mirror of
https://git.anonymousland.org/anonymousland/synapse.git
synced 2025-07-31 04:18:37 -04:00
Fix media repository failing when media store path contains symlinks (#11446)
This commit is contained in:
parent
435f044807
commit
858d80bf0f
3 changed files with 176 additions and 41 deletions
|
@ -12,9 +12,10 @@
|
|||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
import inspect
|
||||
import os
|
||||
from typing import Iterable
|
||||
|
||||
from synapse.rest.media.v1.filepath import MediaFilePaths
|
||||
from synapse.rest.media.v1.filepath import MediaFilePaths, _wrap_with_jail_check
|
||||
|
||||
from tests import unittest
|
||||
|
||||
|
@ -486,3 +487,109 @@ class MediaFilePathsTestCase(unittest.TestCase):
|
|||
f"{value!r} unexpectedly passed validation: "
|
||||
f"{method} returned {path_or_list!r}"
|
||||
)
|
||||
|
||||
|
||||
class MediaFilePathsJailTestCase(unittest.TestCase):
|
||||
def _check_relative_path(self, filepaths: MediaFilePaths, path: str) -> None:
|
||||
"""Passes a relative path through the jail check.
|
||||
|
||||
Args:
|
||||
filepaths: The `MediaFilePaths` instance.
|
||||
path: A path relative to the media store directory.
|
||||
|
||||
Raises:
|
||||
ValueError: If the jail check fails.
|
||||
"""
|
||||
|
||||
@_wrap_with_jail_check(relative=True)
|
||||
def _make_relative_path(self: MediaFilePaths, path: str) -> str:
|
||||
return path
|
||||
|
||||
_make_relative_path(filepaths, path)
|
||||
|
||||
def _check_absolute_path(self, filepaths: MediaFilePaths, path: str) -> None:
|
||||
"""Passes an absolute path through the jail check.
|
||||
|
||||
Args:
|
||||
filepaths: The `MediaFilePaths` instance.
|
||||
path: A path relative to the media store directory.
|
||||
|
||||
Raises:
|
||||
ValueError: If the jail check fails.
|
||||
"""
|
||||
|
||||
@_wrap_with_jail_check(relative=False)
|
||||
def _make_absolute_path(self: MediaFilePaths, path: str) -> str:
|
||||
return os.path.join(self.base_path, path)
|
||||
|
||||
_make_absolute_path(filepaths, path)
|
||||
|
||||
def test_traversal_inside(self) -> None:
|
||||
"""Test the jail check for paths that stay within the media directory."""
|
||||
# Despite the `../`s, these paths still lie within the media directory and it's
|
||||
# expected for the jail check to allow them through.
|
||||
# These paths ought to trip the other checks in place and should never be
|
||||
# returned.
|
||||
filepaths = MediaFilePaths("/media_store")
|
||||
path = "url_cache/2020-01-02/../../GerZNDnDZVjsOtar"
|
||||
self._check_relative_path(filepaths, path)
|
||||
self._check_absolute_path(filepaths, path)
|
||||
|
||||
def test_traversal_outside(self) -> None:
|
||||
"""Test that the jail check fails for paths that escape the media directory."""
|
||||
filepaths = MediaFilePaths("/media_store")
|
||||
path = "url_cache/2020-01-02/../../../GerZNDnDZVjsOtar"
|
||||
with self.assertRaises(ValueError):
|
||||
self._check_relative_path(filepaths, path)
|
||||
with self.assertRaises(ValueError):
|
||||
self._check_absolute_path(filepaths, path)
|
||||
|
||||
def test_traversal_reentry(self) -> None:
|
||||
"""Test the jail check for paths that exit and re-enter the media directory."""
|
||||
# These paths lie outside the media directory if it is a symlink, and inside
|
||||
# otherwise. Ideally the check should fail, but this proves difficult.
|
||||
# This test documents the behaviour for this edge case.
|
||||
# These paths ought to trip the other checks in place and should never be
|
||||
# returned.
|
||||
filepaths = MediaFilePaths("/media_store")
|
||||
path = "url_cache/2020-01-02/../../../media_store/GerZNDnDZVjsOtar"
|
||||
self._check_relative_path(filepaths, path)
|
||||
self._check_absolute_path(filepaths, path)
|
||||
|
||||
def test_symlink(self) -> None:
|
||||
"""Test that a symlink does not cause the jail check to fail."""
|
||||
media_store_path = self.mktemp()
|
||||
|
||||
# symlink the media store directory
|
||||
os.symlink("/mnt/synapse/media_store", media_store_path)
|
||||
|
||||
# Test that relative and absolute paths don't trip the check
|
||||
# NB: `media_store_path` is a relative path
|
||||
filepaths = MediaFilePaths(media_store_path)
|
||||
self._check_relative_path(filepaths, "url_cache/2020-01-02/GerZNDnDZVjsOtar")
|
||||
self._check_absolute_path(filepaths, "url_cache/2020-01-02/GerZNDnDZVjsOtar")
|
||||
|
||||
filepaths = MediaFilePaths(os.path.abspath(media_store_path))
|
||||
self._check_relative_path(filepaths, "url_cache/2020-01-02/GerZNDnDZVjsOtar")
|
||||
self._check_absolute_path(filepaths, "url_cache/2020-01-02/GerZNDnDZVjsOtar")
|
||||
|
||||
def test_symlink_subdirectory(self) -> None:
|
||||
"""Test that a symlinked subdirectory does not cause the jail check to fail."""
|
||||
media_store_path = self.mktemp()
|
||||
os.mkdir(media_store_path)
|
||||
|
||||
# symlink `url_cache/`
|
||||
os.symlink(
|
||||
"/mnt/synapse/media_store_url_cache",
|
||||
os.path.join(media_store_path, "url_cache"),
|
||||
)
|
||||
|
||||
# Test that relative and absolute paths don't trip the check
|
||||
# NB: `media_store_path` is a relative path
|
||||
filepaths = MediaFilePaths(media_store_path)
|
||||
self._check_relative_path(filepaths, "url_cache/2020-01-02/GerZNDnDZVjsOtar")
|
||||
self._check_absolute_path(filepaths, "url_cache/2020-01-02/GerZNDnDZVjsOtar")
|
||||
|
||||
filepaths = MediaFilePaths(os.path.abspath(media_store_path))
|
||||
self._check_relative_path(filepaths, "url_cache/2020-01-02/GerZNDnDZVjsOtar")
|
||||
self._check_absolute_path(filepaths, "url_cache/2020-01-02/GerZNDnDZVjsOtar")
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue