Address feedback on correctness of SCP/username validations

This commit is contained in:
Katrina Verey
2023-01-06 18:00:14 -05:00
parent 4821259f01
commit 43d96ba91b
2 changed files with 104 additions and 37 deletions

View File

@@ -228,37 +228,82 @@ func parsePath(n string) string {
}
func extractHost(n string) (string, string) {
// We used to use go-getter to handle our urls: https://github.com/hashicorp/go-getter.
// This prefix signaled go-getter to use the git protocol to fetch the url's contents.
// We still accept this prefix.
n, _ = trimPrefixIgnoreCase(n, "git::")
n = ignoreForcedGitProtocol(n)
scheme, n := extractScheme(n)
username, n := extractUsername(n)
n, isGithubURL := trimGithubHost(n)
// Validate the username and scheme before attempting host/path parsing, because if the parsing
// so far has not succeeded, we will not be able to extract the host and path correctly.
if err := validateUsernameAndScheme(username, scheme, isGithubURL); err != nil {
// TODO: return this error instead.
return "", n
}
// Github URLS get special handling because they are strictly normalized in a way that
// may discard scheme and username components in some cases.
if isGithubURL {
return normalizedGithubHost(scheme, username), n
}
// Now that we have extracted a valid scheme+username, we can parse host itself.
// The file protocol specifies an absolute path to a local git repo. There is no host.
if scheme == "file://" {
// The file protocol specifies an absolute path to a local git repo. There is no host.
return scheme, n
}
username, n := extractUsername(n)
if rest, isGithubURL := trimGithubHost(n); isGithubURL {
// we strictly normalize Github URLs; this may discard scheme and username components in some cases.
return normalizedGithubHost(scheme, username), rest
}
sepIndex := findPathSeparator(n, username == gitUsername)
sepIndex := findPathSeparator(n, acceptSCPStyle(scheme, username))
host, rest := n[:sepIndex+1], n[sepIndex+1:]
if !validHostSpecParsed(scheme, username, host) {
// Host is required, so do not concat the scheme and username if we didn't find one.
if host == "" {
// TODO: This should return an error.
return "", n
}
return scheme + username + host, rest
}
func validHostSpecParsed(scheme, username, host string) bool {
isSCP := username == gitUsername
return len(host) > 0 &&
(scheme != "" || isSCP) // scheme may be blank for URLs like git@github.com:org/repo
// ignoreForcedGitProtocol strips the "git::" prefix from URLs.
// We used to use go-getter to handle our urls: https://github.com/hashicorp/go-getter.
// The git:: prefix signaled go-getter to use the git protocol to fetch the url's contents.
// We silently strip this prefix to allow these go-getter-style urls to continue to work,
// although the git protocol (which is insecure and unsupported on many platforms, including Github)
// will not actually be used as intended.
func ignoreForcedGitProtocol(n string) string {
n, _ = trimPrefixIgnoreCase(n, "git::")
return n
}
// acceptSCPStyle returns true if the scheme and username indicate potential use of an SCP-style URL.
// With this style, the scheme is not explicit and the path is delimited by a colon.
// Strictly speaking the username is optional in SCP-like syntax, but Kustomize has always required it.
// Example: user@host.xz:path/to/repo.git/
func acceptSCPStyle(scheme, username string) bool {
return username != "" && scheme == ""
}
func validateUsernameAndScheme(username, scheme string, isGithubURL bool) error {
// see https://git-scm.com/docs/git-fetch#_git_urls for info relevant to these validations
switch scheme {
case "":
// Empty scheme is only ok if it's a Github URL or if it looks like SCP-style syntax
if !acceptSCPStyle(scheme, username) && !isGithubURL {
return fmt.Errorf("no username or scheme found")
}
case "ssh://":
// usernames are optional for ssh protocol
return nil
case "https://", "http://", "file://":
// usernames are not supported by http or file protocols
if username != "" {
return fmt.Errorf("username %q specified, but %s does not support usernames", username, scheme)
}
default:
// At time of writing, we should never end up here because we do not parse out
// unsupported schemes to begin with.
return fmt.Errorf("unsupported scheme %q", scheme)
}
return nil
}
func extractScheme(s string) (string, string) {
@@ -295,16 +340,10 @@ func trimPrefixIgnoreCase(s, prefix string) (string, bool) {
return s, false
}
func findPathSeparator(hostPath string, isSCP bool) int {
if strings.Contains(hostPath, "://") {
// This function assumes that the hostPath does not contain a scheme.
// If it does, we return -1 to indicate that the hostPath is invalid.
return -1
}
func findPathSeparator(hostPath string, acceptSCP bool) int {
sepIndex := strings.Index(hostPath, "/")
if isSCP {
// The colon acts as a delimiter for scp protocol only if not prefixed by '/'.
if acceptSCP {
// The colon acts as a delimiter in scp-style ssh URLs only if not prefixed by '/'.
if colonIndex := strings.Index(hostPath, ":"); colonIndex > 0 && colonIndex < sepIndex {
sepIndex = colonIndex
}

View File

@@ -116,16 +116,20 @@ func TestNewRepoSpecFromUrlErrors(t *testing.T) {
"github.com!org/repo.git//path",
"url lacks host",
},
"unsupported protocol after username": {
"git@scp://github.com/org/repo.git//path",
"url lacks host",
},
"supported protocol after username": {
"git@https://github.com/org/repo.git//path",
"url lacks host",
},
"mysterious gh: prefix previously supported is no longer handled": {
"gh:org/repo",
"url lacks host",
},
"username unsupported with http": {
"http://git@foo.com/path/to/repo",
"url lacks host",
},
"username unsupported with https": {
"https://git@foo.com/path/to/repo",
"url lacks host",
},
"username unsupported with file": {
"file://git@/path/to/repo",
"url lacks orgRepo",
},
}
@@ -508,6 +512,30 @@ func TestNewRepoSpecFromUrl_Smoke(t *testing.T) {
GitSuffix: ".git",
},
},
{
name: "unsupported protocol after username (invalid and will be rejected by git)",
input: "git@scp://github.com/org/repo.git//path",
cloneSpec: "git@scp://github.com/org/repo.git",
absPath: notCloned.Join("path"),
repoSpec: RepoSpec{
Host: "git@scp:/",
OrgRepo: "/github.com/org/repo",
Path: "/path",
GitSuffix: ".git",
},
},
{
name: "supported protocol after username (invalid and will be rejected by git)",
input: "git@ssh://github.com/org/repo.git//path",
cloneSpec: "git@ssh://github.com/org/repo.git",
absPath: notCloned.Join("path"),
repoSpec: RepoSpec{
Host: "git@ssh:/",
OrgRepo: "/github.com/org/repo",
Path: "/path",
GitSuffix: ".git",
},
},
}
for _, tc := range testcases {
t.Run(tc.name, func(t *testing.T) {