Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
webssh
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
郑天保
webssh
Commits
5519a170
Commit
5519a170
authored
Aug 26, 2018
by
Sheng
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Return 400 http error for invalid post requests
parent
df26d0e6
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
101 additions
and
86 deletions
+101
-86
test_app.py
tests/test_app.py
+56
-45
test_handler.py
tests/test_handler.py
+7
-5
handler.py
webssh/handler.py
+36
-34
settings.py
webssh/settings.py
+2
-2
No files found.
tests/test_app.py
View file @
5519a170
...
...
@@ -37,11 +37,13 @@ class TestApp(AsyncHTTPTestCase):
def
get_app
(
self
):
loop
=
self
.
io_loop
options
.
debug
=
Tru
e
options
.
debug
=
Fals
e
options
.
policy
=
random
.
choice
([
'warning'
,
'autoadd'
])
options
.
hostFile
=
''
options
.
sysHostFile
=
''
app
=
make_app
(
make_handlers
(
loop
,
options
),
get_app_settings
(
options
))
settings
=
get_app_settings
(
options
)
settings
.
update
(
xsrf_cookies
=
False
)
app
=
make_app
(
make_handlers
(
loop
,
options
),
settings
)
return
app
@classmethod
...
...
@@ -63,7 +65,7 @@ class TestApp(AsyncHTTPTestCase):
options
.
update
(
max_body_size
=
max_body_size
)
return
options
def
test_app_with_invalid_form
(
self
):
def
test_app_with_invalid_form
_for_missing_argument
(
self
):
response
=
self
.
fetch
(
'/'
)
self
.
assertEqual
(
response
.
code
,
200
)
...
...
@@ -82,44 +84,67 @@ class TestApp(AsyncHTTPTestCase):
response
=
self
.
fetch
(
'/'
,
method
=
'POST'
,
body
=
body
)
self
.
assertIn
(
b
'Missing argument username'
,
response
.
body
)
body
=
'hostname=127.0.0.1&port=7000&username=admin'
response
=
self
.
fetch
(
'/'
,
method
=
'POST'
,
body
=
body
)
self
.
assertEqual
(
response
.
code
,
400
)
self
.
assertIn
(
b
'Missing argument password'
,
response
.
body
)
body
=
'hostname=&port=&username=&password'
response
=
self
.
fetch
(
'/'
,
method
=
'POST'
,
body
=
body
)
self
.
assertIn
(
b
'The hostname field is required'
,
response
.
body
)
self
.
assertEqual
(
response
.
code
,
400
)
self
.
assertIn
(
b
'Missing argument hostname'
,
response
.
body
)
body
=
'hostname=127.0.0.1&port=&username=&password'
response
=
self
.
fetch
(
'/'
,
method
=
'POST'
,
body
=
body
)
self
.
assertIn
(
b
'The port field is required'
,
response
.
body
)
self
.
assertEqual
(
response
.
code
,
400
)
self
.
assertIn
(
b
'Missing argument port'
,
response
.
body
)
body
=
'hostname=127.0.0.1&port=7000&username=&password'
response
=
self
.
fetch
(
'/'
,
method
=
'POST'
,
body
=
body
)
self
.
assertIn
(
b
'The username field is required'
,
response
.
body
)
self
.
assertEqual
(
response
.
code
,
400
)
self
.
assertIn
(
b
'Missing argument username'
,
response
.
body
)
def
test_app_with_invalid_form_for_invalid_value
(
self
):
body
=
'hostname=127.0.0&port=22&username=&password'
response
=
self
.
fetch
(
'/'
,
method
=
'POST'
,
body
=
body
)
self
.
assertIn
(
b
'Invalid hostname'
,
response
.
body
)
body
=
'hostname=http://www.googe.com&port=22&username=&password'
response
=
self
.
fetch
(
'/'
,
method
=
'POST'
,
body
=
body
)
self
.
assertEqual
(
response
.
code
,
400
)
self
.
assertIn
(
b
'Invalid hostname'
,
response
.
body
)
body
=
'hostname=127.0.0.1&port=port&username=&password'
response
=
self
.
fetch
(
'/'
,
method
=
'POST'
,
body
=
body
)
self
.
assertEqual
(
response
.
code
,
400
)
self
.
assertIn
(
b
'Invalid port'
,
response
.
body
)
body
=
'hostname=127.0.0.1&port=70000&username=&password'
response
=
self
.
fetch
(
'/'
,
method
=
'POST'
,
body
=
body
)
self
.
assertEqual
(
response
.
code
,
400
)
self
.
assertIn
(
b
'Invalid port'
,
response
.
body
)
def
test_app_with_wrong_hostname_ip
(
self
):
body
=
'hostname=127.0.0.1&port=7000&username=admin'
response
=
self
.
fetch
(
'/'
,
method
=
'POST'
,
body
=
body
)
self
.
assertEqual
(
response
.
code
,
200
)
self
.
assertIn
(
b
'Unable to connect to'
,
response
.
body
)
def
test_app_with_wrong_hostname_domain
(
self
):
body
=
'hostname=xxxxxxxxxxxx&port=7000&username=admin'
response
=
self
.
fetch
(
'/'
,
method
=
'POST'
,
body
=
body
)
self
.
assertEqual
(
response
.
code
,
200
)
self
.
assertIn
(
b
'Unable to connect to'
,
response
.
body
)
def
test_app_with_wrong_port
(
self
):
body
=
'hostname=127.0.0.1&port=7000&username=admin'
response
=
self
.
fetch
(
'/'
,
method
=
'POST'
,
body
=
body
)
self
.
assertEqual
(
response
.
code
,
200
)
self
.
assertIn
(
b
'Unable to connect to'
,
response
.
body
)
def
test_app_with_wrong_credentials
(
self
):
response
=
self
.
fetch
(
'/'
)
self
.
assertEqual
(
response
.
code
,
200
)
response
=
self
.
fetch
(
'/'
,
method
=
'POST'
,
body
=
self
.
body
+
's'
)
self
.
assertIn
(
b
'Authentication failed.'
,
response
.
body
)
data
=
json
.
loads
(
to_str
(
response
.
body
))
self
.
assertIsNone
(
data
[
'encoding'
])
self
.
assertIsNone
(
data
[
'id'
])
self
.
assertIn
(
'Authentication failed.'
,
data
[
'status'
])
def
test_app_with_correct_credentials
(
self
):
response
=
self
.
fetch
(
'/'
)
...
...
@@ -192,7 +217,7 @@ class TestApp(AsyncHTTPTestCase):
self
.
assertIn
(
'Missing argument id'
,
ws
.
close_reason
)
@tornado.testing.gen_test
def
test_app_with_correct_credentials_but_e
p
mpty_id
(
self
):
def
test_app_with_correct_credentials_but_empty_id
(
self
):
url
=
self
.
get_url
(
'/'
)
client
=
self
.
get_http_client
()
response
=
yield
client
.
fetch
(
url
)
...
...
@@ -209,7 +234,7 @@ class TestApp(AsyncHTTPTestCase):
ws
=
yield
tornado
.
websocket
.
websocket_connect
(
ws_url
)
msg
=
yield
ws
.
read_message
()
self
.
assertIsNone
(
msg
)
self
.
assertIn
(
'
field is require
d'
,
ws
.
close_reason
)
self
.
assertIn
(
'
Missing argument i
d'
,
ws
.
close_reason
)
@tornado.testing.gen_test
def
test_app_with_correct_credentials_but_wrong_id
(
self
):
...
...
