Centralize secure-http checking
parent
37a1e12672
commit
49524bc4ba
|
@ -13,6 +13,7 @@
|
||||||
namespace Composer;
|
namespace Composer;
|
||||||
|
|
||||||
use Composer\Config\ConfigSourceInterface;
|
use Composer\Config\ConfigSourceInterface;
|
||||||
|
use Composer\Downloader\TransportException;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @author Jordi Boggiano <j.boggiano@seld.be>
|
* @author Jordi Boggiano <j.boggiano@seld.be>
|
||||||
|
@ -395,4 +396,28 @@ class Config
|
||||||
|
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Validates that the passed URL is allowed to be used by current config, or throws an exception.
|
||||||
|
*
|
||||||
|
* @param string $url
|
||||||
|
*/
|
||||||
|
public function prohibitUrlByConfig($url)
|
||||||
|
{
|
||||||
|
if (!$this->get('secure-http')) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Parse the URL into its separate parts
|
||||||
|
$parsed = parse_url($url);
|
||||||
|
if (false === $parsed || !isset($parsed['scheme'])) {
|
||||||
|
// If the URL is malformed or does not contain a usable scheme it's not going to work anyway
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Throw exception on known insecure protocols
|
||||||
|
if (in_array($parsed['scheme'], array('http', 'git', 'ftp', 'svn'))) {
|
||||||
|
throw new TransportException("Your configuration does not allow connections to $url. See https://getcomposer.org/doc/06-config.md#secure-http for details.");
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -25,7 +25,8 @@ class HgDownloader extends VcsDownloader
|
||||||
*/
|
*/
|
||||||
public function doDownload(PackageInterface $package, $path, $url)
|
public function doDownload(PackageInterface $package, $path, $url)
|
||||||
{
|
{
|
||||||
$this->checkSecureHttp($url);
|
// Ensure we are allowed to use this URL by config
|
||||||
|
$this->config->prohibitUrlByConfig($url);
|
||||||
|
|
||||||
$url = ProcessExecutor::escape($url);
|
$url = ProcessExecutor::escape($url);
|
||||||
$ref = ProcessExecutor::escape($package->getSourceReference());
|
$ref = ProcessExecutor::escape($package->getSourceReference());
|
||||||
|
@ -45,7 +46,8 @@ class HgDownloader extends VcsDownloader
|
||||||
*/
|
*/
|
||||||
public function doUpdate(PackageInterface $initial, PackageInterface $target, $path, $url)
|
public function doUpdate(PackageInterface $initial, PackageInterface $target, $path, $url)
|
||||||
{
|
{
|
||||||
$this->checkSecureHttp($url);
|
// Ensure we are allowed to use this URL by config
|
||||||
|
$this->config->prohibitUrlByConfig($url);
|
||||||
|
|
||||||
$url = ProcessExecutor::escape($url);
|
$url = ProcessExecutor::escape($url);
|
||||||
$ref = ProcessExecutor::escape($target->getSourceReference());
|
$ref = ProcessExecutor::escape($target->getSourceReference());
|
||||||
|
@ -89,13 +91,6 @@ class HgDownloader extends VcsDownloader
|
||||||
return $output;
|
return $output;
|
||||||
}
|
}
|
||||||
|
|
||||||
protected function checkSecureHttp($url)
|
|
||||||
{
|
|
||||||
if (preg_match('{^http:}i', $url) && $this->config->get('secure-http')) {
|
|
||||||
throw new TransportException("Your configuration does not allow connection to $url. See https://getcomposer.org/doc/06-config.md#secure-http for details.");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* {@inheritDoc}
|
* {@inheritDoc}
|
||||||
*/
|
*/
|
||||||
|
|
|
@ -48,9 +48,8 @@ class HgDriver extends VcsDriver
|
||||||
throw new \RuntimeException('Can not clone '.$this->url.' to access package information. The "'.$cacheDir.'" directory is not writable by the current user.');
|
throw new \RuntimeException('Can not clone '.$this->url.' to access package information. The "'.$cacheDir.'" directory is not writable by the current user.');
|
||||||
}
|
}
|
||||||
|
|
||||||
if (preg_match('{^http:}i', $this->url) && $this->config->get('secure-http')) {
|
// Ensure we are allowed to use this URL by config
|
||||||
throw new TransportException("Your configuration does not allow connection to $url. See https://getcomposer.org/doc/06-config.md#secure-http for details.");
|
$this->config->prohibitUrlByConfig($this->url);
|
||||||
}
|
|
||||||
|
|
||||||
// update the repo if it is a valid hg repository
|
// update the repo if it is a valid hg repository
|
||||||
if (is_dir($this->repoDir) && 0 === $this->process->execute('hg summary', $output, $this->repoDir)) {
|
if (is_dir($this->repoDir) && 0 === $this->process->execute('hg summary', $output, $this->repoDir)) {
|
||||||
|
|
|
@ -40,9 +40,8 @@ class Git
|
||||||
|
|
||||||
public function runCommand($commandCallable, $url, $cwd, $initialClone = false)
|
public function runCommand($commandCallable, $url, $cwd, $initialClone = false)
|
||||||
{
|
{
|
||||||
if (preg_match('{^(http|git):}i', $url) && $this->config->get('secure-http')) {
|
// Ensure we are allowed to use this URL by config
|
||||||
throw new TransportException("Your configuration does not allow connection to $url. See https://getcomposer.org/doc/06-config.md#secure-http for details.");
|
$this->config->prohibitUrlByConfig($url);
|
||||||
}
|
|
