.6.7.8', "", true],
134
 
135
            // Test when DNS resolution fails.
136
            [[], "http://example.com", "127.0.0.1", "", true],
137
 
138
            // Test ensures that the default value of getremoteaddr() 0.0.0.0 will check against the provided blocked list.
139
            [$simpledns, "http://0.0.0.0/x.png", "0.0.0.0", "", true],
140
            // Test set using IPV4 with integer format.
141
            [$simpledns, "http://2852039166/x.png", "169.254.169.254", "", true],
142
 
143
            // Test some freaky deaky Unicode domains. Should be blocked always.
144
            [$simpledns, "http://169。254。169。254/", "127.0.0.1", "", true],
145
            [$simpledns, "http://169。254。169。254/", "1.2.3.4", "", true],
146
            [$simpledns, "http://169。254。169。254/", "127.0.0.1", "80\n443", true]
147
 
148
            // Note on testing URLs using IPv6 notation:
149
            // At present, the curl_security_helper class doesn't support IPv6 url notation.
150
            // E.g.  http://[ad34::dddd]:port/resource
151
            // This is because it uses clean_param(x, PARAM_URL) as part of parsing, which won't validate urls having IPv6 notation.
152
            // The underlying IPv6 address and range support is in place, however, so if clean_param is changed in future,
153
            // please add the following test sets.
154
            // 1. ["http://[::1]/x.png", "", "", false]
155
            // 2. ["http://[::1]/x.png", "::1", "", true]
156
            // 3. ["http://[::1]/x.png", "::1/64", "", true]
157
            // 4. ["http://[fe80::dddd]/x.png", "fe80::cccc-eeee", "", true]
158
            // 5. ["http://[fe80::dddd]/x.png", "fe80::dddd/128", "", true].
159
        ];
160
    }
161
 
162
    /**
163
     * Test for \core\files\curl_security_helper->is_enabled().
164
     *
165
     * @param string $blockedhosts the list of blocked hosts.
166
     * @param string $allowedports the list of allowed ports.
167
     * @param bool $expected the expected result.
168
     * @dataProvider curl_security_settings_data_provider
169
     */
11 efrain 170
    public function test_curl_security_helper_is_enabled($blockedhosts, $allowedports, $expected): void {
1 efrain 171
        $this->resetAfterTest(true);
172
        $helper = new \core\files\curl_security_helper();
173
        set_config('curlsecurityblockedhosts', $blockedhosts);
174
        set_config('curlsecurityallowedport', $allowedports);
175
        $this->assertEquals($expected, $helper->is_enabled());
176
    }
177
 
178
    /**
179
     * Data provider for test_curl_security_helper_is_enabled().
180
     *
181
     * @return array
182
     */
183
    public function curl_security_settings_data_provider() {
184
        // Format: blocked hosts, allowed ports, expected result.
185
        return [
186
            ["", "", false],
187
            ["127.0.0.1", "", true],
188
            ["localhost", "", true],
189
            ["127.0.0.0/24\n192.0.0.0/24", "", true],
190
            ["", "80\n443", true],
191
        ];
192
    }
193
 
194
    /**
195
     * Test for \core\files\curl_security_helper::host_is_blocked().
196
     *
197
     * @param string $host the host to validate.
198
     * @param string $blockedhosts the list of blocked hosts.
199
     * @param bool $expected the expected result.
200
     * @dataProvider curl_security_host_data_provider
201
     */
11 efrain 202
    public function test_curl_security_helper_host_is_blocked($host, $blockedhosts, $expected): void {
1 efrain 203
        $this->resetAfterTest(true);
204
        $helper = new \core\files\curl_security_helper();
205
        set_config('curlsecurityblockedhosts', $blockedhosts);
206
        $this->assertEquals($expected, \phpunit_util::call_internal_method($helper, 'host_is_blocked', [$host],
207
                                                                          '\core\files\curl_security_helper'));
208
    }
209
 