@@ -345,12 +370,10 @@ class TestApp(AsyncHTTPTestCase):
headers
=
{
'Content-Type'
:
content_type
,
'content-length'
:
str
(
len
(
body
))
}
response
=
yield
client
.
fetch
(
url
,
method
=
'POST'
,
headers
=
headers
,
body
=
body
)
data
=
json
.
loads
(
to_str
(
response
.
body
))
self
.
assertIsNone
(
data
[
'id'
])
self
.
assertIsNone
(
data
[
'encoding'
])
self
.
assertTrue
(
data
[
'status'
]
.
startswith
(
'Invalid private key'
))
with
self
.
assertRaises
(
HTTPError
)
as
ctx
:
yield
client
.
fetch
(
url
,
method
=
'POST'
,
headers
=
headers
,
body
=
body
)
self
.
assertEqual
(
ctx
.
exception
.
code
,
400
)
self
.
assertIn
(
'Invalid private key'
,
ctx
.
exception
.
message
)
@tornado.testing.gen_test
def
test_app_auth_with_pubkey_exceeds_key_max_size
(
self
):
...
...
@@ -366,12 +389,10 @@ class TestApp(AsyncHTTPTestCase):
headers
=
{
'Content-Type'
:
content_type
,
'content-length'
:
str
(
len
(
body
))
}
response
=
yield
client
.
fetch
(
url
,
method
=
'POST'
,
headers
=
headers
,
body
=
body
)
data
=
json
.
loads
(
to_str
(
response
.
body
))
self
.
assertIsNone
(
data
[
'id'
])
self
.
assertIsNone
(
data
[
'encoding'
])
self
.
assertTrue
(
data
[
'status'
]
.
startswith
(
'Invalid private key'
))
with
self
.
assertRaises
(
HTTPError
)
as
ctx
:
yield
client
.
fetch
(
url
,
method
=
'POST'
,
headers
=
headers
,
body
=
body
)
self
.
assertEqual
(
ctx
.
exception
.
code
,
400
)
self
.
assertIn
(
'Invalid private key'
,
ctx
.
exception
.
message
)
@tornado.testing.gen_test
def
test_app_auth_with_pubkey_cannot_be_decoded_by_multipart_form
(
self
):
...
...
@@ -390,22 +411,10 @@ class TestApp(AsyncHTTPTestCase):
headers
=
{
'Content-Type'
:
content_type
,
'content-length'
:
str
(
len
(
body
))
}
with
self
.
assertRaises
(
HTTPError
)
as
exc
:
with
self
.
assertRaises
(
HTTPError
)
as
ctx
:
yield
client
.
fetch
(
url
,
method
=
'POST'
,
headers
=
headers
,
body
=
body
)
self
.
assertIn
(
'Bad Request (Invalid unicode'
,
exc
.
msg
)
@tornado.testing.gen_test
def
test_app_auth_with_pubkey_cannot_be_decoded_by_urlencoded_form
(
self
):
url
=
self
.
get_url
(
'/'
)
client
=
self
.
get_http_client
()
response
=
yield
client
.
fetch
(
url
)
self
.
assertEqual
(
response
.
code
,
200
)
privatekey
=
b
'h'
*
1024
+
b
'
\xb4\xed\xce\xf3
'
body
=
self
.
body
.
encode
()
+
b
'&privatekey='
+
privatekey
with
self
.
assertRaises
(
HTTPError
)
as
exc
:
yield
client
.
fetch
(
url
,
method
=
'POST'
,
body
=
body
)
self
.
assertIn
(
'Bad Request (Invalid unicode'
,
exc
.
msg
)
self
.
assertEqual
(
ctx
.
exception
.
code
,
400
)
self
.
assertIn
(
'Invalid unicode'
,
ctx
.
exception
.
message
)
@tornado.testing.gen_test
def
test_app_post_form_with_large_body_size_by_multipart_form
(
self
):
...
...
@@ -422,9 +431,10 @@ class TestApp(AsyncHTTPTestCase):
'Content-Type'
:
content_type
,
'content-length'
:
str
(
len
(
body
))
}
with
self
.
assertRaises
(
HTTPError
)
as
exc
:
with
self
.
assertRaises
(
HTTPError
)
as
ctx
:
yield
client
.
fetch
(
url
,
method
=
'POST'
,
headers
=
headers
,
body
=
body
)
self
.
assertIsNone
(
exc
.
msg
)
self
.
assertEqual
(
ctx
.
exception
.
code
,
400
)
self
.
assertIn
(
'Bad Request'
,
ctx
.
exception
.
message
)
@tornado.testing.gen_test
def
test_app_post_form_with_large_body_size_by_urlencoded_form
(
self
):
...
