Merge branch 'filter-note-parameters' into 'master'
Include additional fields in the Rails filter_parameters configuration See merge request gitlab-org/gitlab-ce!25238
This commit is contained in:
commit
12058fbeb8
|
|
@ -0,0 +1,5 @@
|
||||||
|
---
|
||||||
|
title: Include note in the Rails filter_parameters configuration
|
||||||
|
merge_request: 25238
|
||||||
|
author:
|
||||||
|
type: other
|
||||||
|
|
@ -97,7 +97,7 @@ module Gitlab
|
||||||
#
|
#
|
||||||
# NOTE: It is **IMPORTANT** to also update gitlab-workhorse's filter when adding parameters here to not
|
# NOTE: It is **IMPORTANT** to also update gitlab-workhorse's filter when adding parameters here to not
|
||||||
# introduce another security vulnerability: https://gitlab.com/gitlab-org/gitlab-workhorse/issues/182
|
# introduce another security vulnerability: https://gitlab.com/gitlab-org/gitlab-workhorse/issues/182
|
||||||
config.filter_parameters += [/token$/, /password/, /secret/, /key$/]
|
config.filter_parameters += [/token$/, /password/, /secret/, /key$/, /^note$/, /^text$/]
|
||||||
config.filter_parameters += %i(
|
config.filter_parameters += %i(
|
||||||
certificate
|
certificate
|
||||||
encrypted_key
|
encrypted_key
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,34 @@
|
||||||
|
# frozen_string_literal: true
|
||||||
|
|
||||||
|
require 'spec_helper'
|
||||||
|
|
||||||
|
describe Gitlab::Application do # rubocop:disable RSpec/FilePath
|
||||||
|
using RSpec::Parameterized::TableSyntax
|
||||||
|
|
||||||
|
FILTERED_PARAM = ActionDispatch::Http::ParameterFilter::FILTERED
|
||||||
|
|
||||||
|
context 'when parameters are logged' do
|
||||||
|
describe 'rails does not leak confidential parameters' do
|
||||||
|
def request_for_url(input_url)
|
||||||
|
env = Rack::MockRequest.env_for(input_url)
|
||||||
|
env['action_dispatch.parameter_filter'] = described_class.config.filter_parameters
|
||||||
|
|
||||||
|
ActionDispatch::Request.new(env)
|
||||||
|
end
|
||||||
|
|
||||||
|
where(:input_url, :output_query) do
|
||||||
|
'/' | {}
|
||||||
|
'/?safe=1' | { 'safe' => '1' }
|
||||||
|
'/?private_token=secret' | { 'private_token' => FILTERED_PARAM }
|
||||||
|
'/?mixed=1&private_token=secret' | { 'mixed' => '1', 'private_token' => FILTERED_PARAM }
|
||||||
|
'/?note=secret¬eable=1&prefix_note=2' | { 'note' => FILTERED_PARAM, 'noteable' => '1', 'prefix_note' => '2' }
|
||||||
|
'/?note[note]=secret&target_type=1' | { 'note' => FILTERED_PARAM, 'target_type' => '1' }
|
||||||
|
'/?safe[note]=secret&target_type=1' | { 'safe' => { 'note' => FILTERED_PARAM }, 'target_type' => '1' }
|
||||||
|
end
|
||||||
|
|
||||||
|
with_them do
|
||||||
|
it { expect(request_for_url(input_url).filtered_parameters).to eq(output_query) }
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
Loading…
Reference in New Issue