conf: add allowlist for accessing local network (#6842)

# Conflicts:
#	CHANGELOG.md
#	internal/assets/conf/conf_gen.go
#	internal/assets/templates/templates_gen.go
#	internal/conf/static.go
#	internal/conf/testdata/TestInit.golden.ini
pull/7785/head
Joe Chen 2022-03-14 22:06:08 +08:00
parent 0fef3c9082
commit eddae31ada
No known key found for this signature in database
GPG Key ID: 0BDE5280C552FF60
13 changed files with 5086 additions and 5065 deletions

View File

@ -169,6 +169,8 @@ COOKIE_SECURE = false
ENABLE_LOGIN_STATUS_COOKIE = false
; The cookie name to store user login status.
LOGIN_STATUS_COOKIE_NAME = login_status
; A comma separated list of hostnames that are explicitly allowed to be accessed within the local network.
LOCAL_NETWORK_ALLOWLIST =
[email]
; Whether to enable the email service.

View File

@ -1242,6 +1242,7 @@ config.security.cookie_secure = Enable secure cookie
config.security.reverse_proxy_auth_user = Reverse proxy authentication header
config.security.enable_login_status_cookie = Enable login status cookie
config.security.login_status_cookie_name = Login status cookie
config.security.local_network_allowlist = Local network allowlist
config.email_config = Email configuration
config.email.enabled = Enabled

View File

@ -153,6 +153,8 @@ You would have to re-run this command after changing Go files, or any file under
When you are actively working on HTML templates and static files during development, you may want to enable the following configuration to avoid recompiling and restarting Gogs every time you make a change to files under `template/` and `public/` directories:
```ini
RUN_MODE = dev
[server]
LOAD_ASSETS_FROM_DISK = true
```

File diff suppressed because one or more lines are too long

File diff suppressed because it is too large Load Diff

File diff suppressed because one or more lines are too long

View File

@ -103,6 +103,7 @@ var (
CookieSecure bool
EnableLoginStatusCookie bool
LoginStatusCookieName string
LocalNetworkAllowlist []string `delim:","`
// Deprecated: Use Auth.ReverseProxyAuthenticationHeader instead, will be removed in 0.13.
ReverseProxyAuthenticationUser string

View File

@ -80,6 +80,7 @@ COOKIE_USERNAME=gogs_awesome
COOKIE_SECURE=false
ENABLE_LOGIN_STATUS_COOKIE=false
LOGIN_STATUS_COOKIE_NAME=login_status
LOCAL_NETWORK_ALLOWLIST=
REVERSE_PROXY_AUTHENTICATION_USER=
[email]

View File

@ -12,6 +12,7 @@ import (
"github.com/unknwon/com"
"gopkg.in/macaron.v1"
"gogs.io/gogs/internal/conf"
"gogs.io/gogs/internal/db"
"gogs.io/gogs/internal/netutil"
)
@ -69,7 +70,7 @@ func (f MigrateRepo) ParseRemoteAddr(user *db.User) (string, error) {
return "", db.ErrInvalidCloneAddr{IsURLError: true}
}
if netutil.IsLocalHostname(u.Hostname()) {
if netutil.IsLocalHostname(u.Hostname(), conf.Security.LocalNetworkAllowlist) {
return "", db.ErrInvalidCloneAddr{IsURLError: true}
}

View File

@ -47,8 +47,15 @@ func init() {
}
}
// IsLocalHostname returns true if given hostname is a known local address.
func IsLocalHostname(hostname string) bool {
// IsLocalHostname returns true if given hostname is resolved to local network
// address, except exempted from the allowlist.
func IsLocalHostname(hostname string, allowlist []string) bool {
for _, allow := range allowlist {
if hostname == allow {
return false
}
}
ips, err := net.LookupIP(hostname)
if err != nil {
return true

View File

@ -12,8 +12,9 @@ import (
func TestIsLocalHostname(t *testing.T) {
tests := []struct {
hostname string
want bool
hostname string
allowlist []string
want bool
}{
{hostname: "localhost", want: true},
{hostname: "127.0.0.1", want: true},
@ -27,10 +28,13 @@ func TestIsLocalHostname(t *testing.T) {
{hostname: "gogs.io", want: false},
{hostname: "google.com", want: false},
{hostname: "165.232.140.255", want: false},
{hostname: "192.168.123.45", allowlist: []string{"10.0.0.17"}, want: true},
{hostname: "gogs.local", allowlist: []string{"gogs.local"}, want: false},
}
for _, test := range tests {
t.Run("", func(t *testing.T) {
assert.Equal(t, test.want, IsLocalHostname(test.hostname))
assert.Equal(t, test.want, IsLocalHostname(test.hostname, test.allowlist))
})
}
}

View File

@ -128,7 +128,7 @@ func validateWebhook(actor *db.User, l macaron.Locale, w *db.Webhook) (field, ms
return "PayloadURL", l.Tr("repo.settings.webhook.err_cannot_parse_payload_url", err), false
}
if netutil.IsLocalHostname(payloadURL.Hostname()) {
if netutil.IsLocalHostname(payloadURL.Hostname(), conf.Security.LocalNetworkAllowlist) {
return "PayloadURL", l.Tr("repo.settings.webhook.err_cannot_use_local_addresses"), false
}
}

View File

@ -206,6 +206,8 @@
<dd><i class="fa fa{{if .Security.EnableLoginStatusCookie}}-check{{end}}-square-o"></i></dd>
<dt>{{.i18n.Tr "admin.config.security.login_status_cookie_name"}}</dt>
<dd>{{.Security.LoginStatusCookieName}}</dd>
<dt>{{.i18n.Tr "admin.config.security.local_network_allowlist"}}</dt>
<dd><code>{{.Security.LocalNetworkAllowlist}}</code></dd>
</dl>
</div>