210
    /**
211
     * Data provider for test_curl_security_helper_host_is_blocked().
212
     *
213
     * @return array
214
     */
215
    public function curl_security_host_data_provider() {
216
        return [
217
            // IPv4 hosts.
218
            ["127.0.0.1", "127.0.0.1", true],
219
            ["127.0.0.1", "127.0.0.0/24", true],
220
            ["127.0.0.1", "127.0.0.0-40", true],
221
            ["", "127.0.0.0/24", false],
222
 
223
            // IPv6 hosts.
224
            // Note: ["::", "::", true], - should match but 'address_in_subnet()' has trouble with fully collapsed IPv6 addresses.
225
            ["::1", "::1", true],
226
            ["::1", "::0-cccc", true],
227
            ["::1", "::0/64", true],
228
            ["FE80:0000:0000:0000:0000:0000:0000:0000", "fe80::/128", true],
229
            ["fe80::eeee", "fe80::ddde/64", true],
230
            ["fe80::dddd", "fe80::cccc-eeee", true],
231
            ["fe80::dddd", "fe80::ddde-eeee", false],
232
 
233
            // Domain name hosts.
234
            ["example.com", "example.com", true],
235
            ["sub.example.com", "example.com", false],
236
            ["example.com", "*.com", true],
237
            ["example.com", "*.example.com", false],
238
            ["sub.example.com", "*.example.com", true],
239
            ["sub.sub.example.com", "*.example.com", true],
240
            ["sub.example.com", "*example.com", false],
241
            ["sub.example.com", "*.example", false],
242
 
243
            // International domain name hosts.
244
            ["xn--nw2a.xn--j6w193g", "xn--nw2a.xn--j6w193g", true], // The domain 見.香港 is ace-encoded to xn--nw2a.xn--j6w193g.
245
        ];
246
    }
247
 
248
    /**
249
     * Test for \core\files\curl_security_helper->port_is_blocked().
250
     *
251
     * @param int|string $port the port to validate.
252
     * @param string $allowedports the list of allowed ports.
253
     * @param bool $expected the expected result.
254
     * @dataProvider curl_security_port_data_provider
255
     */
11 efrain 256
    public function test_curl_security_helper_port_is_blocked($port, $allowedports, $expected): void {
1 efrain 257
        $this->resetAfterTest(true);
258
        $helper = new \core\files\curl_security_helper();
259
        set_config('curlsecurityallowedport', $allowedports);
260
        $this->assertEquals($expected, \phpunit_util::call_internal_method($helper, 'port_is_blocked', [$port],
261
                                                                          '\core\files\curl_security_helper'));
262
    }
263
 
264
    /**
265
     * Data provider for test_curl_security_helper_port_is_blocked().
266
     *
267
     * @return array
268
     */
269
    public function curl_security_port_data_provider() {
270
        return [
271
            ["", "80\n443", true],
272
            [" ", "80\n443", true],
273
            ["-1", "80\n443", true],
274
            [-1, "80\n443", true],
275
            ["n", "80\n443", true],
276
            [0, "80\n443", true],
277
            ["0", "80\n443", true],
278
            [8080, "80\n443", true],
279
            ["8080", "80\n443", true],
280
            ["80", "80\n443", false],
281
            [80, "80\n443", false],
282
            [443, "80\n443", false],
283
            [0, "", true], // Port 0 and below are always invalid, even when the admin hasn't set allowed entries.
284
            [-1, "", true], // Port 0 and below are always invalid, even when the admin hasn't set allowed entries.
285
            [null, "", true], // Non-string, non-int values are invalid.
286
        ];
287
    }
288
 
289
    /**
290
     * Test for \core\files\curl_security_helper::get_blocked_url_string().
291
     */
11 efrain 292
    public function test_curl_security_helper_get_blocked_url_string(): void {
1 efrain 293
        $helper = new \core\files\curl_security_helper();
294
        $this->assertEquals(get_string('curlsecurityurlblocked', 'admin'), $helper->get_blocked_url_string());
295
    }
296
}