Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
webssh
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
郑天保
webssh
Commits
c06bf531
Commit
c06bf531
authored
Oct 17, 2018
by
Sheng
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Added an option for blocking public non-https requests
parent
746982b0
Hide whitespace changes
Inline
Side-by-side
Showing
7 changed files
with
115 additions
and
13 deletions
+115
-13
test_handler.py
tests/test_handler.py
+2
-1
test_settings.py
tests/test_settings.py
+28
-1
test_utils.py
tests/test_utils.py
+25
-2
handler.py
webssh/handler.py
+18
-7
main.py
webssh/main.py
+2
-1
settings.py
webssh/settings.py
+14
-1
utils.py
webssh/utils.py
+26
-0
No files found.
tests/test_handler.py
View file @
c06bf531
...
...
@@ -3,7 +3,6 @@ import paramiko
from
tornado.httpclient
import
HTTPRequest
from
tornado.httputil
import
HTTPServerRequest
from
tornado.web
import
HTTPError
from
tests.utils
import
read_file
,
make_tests_data_path
from
webssh.handler
import
MixinHandler
,
IndexHandler
,
InvalidValueError
...
...
@@ -17,6 +16,8 @@ class TestMixinHandler(unittest.TestCase):
def
test_is_forbidden
(
self
):
handler
=
MixinHandler
()
handler
.
is_open_to_public
=
True
handler
.
forbid_public_http
=
True
request
=
HTTPRequest
(
'http://example.com/'
)
handler
.
request
=
request
...
...
tests/test_settings.py
View file @
c06bf531
...
...
@@ -7,10 +7,11 @@ import paramiko
import
tornado.options
as
options
from
tests.utils
import
make_tests_data_path
from
webssh
import
settings
from
webssh.policy
import
load_host_keys
from
webssh.settings
import
(
get_host_keys_settings
,
get_policy_setting
,
base_dir
,
print_version
,
get_ssl_context
,
get_trusted_downstream
get_ssl_context
,
get_trusted_downstream
,
detect_is_open_to_public
,
)
from
webssh.utils
import
UnicodeType
from
webssh._version
import
__version__
...
...
@@ -137,3 +138,29 @@ class TestSettings(unittest.TestCase):
options
.
tdstream
=
'1.1.1.1, 2.2.2.'
with
self
.
assertRaises
(
ValueError
):
get_trusted_downstream
(
options
),
tdstream
def
test_detect_is_open_to_public
(
self
):
options
.
fbidhttp
=
True
options
.
address
=
'localhost'
detect_is_open_to_public
(
options
)
self
.
assertFalse
(
settings
.
is_open_to_public
)
options
.
address
=
'127.0.0.1'
detect_is_open_to_public
(
options
)
self
.
assertFalse
(
settings
.
is_open_to_public
)
options
.
address
=
'192.168.1.1'
detect_is_open_to_public
(
options
)
self
.
assertFalse
(
settings
.
is_open_to_public
)
options
.
address
=
''
detect_is_open_to_public
(
options
)
self
.
assertTrue
(
settings
.
is_open_to_public
)
options
.
address
=
'0.0.0.0'
detect_is_open_to_public
(
options
)
self
.
assertTrue
(
settings
.
is_open_to_public
)
options
.
address
=
'::'
detect_is_open_to_public
(
options
)
self
.
assertTrue
(
settings
.
is_open_to_public
)
tests/test_utils.py
View file @
c06bf531
import
unittest
from
webssh.utils
import
(
is_valid_ip_address
,
is_valid_port
,
is_valid_hostname
,
to_str
,
to_bytes
,
to_int
is_valid_ip_address
,
is_valid_port
,
is_valid_hostname
,
to_str
,
to_bytes
,
to_int
,
on_public_network_interface
,
on_public_network_interfaces
,
get_ips_by_name
)
...
...
