Merge branch 'filter-note-parameters' into 'master'
Include additional fields in the Rails filter_parameters configuration See merge request gitlab-org/gitlab-ce!25238
This commit is contained in:
		
						commit
						12058fbeb8
					
				| 
						 | 
					@ -0,0 +1,5 @@
 | 
				
			||||||
 | 
					---
 | 
				
			||||||
 | 
					title: Include note in the Rails filter_parameters configuration
 | 
				
			||||||
 | 
					merge_request: 25238
 | 
				
			||||||
 | 
					author:
 | 
				
			||||||
 | 
					type: other
 | 
				
			||||||
| 
						 | 
					@ -97,7 +97,7 @@ module Gitlab
 | 
				
			||||||
    #
 | 
					    #
 | 
				
			||||||
    # NOTE: It is **IMPORTANT** to also update gitlab-workhorse's filter when adding parameters here to not
 | 
					    # NOTE: It is **IMPORTANT** to also update gitlab-workhorse's filter when adding parameters here to not
 | 
				
			||||||
    #       introduce another security vulnerability: https://gitlab.com/gitlab-org/gitlab-workhorse/issues/182
 | 
					    #       introduce another security vulnerability: https://gitlab.com/gitlab-org/gitlab-workhorse/issues/182
 | 
				
			||||||
    config.filter_parameters += [/token$/, /password/, /secret/, /key$/]
 | 
					    config.filter_parameters += [/token$/, /password/, /secret/, /key$/, /^note$/, /^text$/]
 | 
				
			||||||
    config.filter_parameters += %i(
 | 
					    config.filter_parameters += %i(
 | 
				
			||||||
      certificate
 | 
					      certificate
 | 
				
			||||||
      encrypted_key
 | 
					      encrypted_key
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -0,0 +1,34 @@
 | 
				
			||||||
 | 
					# frozen_string_literal: true
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					require 'spec_helper'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					describe Gitlab::Application do # rubocop:disable RSpec/FilePath
 | 
				
			||||||
 | 
					  using RSpec::Parameterized::TableSyntax
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  FILTERED_PARAM = ActionDispatch::Http::ParameterFilter::FILTERED
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  context 'when parameters are logged' do
 | 
				
			||||||
 | 
					    describe 'rails does not leak confidential parameters' do
 | 
				
			||||||
 | 
					      def request_for_url(input_url)
 | 
				
			||||||
 | 
					        env = Rack::MockRequest.env_for(input_url)
 | 
				
			||||||
 | 
					        env['action_dispatch.parameter_filter'] = described_class.config.filter_parameters
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					        ActionDispatch::Request.new(env)
 | 
				
			||||||
 | 
					      end
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      where(:input_url, :output_query) do
 | 
				
			||||||
 | 
					        '/'                                      | {}
 | 
				
			||||||
 | 
					        '/?safe=1'                               | { 'safe' => '1' }
 | 
				
			||||||
 | 
					        '/?private_token=secret'                 | { 'private_token' => FILTERED_PARAM }
 | 
				
			||||||
 | 
					        '/?mixed=1&private_token=secret'         | { 'mixed' => '1', 'private_token' => FILTERED_PARAM }
 | 
				
			||||||
 | 
					        '/?note=secret¬eable=1&prefix_note=2' | { 'note' => FILTERED_PARAM, 'noteable' => '1', 'prefix_note' => '2' }
 | 
				
			||||||
 | 
					        '/?note[note]=secret&target_type=1'      | { 'note' => FILTERED_PARAM, 'target_type' => '1' }
 | 
				
			||||||
 | 
					        '/?safe[note]=secret&target_type=1'      | { 'safe' => { 'note' => FILTERED_PARAM }, 'target_type' => '1' }
 | 
				
			||||||
 | 
					      end
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      with_them do
 | 
				
			||||||
 | 
					        it { expect(request_for_url(input_url).filtered_parameters).to eq(output_query) }
 | 
				
			||||||
 | 
					      end
 | 
				
			||||||
 | 
					    end
 | 
				
			||||||
 | 
					  end
 | 
				
			||||||
 | 
					end
 | 
				
			||||||
		Loading…
	
		Reference in New Issue