...
@@ -435,6 +445,7 @@ class TestApp(AsyncHTTPTestCase):
privatekey
=
'h'
*
(
2
*
max_body_size
)
body
=
self
.
body
+
'&privatekey='
+
privatekey
with
self
.
assertRaises
(
HTTPError
)
as
exc
:
with
self
.
assertRaises
(
HTTPError
)
as
ctx
:
yield
client
.
fetch
(
url
,
method
=
'POST'
,
body
=
body
)
self
.
assertIsNone
(
exc
.
msg
)
self
.
assertEqual
(
ctx
.
exception
.
code
,
400
)
self
.
assertIn
(
'Bad Request'
,
ctx
.
exception
.
message
)
tests/test_handler.py
View file @
5519a170
...
...
@@ -3,7 +3,9 @@ import paramiko
from
tornado.httputil
import
HTTPServerRequest
from
tests.utils
import
read_file
,
make_tests_data_path
from
webssh.handler
import
MixinHandler
,
IndexHandler
,
parse_encoding
from
webssh.handler
import
(
MixinHandler
,
IndexHandler
,
parse_encoding
,
InvalidException
)
class
TestHandler
(
unittest
.
TestCase
):
...
...
@@ -70,7 +72,7 @@ class TestIndexHandler(unittest.TestCase):
pkey
=
IndexHandler
.
get_specific_pkey
(
cls
,
'x'
+
key
,
None
)
self
.
assertIsNone
(
pkey
)
with
self
.
assertRaises
(
ValueError
):
with
self
.
assertRaises
(
paramiko
.
PasswordRequiredException
):
pkey
=
IndexHandler
.
get_specific_pkey
(
cls
,
key
,
None
)
def
test_get_pkey_obj_with_plain_key
(
self
):
...
...
@@ -81,7 +83,7 @@ class TestIndexHandler(unittest.TestCase):
self
.
assertIsInstance
(
pkey
,
cls
)
pkey
=
IndexHandler
.
get_pkey_obj
(
key
,
'iginored'
,
fname
)
self
.
assertIsInstance
(
pkey
,
cls
)
with
self
.
assertRaises
(
ValueError
)
as
exc
:
with
self
.
assertRaises
(
InvalidException
)
as
exc
:
pkey
=
IndexHandler
.
get_pkey_obj
(
'x'
+
key
,
None
,
fname
)
self
.
assertIn
(
'Invalid private key'
,
str
(
exc
))
...
...
@@ -92,9 +94,9 @@ class TestIndexHandler(unittest.TestCase):
key
=
read_file
(
make_tests_data_path
(
fname
))
pkey
=
IndexHandler
.
get_pkey_obj
(
key
,
password
,
fname
)
self
.
assertIsInstance
(
pkey
,
cls
)
with
self
.
assertRaises
(
ValueError
)
as
exc
:
with
self
.
assertRaises
(
InvalidException
)
as
exc
:
pkey
=
IndexHandler
.
get_pkey_obj
(
key
,
'wrongpass'
,
fname
)
self
.
assertIn
(
'Wrong password'
,
str
(
exc
))
with
self
.
assertRaises
(
ValueError
)
as
exc
:
with
self
.
assertRaises
(
InvalidException
)
as
exc
:
pkey
=
IndexHandler
.
get_pkey_obj
(
'x'
+
key
,
password
,
fname
)
self
.
assertIn
(
'Invalid private key'
,
str
(
exc
))
webssh/handler.py
View file @
5519a170
...
...
@@ -38,20 +38,25 @@ def parse_encoding(data):
return
s
.
strip
(
'"'
)
.
split
(
'.'