@@ -51,3 +52,25 @@ class TestUitls(unittest.TestCase):
self
.
assertFalse
(
is_valid_hostname
(
'https://www.google.com'
))
self
.
assertFalse
(
is_valid_hostname
(
'127.0.0.1'
))
self
.
assertFalse
(
is_valid_hostname
(
'::1'
))
def
test_get_ips_by_name
(
self
):
self
.
assertTrue
(
get_ips_by_name
(
''
),
{
'0.0.0.0'
,
'::'
})
self
.
assertTrue
(
get_ips_by_name
(
'localhost'
),
{
'127.0.0.1'
})
self
.
assertTrue
(
get_ips_by_name
(
'192.68.1.1'
),
{
'192.168.1.1'
})
self
.
assertTrue
(
get_ips_by_name
(
'2.2.2.2'
),
{
'2.2.2.2'
})
def
test_on_public_network_interface
(
self
):
self
.
assertTrue
(
on_public_network_interface
(
'0.0.0.0'
))
self
.
assertTrue
(
on_public_network_interface
(
'::'
))
self
.
assertTrue
(
on_public_network_interface
(
'0:0:0:0:0:0:0:0'
))
self
.
assertTrue
(
on_public_network_interface
(
'2.2.2.2'
))
self
.
assertTrue
(
on_public_network_interface
(
'2:2:2:2:2:2:2:2'
))
self
.
assertIsNone
(
on_public_network_interface
(
'127.0.0.1'
))
def
test_on_public_network_interfaces
(
self
):
self
.
assertTrue
(
on_public_network_interfaces
([
'0.0.0.0'
,
'127.0.0.1'
])
)
self
.
assertIsNone
(
on_public_network_interfaces
([
'192.168.1.1'
,
'127.0.0.1'
])
)
webssh/handler.py
View file @
c06bf531
...
...
@@ -10,7 +10,8 @@ import paramiko
import
tornado.web
from
tornado.ioloop
import
IOLoop
from
webssh.settings
import
swallow_http_errors
from
tornado.options
import
options
from
webssh
import
settings
from
webssh.utils
import
(
is_valid_ip_address
,
is_valid_port
,
is_valid_hostname
,
to_bytes
,
to_str
,
to_int
,
to_ip_address
,
UnicodeType
...
...
@@ -39,11 +40,20 @@ class InvalidValueError(Exception):
class
MixinHandler
(
object
):
is_open_to_public
=
None
forbid_public_http
=
None
custom_headers
=
{
'Server'
:
'TornadoServer'
}
def
initialize
(
self
):
if
self
.
is_open_to_public
is
None
:
MixinHandler
.
is_open_to_public
=
settings
.
is_open_to_public
if
self
.
forbid_public_http
is
None
:
MixinHandler
.
forbid_public_http
=
options
.
fbidhttp
if
self
.
is_forbidden
():
result
=
'{} 403 Forbidden
\r\n\r\n
'
.
format
(
self
.
request
.
version
)
self
.
request
.
connection
.
stream
.
write
(
to_bytes
(
result
))
...
...
@@ -66,11 +76,12 @@ class MixinHandler(object):
)
return
True
if
context
.
_orig_protocol
==
'http'
:
ipaddr
=
to_ip_address
(
ip
)
if
not
ipaddr
.
is_private
:
logging
.
warning
(
'Public non-https request is forbidden.'
)
return
True
if
self
.
is_open_to_public
and
self
.
forbid_public_http
:
if
context
.
_orig_protocol
==
'http'
:
ipaddr
=
to_ip_address
(
ip
)
if
not
ipaddr
.
is_private
:
logging
.
warning
(
'Public non-https request is forbidden.'
)
return
True
def
set_default_headers
(
self
):
for
header
in
self
.
custom_headers
.
items
():
...
...
@@ -127,7 +138,7 @@ class IndexHandler(MixinHandler, tornado.web.RequestHandler):
super
(
IndexHandler
,
self
)
.
initialize
()
def
write_error
(
self
,
status_code
,
**
kwargs
):
if
self
.
request
.
method
!=
'POST'
or
not
swallow_http_errors
:
if
self
.
request
.
method
!=
'POST'
or
not
s
ettings
.
s
wallow_http_errors
:
super
(
IndexHandler
,
self
)
.
write_error
(
status_code
,
**
kwargs
)
else
:
exc_info
=
kwargs
.
get
(
'exc_info'
)
...
...
webssh/main.py
View file @
c06bf531
...
...
