HEX
Server: Apache/2.4.41 (Ubuntu)
System: Linux vmi1674223.contaboserver.net 5.4.0-182-generic #202-Ubuntu SMP Fri Apr 26 12:29:36 UTC 2024 x86_64
User: root (0)
PHP: 7.4.3-4ubuntu2.22
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,
Upload Files
File: //opt/openproject/spec/policies/redirect_policy_spec.rb
#-- copyright
# OpenProject is an open source project management software.
# Copyright (C) 2012-2020 the OpenProject GmbH
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License version 3.
#
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
# Copyright (C) 2006-2017 Jean-Philippe Lang
# Copyright (C) 2010-2013 the ChiliProject Team
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301, USA.
#
# See docs/COPYRIGHT.rdoc for more details.
#++

require 'spec_helper'

describe RedirectPolicy, type: :controller do
  let(:host) { 'test.host' }

  let(:return_escaped) { true }
  let(:default) { 'http://test.foo/default' }

  let(:policy) {
    described_class.new(
      back_url,
      default: default,
      hostname: host,
      return_escaped: return_escaped
    )
  }
  let(:subject) { policy.redirect_url }

  shared_examples 'redirects to default' do |url|
    let(:back_url) { url }
    it "#{url} redirects to the default URL" do
      expect(subject).to eq(default)
    end
  end

  shared_examples 'valid redirect URL' do |url|
    let(:back_url) { url }
    it "#{url} is valid" do
      expect(subject).to eq(url)
    end
  end

  shared_examples 'valid redirect, escaped URL' do |input, output|
    let(:back_url) { input }
    it "#{input} is valid, but escaped to #{output}" do
      expect(subject).to eq(output)
    end
  end

  shared_examples 'ignores invalid URLs' do
    uris = %w(
      //test.foo/fake
      //bar@test.foo
      //test.foo
      ////test.foo
      @test.foo
      fake@test.foo
      //foo:bar@test.foo
      /../somedir
      /work_packages/../../secret
    )

    uris.each do |uri|
      it_behaves_like 'redirects to default', uri
    end
  end

  it_behaves_like 'ignores invalid URLs'
  it_behaves_like 'valid redirect URL', '/work_packages/1234?filter=[foo,bar]'

  it_behaves_like 'valid redirect, escaped URL',
                  'http://test.host/?a=\11\15',
                  'http://test.host/?a=%5C11%5C15'

  context 'without escaped return URLs' do
    let(:return_escaped) { false }
    it_behaves_like 'valid redirect URL', '/work_packages/1234?filter=[foo,bar]'
    it_behaves_like 'valid redirect URL', 'http://test.host/?a=\11\15'
  end

  context 'with relative root' do
    let(:relative_root) { '/mysubdir' }

    before do
      allow(OpenProject::Configuration)
        .to receive(:[]).with('rails_relative_url_root')
        .and_return(relative_root)
    end

    it_behaves_like 'valid redirect URL', '/mysubdir/work_packages/1234'
    it_behaves_like 'valid redirect URL', '/mysubdir'
    it_behaves_like 'redirects to default', '/'
    it_behaves_like 'redirects to default', '/foobar'
    it_behaves_like 'redirects to default', '/mysubdir/../foobar'
    it_behaves_like 'redirects to default', '/mysubdir/%2E%2E/secret/etc/passwd'
    it_behaves_like 'redirects to default', '/%2E%2E/secret/etc/passwd'
    it_behaves_like 'redirects to default', '/foobar/%2E%2E/secret/etc/passwd'
    it_behaves_like 'redirects to default', 'wusdus/%2E%2E/%2E%2E/secret/etc/passwd'
  end

  describe 'auth credentials' do
    let(:back_url) { 'http://user:pass@test.host/work_packages/123' }

    it 'removes the credentials' do
      expect(subject).to eq('http://test.host/work_packages/123')
    end
  end
end