)[
-
1
]
class
InvalidException
(
Exception
):
pass
class
MixinHandler
(
object
):
def
get_value
(
self
,
name
):
is_required
=
name
in
self
.
arguments_required
def
write_error
(
self
,
status_code
,
**
kwargs
):
exc_info
=
kwargs
.
get
(
'exc_info'
)
if
exc_info
and
len
(
exc_info
)
>
1
:
info
=
str
(
exc_info
[
1
])
if
info
:
self
.
_reason
=
info
.
split
(
':'
,
1
)[
-
1
]
.
strip
()
super
(
MixinHandler
,
self
)
.
write_error
(
status_code
,
**
kwargs
)
try
:
value
=
self
.
get_argument
(
name
)
except
tornado
.
web
.
MissingArgumentError
:
if
is_required
:
raise
else
:
if
not
value
and
is_required
:
raise
ValueError
(
'The {} field is required.'
.
format
(
name
))
return
value
def
get_value
(
self
,
name
):
value
=
self
.
get_argument
(
name
)
if
not
value
:
raise
tornado
.
web
.
MissingArgumentError
(
name
)
return
value
def
get_real_client_addr
(
self
):
ip
=
self
.
request
.
headers
.
get
(
'X-Real-Ip'
)
...
...
@@ -75,8 +80,6 @@ class MixinHandler(object):
class
IndexHandler
(
MixinHandler
,
tornado
.
web
.
RequestHandler
):
arguments_required
=
{
'hostname'
,
'port'
,
'username'
,
'password'
}
def
initialize
(
self
,
loop
,
policy
,
host_keys_settings
):
self
.
loop
=
loop
self
.
policy
=
policy
...
...
@@ -86,14 +89,14 @@ class IndexHandler(MixinHandler, tornado.web.RequestHandler):
def
get_privatekey
(
self
):
lst
=
self
.
request
.
files
.
get
(
'privatekey'
)
# multipart form
if
not
lst
:
return
self
.
get_
value
(
'privatekey
'
)
# urlencoded form
return
self
.
get_
argument
(
'privatekey'
,
u'
'
)
# urlencoded form
else
:
self
.
filename
=
lst
[
0
][
'filename'
]
data
=
lst
[
0
][
'body'
]
if
len
(
data
)
>
KEY_MAX_SIZE
:
raise
ValueError
(
'Invalid private key: {}'
.
format
(
self
.
filename
)
)
raise
InvalidException
(
'Invalid private key: {}'
.
format
(
self
.
filename
)
)
return
self
.
decode_argument
(
data
,
name
=
self
.
filename
)
@classmethod
...
...
@@ -103,7 +106,7 @@ class IndexHandler(MixinHandler, tornado.web.RequestHandler):
pkey
=
pkeycls
.
from_private_key
(
io
.
StringIO
(
privatekey
),
password
=
password
)
except
paramiko
.
PasswordRequiredException
:
raise
ValueError
(
'Need password to decrypt the private key.'
)
raise
except
paramiko
.
SSHException
:
pass
else
:
...
...
@@ -125,7 +128,7 @@ class IndexHandler(MixinHandler, tornado.web.RequestHandler):
error
=
(
'Wrong password {!r} for decrypting the private key.'
)
.
format
(
password
)
raise
ValueError
(
error
)
raise
InvalidException
(
error
)
return
pkey
...
...
@@ -133,7 +136,7 @@ class IndexHandler(MixinHandler, tornado.web.RequestHandler):
value
=
self
.
get_value
(
'hostname'
)
if
not
(
is_valid_hostname
(
value
)
|
is_valid_ipv4_address
(
value
)
|
is_valid_ipv6_address
(
value
)):
raise
ValueError
(
'Invalid hostname: {}'
.
format
(
value
))
raise
InvalidException
(
'Invalid hostname: {}'
.
format
(
value
))
return
value
def
get_port
(
self
):
...
...