@@ -6,7 +6,7 @@ from tornado.options import options
from
webssh.handler
import
IndexHandler
,
WsockHandler
,
NotFoundHandler
from
webssh.settings
import
(
get_app_settings
,
get_host_keys_settings
,
get_policy_setting
,
get_ssl_context
,
get_server_settings
get_ssl_context
,
get_server_settings
,
detect_is_open_to_public
)
...
...
@@ -40,6 +40,7 @@ def main():
app
.
listen
(
options
.
sslport
,
options
.
ssladdress
,
**
server_settings
)
logging
.
info
(
'Listening on ssl {}:{}'
.
format
(
options
.
ssladdress
,
options
.
sslport
))
detect_is_open_to_public
(
options
)
loop
.
start
()
...
...
webssh/settings.py
View file @
c06bf531
...
...
@@ -7,7 +7,9 @@ from tornado.options import define
from
webssh.policy
import
(
load_host_keys
,
get_policy_class
,
check_policy_setting
)
from
webssh.utils
import
to_ip_address
from
webssh.utils
import
(
to_ip_address
,
get_ips_by_name
,
on_public_network_interfaces
)
from
webssh._version
import
__version__
...
...
@@ -29,6 +31,7 @@ define('policy', default='warning',
define
(
'hostfile'
,
default
=
''
,
help
=
'User defined host keys file'
)
define
(
'syshostfile'
,
default
=
''
,
help
=
'System wide host keys file'
)
define
(
'tdstream'
,
default
=
''
,
help
=
'trusted downstream, separated by comma'
)
define
(
'fbidhttp'
,
type
=
bool
,
default
=
True
,
help
=
'forbid public http request'
)
define
(
'wpintvl'
,
type
=
int
,
default
=
0
,
help
=
'Websocket ping interval'
)
define
(
'version'
,
type
=
bool
,
help
=
'Show version information'
,
callback
=
print_version
)
...
...
@@ -38,6 +41,7 @@ base_dir = os.path.dirname(os.path.dirname(os.path.abspath(__file__)))
max_body_size
=
1
*
1024
*
1024
swallow_http_errors
=
True
xheaders
=
True
is_open_to_public
=
False
def
get_app_settings
(
options
):
...
...
@@ -113,3 +117,12 @@ def get_trusted_downstream(options):
to_ip_address
(
ip
)
tdstream
.
add
(
ip
)
return
tdstream
def
detect_is_open_to_public
(
options
):
global
is_open_to_public
if
on_public_network_interfaces
(
get_ips_by_name
(
options
.
address
)):
is_open_to_public
=
True
logging
.
info
(
'Forbid public http: {}'
.
format
(
options
.
fbidhttp
))
else
:
is_open_to_public
=
False
webssh/utils.py
View file @
c06bf531
import
ipaddress
import
re
import
socket
try
:
from
types
import
UnicodeType
...
...
@@ -10,6 +11,9 @@ except ImportError:
numeric
=
re
.
compile
(
r'[0-9]+$'
)
allowed
=
re
.
compile
(
r'(?!-)[a-z0-9-]{1,63}(?<!-)$'
,
re
.
IGNORECASE
)
default_public_ipv4addr
=
ipaddress
.
ip_address
(
u'0.0.0.0'
)
default_public_ipv6addr
=
ipaddress
.
ip_address
(
u'::'
)
def
to_str
(
bstr
,
encoding
=
'utf-8'
):
if
isinstance
(
bstr
,
bytes
):
...
...
@@ -60,3 +64,25 @@ def is_valid_hostname(hostname):
return
False
return
all
(
allowed
.
match
(
label
)
for
label
in
labels
)
def
get_ips_by_name
(
name
):
if
name
==
''
:
return
{
'0.0.0.0'
,
'::'
}
ret
=
socket
.
getaddrinfo
(
name
,
0
,
socket
.
AF_UNSPEC
,
socket
.
SOCK_STREAM
)
return
{
t
[
4
][
0
]
for
t
in
ret
}
def
on_public_network_interface
(
ip
):
ipaddr
=
to_ip_address
(
ip
)
if
ipaddr
==
default_public_ipv4addr
or
ipaddr
==
default_public_ipv6addr
:
return
True
if
not
ipaddr
.
is_private
:
return
True
def
on_public_network_interfaces
(
ips
):
for
ip
in
ips
:
if
on_public_network_interface
(
ip
):
return
True
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment