mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-29 19:52:24 -05:00 
			
		
		
		
	* [feature] enable + document explicit IP dialer allowing/denying * lord have mercy * allee jonge * shortcut check ipv6 prefixes * comment * separate httpclient_test, export Sanitizer
		
			
				
	
	
		
			154 lines
		
	
	
	
		
			3.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			154 lines
		
	
	
	
		
			3.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // GoToSocial
 | |
| // Copyright (C) GoToSocial Authors admin@gotosocial.org
 | |
| // SPDX-License-Identifier: AGPL-3.0-or-later
 | |
| //
 | |
| // This program is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Affero General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // This program is distributed in the hope that it will be useful,
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
| // GNU Affero General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Affero General Public License
 | |
| // along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package httpclient_test
 | |
| 
 | |
| import (
 | |
| 	"errors"
 | |
| 	"net/netip"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/httpclient"
 | |
| )
 | |
| 
 | |
| func TestSafeIP(t *testing.T) {
 | |
| 	tests := []struct {
 | |
| 		name string
 | |
| 		ip   netip.Addr
 | |
| 	}{
 | |
| 		// IPv4 tests
 | |
| 		{
 | |
| 			name: "IPv4 this host on this network",
 | |
| 			ip:   netip.MustParseAddr("0.0.0.0"),
 | |
| 		},
 | |
| 		{
 | |
| 			name: "IPv4 dummy address",
 | |
| 			ip:   netip.MustParseAddr("192.0.0.8"),
 | |
| 		},
 | |
| 		{
 | |
| 			name: "IPv4 Port Control Protocol Anycast",
 | |
| 			ip:   netip.MustParseAddr("192.0.0.9"),
 | |
| 		},
 | |
| 		{
 | |
| 			name: "IPv4 Traversal Using Relays around NAT Anycast",
 | |
| 			ip:   netip.MustParseAddr("192.0.0.10"),
 | |
| 		},
 | |
| 		{
 | |
| 			name: "IPv4 NAT64/DNS64 Discovery 1",
 | |
| 			ip:   netip.MustParseAddr("192.0.0.17"),
 | |
| 		},
 | |
| 		{
 | |
| 			name: "IPv4 NAT64/DNS64 Discovery 2",
 | |
| 			ip:   netip.MustParseAddr("192.0.0.171"),
 | |
| 		},
 | |
| 		// IPv6 tests
 | |
| 		{
 | |
| 			name: "IPv4-mapped address",
 | |
| 			ip:   netip.MustParseAddr("::ffff:169.254.169.254"),
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for _, tc := range tests {
 | |
| 		tc := tc
 | |
| 		t.Run(tc.name, func(t *testing.T) {
 | |
| 			t.Parallel()
 | |
| 			if safe := httpclient.SafeIP(tc.ip); safe {
 | |
| 				t.Fatalf("Expected IP %s to not safe (%t), got: %t", tc.ip, false, safe)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestSanitizer(t *testing.T) {
 | |
| 	s := httpclient.Sanitizer{
 | |
| 		Allow: []netip.Prefix{
 | |
| 			netip.MustParsePrefix("192.0.0.8/32"),
 | |
| 			netip.MustParsePrefix("::ffff:169.254.169.254/128"),
 | |
| 		},
 | |
| 		Block: []netip.Prefix{
 | |
| 			netip.MustParsePrefix("93.184.216.34/32"), // example.org
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	tests := []struct {
 | |
| 		name     string
 | |
| 		ntwrk    string
 | |
| 		addr     string
 | |
| 		expected error
 | |
| 	}{
 | |
| 		// IPv4 tests
 | |
| 		{
 | |
| 			name:     "IPv4 this host on this network",
 | |
| 			ntwrk:    "tcp4",
 | |
| 			addr:     "0.0.0.0:80",
 | |
| 			expected: httpclient.ErrReservedAddr,
 | |
| 		},
 | |
| 		{
 | |
| 			name:     "IPv4 dummy address",
 | |
| 			ntwrk:    "tcp4",
 | |
| 			addr:     "192.0.0.8:80",
 | |
| 			expected: nil, // We allowed this explicitly.
 | |
| 		},
 | |
| 		{
 | |
| 			name:     "IPv4 Port Control Protocol Anycast",
 | |
| 			ntwrk:    "tcp4",
 | |
| 			addr:     "192.0.0.9:80",
 | |
| 			expected: httpclient.ErrReservedAddr,
 | |
| 		},
 | |
| 		{
 | |
| 			name:     "IPv4 Traversal Using Relays around NAT Anycast",
 | |
| 			ntwrk:    "tcp4",
 | |
| 			addr:     "192.0.0.10:80",
 | |
| 			expected: httpclient.ErrReservedAddr,
 | |
| 		},
 | |
| 		{
 | |
| 			name:     "IPv4 NAT64/DNS64 Discovery 1",
 | |
| 			ntwrk:    "tcp4",
 | |
| 			addr:     "192.0.0.17:80",
 | |
| 			expected: httpclient.ErrReservedAddr,
 | |
| 		},
 | |
| 		{
 | |
| 			name:     "IPv4 NAT64/DNS64 Discovery 2",
 | |
| 			ntwrk:    "tcp4",
 | |
| 			addr:     "192.0.0.171:80",
 | |
| 			expected: httpclient.ErrReservedAddr,
 | |
| 		},
 | |
| 		{
 | |
| 			name:     "example.org",
 | |
| 			ntwrk:    "tcp4",
 | |
| 			addr:     "93.184.216.34:80",
 | |
| 			expected: httpclient.ErrReservedAddr, // We blocked this explicitly.
 | |
| 		},
 | |
| 		// IPv6 tests
 | |
| 		{
 | |
| 			name:     "IPv4-mapped address",
 | |
| 			ntwrk:    "tcp6",
 | |
| 			addr:     "[::ffff:169.254.169.254]:80",
 | |
| 			expected: nil, // We allowed this explicitly.
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for _, tc := range tests {
 | |
| 		tc := tc
 | |
| 		t.Run(tc.name, func(t *testing.T) {
 | |
| 			t.Parallel()
 | |
| 			if err := s.Sanitize(tc.ntwrk, tc.addr, nil); !errors.Is(err, tc.expected) {
 | |
| 				t.Fatalf("Expected error %q for addr %s, got: %q", tc.expected, tc.addr, err)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 |