||||||
|
|
||||||
if ($initialClone) {
|
if ($initialClone) {
|
||||||
$origCwd = $cwd;
|
$origCwd = $cwd;
|
||||||
|
|
|
@ -260,20 +260,9 @@ class RemoteFilesystem
|
||||||
$this->io->writeError(" Downloading: <comment>Connecting...</comment>", false);
|
$this->io->writeError(" Downloading: <comment>Connecting...</comment>", false);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check for secure HTTP
|
// Check for secure HTTP, but allow insecure Packagist calls to $hashed providers as file integrity is verified with sha256
|
||||||
if (
|
if ((substr($fileUrl, 0, 23) !== 'http://packagist.org/p/' || (false === strpos($fileUrl, '$') && false === strpos($fileUrl, '%24'))) && $this->config) {
|
||||||
($this->scheme === 'http' || substr($fileUrl, 0, 5) === 'http:')
|
$this->config->prohibitUrlByConfig($fileUrl);
|
||||||
&& $this->config && $this->config->get('secure-http')
|
|
||||||
) {
|
|
||||||
// Passthru unsecure Packagist calls to $hashed providers as file integrity is verified with sha256
|
|
||||||
if (substr($fileUrl, 0, 23) !== 'http://packagist.org/p/' || (false === strpos($fileUrl, '$') && false === strpos($fileUrl, '%24'))) {
|
|
||||||
// other URLs must fail hard
|
|
||||||
throw new TransportException(sprintf(
|
|
||||||
'Your configuration does not allow connection to %s://%s. See https://getcomposer.org/doc/06-config.md#secure-http for details.',
|
|
||||||
$this->scheme,
|
|
||||||
$originUrl
|
|
||||||
));
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
$errorMessage = '';
|
$errorMessage = '';
|
||||||
|
|
|
@ -100,9 +100,8 @@ class Svn
|
||||||
*/
|
*/
|
||||||
public function execute($command, $url, $cwd = null, $path = null, $verbose = false)
|
public function execute($command, $url, $cwd = null, $path = null, $verbose = false)
|
||||||
{
|
{
|
||||||
if (preg_match('{^(http|svn):}i', $url) && $this->config->get('secure-http')) {
|
// Ensure we are allowed to use this URL by config
|
||||||
throw new TransportException("Your configuration does not allow connection to $url. See https://getcomposer.org/doc/06-config.md#secure-http for details.");
|
$this->config->prohibitUrlByConfig($url);
|
||||||
}
|
|
||||||
|
|
||||||
$svnCommand = $this->getCommand($command, $url, $path);
|
$svnCommand = $this->getCommand($command, $url, $path);
|
||||||
$output = null;
|
$output = null;
|
||||||
|
|
|
@ -13,6 +13,7 @@
|
||||||
namespace Composer\Test;
|
namespace Composer\Test;
|
||||||
|
|
||||||
use Composer\Config;
|
use Composer\Config;
|
||||||
|
use Composer\Downloader\TransportException;
|
||||||
|
|
||||||
class ConfigTest extends \PHPUnit_Framework_TestCase
|
class ConfigTest extends \PHPUnit_Framework_TestCase
|
||||||
{
|
{
|
||||||
|
@ -212,6 +213,66 @@ class ConfigTest extends \PHPUnit_Framework_TestCase
|
||||||
$this->assertEquals(array('https', 'git'), $config->get('github-protocols'));
|
$this->assertEquals(array('https', 'git'), $config->get('github-protocols'));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @dataProvider allowedUrlProvider
|
||||||
|
*
|
||||||
|
* @param string $url
|
||||||
|
*/
|
||||||
|
public function testAllowedUrlsPass($url)
|
||||||
|
{
|
||||||
|
$config = new Config(false);
|
||||||
|
$config->prohibitUrlByConfig($url);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @dataProvider prohibitedUrlProvider
|
||||||
|
*
|
||||||
|
* @param string $url
|
||||||
|
*/
|
||||||
|
public function testProhibitedUrlsThrowException($url)
|
||||||
|
{
|
||||||
|
$this->setExpectedException(
|
||||||
|
'Composer\Downloader\TransportException',
|
||||||
|
'Your configuration does not allow connections to ' . $url
|
||||||
|
);
|
||||||
|
$config = new Config(false);
|
||||||
|
$config->prohibitUrlByConfig($url);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @return array List of test URLs that should pass strict security
|
||||||
|
*/
|
||||||
|
public function allowedUrlProvider()
|
||||||
|
{
|
||||||
|
$urls = array(
|
||||||
|
'https://packagist.org',
|
||||||
|
'git@github.com:composer/composer.git',
|
||||||
|
'hg://user:pass@my.satis/satis',
|
||||||
|
'\\myserver\myplace.git',
|
||||||
|
'file://myserver.localhost/mygit.git',
|
||||||
|
'file://example.org/mygit.git',
|
||||||
|
);
|
||||||
|
return array_combine($urls, array_map(function($e) { return array($e); }, $urls));
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @return array List of test URLs that should not pass strict security
|
||||||
|
*/
|
||||||
|
public function prohibitedUrlProvider()
|
||||||
|
{
|
||||||
|
$urls = array(
|
||||||
|
'http://packagist.org',
|
||||||
|
'http://10.1.0.1/satis',
|
||||||
|
'http://127.0.0.1/satis',
|
||||||
|
'svn://localhost/trunk',
|
||||||
|
'svn://will.not.resolve/trunk',
|
||||||
|
'svn://192.168.0.1/trunk',
|
||||||
|
'svn://1.2.3.4/trunk',
|
||||||
|
'git://5.6.7.8/git.git',
|
||||||
|
);
|
||||||
|
return array_combine($urls, array_map(function($e) { return array($e); }, $urls));
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @group TLS
|
* @group TLS
|
||||||
*/
|
*/
|
||||||
|
|
Loading…
Reference in New Issue