@@ -146,19 +149,13 @@ class IndexHandler(MixinHandler, tornado.web.RequestHandler):
if
is_valid_port
(
port
):
return
port
raise
ValueError
(
'Invalid port: {}'
.
format
(
value
))
def
get_password
(
self
):
try
:
return
self
.
get_value
(
'password'
)
except
ValueError
:
return
''
raise
InvalidException
(
'Invalid port: {}'
.
format
(
value
))
def
get_args
(
self
):
hostname
=
self
.
get_hostname
()
port
=
self
.
get_port
()
username
=
self
.
get_value
(
'username'
)
password
=
self
.
get_
password
(
)
password
=
self
.
get_
argument
(
'password'
,
u''
)
privatekey
=
self
.
get_privatekey
()
pkey
=
self
.
get_pkey_obj
(
privatekey
,
password
,
self
.
filename
)
\
if
privatekey
else
None
...
...
@@ -188,7 +185,11 @@ class IndexHandler(MixinHandler, tornado.web.RequestHandler):
ssh
.
_host_keys_filename
=
self
.
host_keys_settings
[
'host_keys_filename'
]
ssh
.
set_missing_host_key_policy
(
self
.
policy
)
args
=
self
.
get_args
()
try
:
args
=
self
.
get_args
()
except
InvalidException
as
exc
:
raise
tornado
.
web
.
HTTPError
(
400
,
str
(
exc
))
dst_addr
=
(
args
[
0
],
args
[
1
])
logging
.
info
(
'Connecting to {}:{}'
.
format
(
*
dst_addr
))
...
...
@@ -197,6 +198,8 @@ class IndexHandler(MixinHandler, tornado.web.RequestHandler):
except
socket
.
error
:
raise
ValueError
(
'Unable to connect to {}:{}'
.
format
(
*
dst_addr
))
except
paramiko
.
BadAuthenticationType
:
raise
ValueError
(
'Bad authentication type.'
)
except
paramiko
.
AuthenticationException
:
raise
ValueError
(
'Authentication failed.'
)
except
paramiko
.
BadHostKeyException
:
raise
ValueError
(
'Bad host key.'
)
...
...
@@ -233,7 +236,7 @@ class IndexHandler(MixinHandler, tornado.web.RequestHandler):
try
:
worker
=
yield
future
except
ValueError
as
exc
:
except
(
ValueError
,
paramiko
.
SSHException
)
as
exc
:
status
=
str
(
exc
)
else
:
worker_id
=
worker
.
id
...
...
@@ -246,8 +249,6 @@ class IndexHandler(MixinHandler, tornado.web.RequestHandler):
class
WsockHandler
(
MixinHandler
,
tornado
.
websocket
.
WebSocketHandler
):
arguments_required
=
{
'id'
}
def
initialize
(
self
,
loop
):
self
.
loop
=
loop
self
.
worker_ref
=
None
...
...
@@ -260,8 +261,9 @@ class WsockHandler(MixinHandler, tornado.websocket.WebSocketHandler):
logging
.
info
(
'Connected from {}:{}'
.
format
(
*
self
.
src_addr
))
try
:
worker_id
=
self
.
get_value
(
'id'
)
except
(
tornado
.
web
.
MissingArgumentError
,
ValueError
)
as
exc
:
self
.
close
(
reason
=
str
(
exc
))
except
tornado
.
web
.
MissingArgumentError
as
exc
:
self
.
close
(
reason
=
exc
.
log_message
)
raise
else
:
worker
=
workers
.
get
(
worker_id
)
if
worker
and
worker
.
src_addr
[
0
]
==
self
.
src_addr
[
0
]:
...
...
webssh/settings.py
View file @
5519a170
...
...
@@ -36,8 +36,8 @@ def get_app_settings(options):
template_path
=
os
.
path
.
join
(
base_dir
,
'webssh'
,
'templates'
),
static_path
=
os
.
path
.
join
(
base_dir
,
'webssh'
,
'static'
),
websocket_ping_interval
=
options
.
wpIntvl
,
xsrf_cookies
=
(
not
options
.
debug
)
,
debug
=
options
.
debug
debug
=
options
.
debug
,
xsrf_cookies
=
True
)
return
settings
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment