setting_security_test.go 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293
  1. package service
  2. import (
  3. "path/filepath"
  4. "testing"
  5. "github.com/mhsanaei/3x-ui/v3/database"
  6. "github.com/mhsanaei/3x-ui/v3/database/model"
  7. )
  8. func setupSettingTestDB(t *testing.T) {
  9. t.Helper()
  10. if err := database.InitDB(filepath.Join(t.TempDir(), "x-ui.db")); err != nil {
  11. t.Fatal(err)
  12. }
  13. t.Cleanup(func() {
  14. if err := database.CloseDB(); err != nil {
  15. t.Fatal(err)
  16. }
  17. })
  18. }
  19. func TestGetAllSettingViewRedactsSecrets(t *testing.T) {
  20. setupSettingTestDB(t)
  21. s := &SettingService{}
  22. if err := s.saveSetting("tgBotToken", "telegram-secret"); err != nil {
  23. t.Fatal(err)
  24. }
  25. if err := s.saveSetting("twoFactorToken", "totp-secret"); err != nil {
  26. t.Fatal(err)
  27. }
  28. if err := s.saveSetting("ldapPassword", "ldap-secret"); err != nil {
  29. t.Fatal(err)
  30. }
  31. if err := database.GetDB().Create(&model.ApiToken{Name: "test", Token: "api-secret", Enabled: true}).Error; err != nil {
  32. t.Fatal(err)
  33. }
  34. view, err := s.GetAllSettingView()
  35. if err != nil {
  36. t.Fatal(err)
  37. }
  38. if view.TgBotToken != "" || view.TwoFactorToken != "" || view.LdapPassword != "" {
  39. t.Fatalf("settings view leaked secrets: %#v", view)
  40. }
  41. if !view.HasTgBotToken || !view.HasTwoFactorToken || !view.HasLdapPassword || !view.HasApiToken {
  42. t.Fatalf("settings view did not report configured secret flags: %#v", view)
  43. }
  44. }
  45. func TestUpdateAllSettingPreservesRedactedSecrets(t *testing.T) {
  46. setupSettingTestDB(t)
  47. s := &SettingService{}
  48. if err := s.saveSetting("tgBotToken", "telegram-secret"); err != nil {
  49. t.Fatal(err)
  50. }
  51. if err := s.saveSetting("ldapPassword", "ldap-secret"); err != nil {
  52. t.Fatal(err)
  53. }
  54. if err := s.saveSetting("twoFactorEnable", "true"); err != nil {
  55. t.Fatal(err)
  56. }
  57. if err := s.saveSetting("twoFactorToken", "totp-secret"); err != nil {
  58. t.Fatal(err)
  59. }
  60. view, err := s.GetAllSettingView()
  61. if err != nil {
  62. t.Fatal(err)
  63. }
  64. settings := &view.AllSetting
  65. if err := s.UpdateAllSetting(settings); err != nil {
  66. t.Fatal(err)
  67. }
  68. if got, _ := s.GetTgBotToken(); got != "telegram-secret" {
  69. t.Fatalf("tg token = %q, want preserved secret", got)
  70. }
  71. if got, _ := s.GetLdapPassword(); got != "ldap-secret" {
  72. t.Fatalf("ldap password = %q, want preserved secret", got)
  73. }
  74. if got, _ := s.GetTwoFactorToken(); got != "totp-secret" {
  75. t.Fatalf("2fa token = %q, want preserved secret", got)
  76. }
  77. }
  78. func TestSanitizePublicHTTPURLBlocksPrivateAddressUnlessAllowed(t *testing.T) {
  79. if _, err := SanitizePublicHTTPURL("http://127.0.0.1:8080/hook", false); err == nil {
  80. t.Fatal("expected localhost URL to be blocked")
  81. }
  82. if got, err := SanitizePublicHTTPURL("http://127.0.0.1:8080/hook", true); err != nil || got != "http://127.0.0.1:8080/hook" {
  83. t.Fatalf("allowPrivate result = %q, %v", got, err)
  84. }
  85. }