@ -12,6 +12,7 @@ import (
repo_model "code.gitea.io/gitea/models/repo"
"code.gitea.io/gitea/models/unittest"
user_model "code.gitea.io/gitea/models/user"
"code.gitea.io/gitea/modules/charset"
"code.gitea.io/gitea/modules/markup"
"code.gitea.io/gitea/modules/markup/external"
"code.gitea.io/gitea/modules/setting"
@ -25,29 +26,45 @@ import (
func TestExternalMarkupRenderer ( t * testing . T ) {
defer tests . PrepareTestEnv ( t ) ( )
if ! setting . Database . Type . IsSQLite3 ( ) {
t . Skip ( )
t . Skip ( "only SQLite3 test config supports external markup renderer" )
return
}
const binaryContentPrefix = "any prefix text."
const binaryContent = binaryContentPrefix + "\xfe\xfe\xfe\x00\xff\xff"
detectedEncoding , _ := charset . DetectEncoding ( [ ] byte ( binaryContent ) )
assert . NotEqual ( t , binaryContent , strings . ToValidUTF8 ( binaryContent , "?" ) )
assert . Equal ( t , "ISO-8859-2" , detectedEncoding ) // even if the binary content can be detected as text encoding, it shouldn't affect the raw rendering
onGiteaRun ( t , func ( t * testing . T , _ * url . URL ) {
user2 := unittest . AssertExistsAndLoadBean ( t , & user_model . User { ID : 2 } )
repo1 := unittest . AssertExistsAndLoadBean ( t , & repo_model . Repository { ID : 1 } )
_ , err := createFile ( user2 , repo1 , "file.no-sanitizer" , "master" , ` any content ` )
_ , err := createFileInBranch ( user2 , repo1 , createFileInBranchOptions { } , map [ string ] string {
"test.html" : ` <div><any attr="val"><script></script></div> ` ,
"html.no-sanitizer" : ` <script>foo("raw")</script> ` ,
"bin.no-sanitizer" : binaryContent ,
} )
require . NoError ( t , err )
t . Run ( "RenderNoSanitizer" , func ( t * testing . T ) {
req := NewRequest ( t , "GET" , "/user2/repo1/src/branch/master/file.no-sanitizer" )
req := NewRequest ( t , "GET" , "/user2/repo1/src/branch/master/ html .no-sanitizer")
resp := MakeRequest ( t , req , http . StatusOK )
doc := NewHTMLParser ( t , resp . Body )
div := doc . Find ( "div.file-view" )
div := NewHTMLParser ( t , resp . Body ) . Find ( "div.file-view" )
data , err := div . Html ( )
assert . NoError ( t , err )
assert . Equal ( t , ` <script>window.alert("hi")</script> ` , strings . TrimSpace ( data ) )
assert . Equal ( t , ` <script>foo("raw")</script> ` , strings . TrimSpace ( data ) )
req = NewRequest ( t , "GET" , "/user2/repo1/src/branch/master/bin.no-sanitizer" )
resp = MakeRequest ( t , req , http . StatusOK )
div = NewHTMLParser ( t , resp . Body ) . Find ( "div.file-view" )
data , err = div . Html ( )
assert . NoError ( t , err )
assert . Equal ( t , strings . ReplaceAll ( binaryContent , "\x00" , "" ) , strings . TrimSpace ( data ) ) // HTML template engine removes the null bytes
} )
} )
t . Run ( "RenderContentDirectly" , func ( t * testing . T ) {
req := NewRequest ( t , "GET" , "/user30/renderer/src/branch/master/README.html" )
req := NewRequest ( t , "GET" , "/user 2/repo1/src/branch/master/test .html")
resp := MakeRequest ( t , req , http . StatusOK )
assert . Equal ( t , "text/html; charset=utf-8" , resp . Header ( ) . Get ( "Content-Type" ) )
@ -55,18 +72,21 @@ func TestExternalMarkupRenderer(t *testing.T) {
div := doc . Find ( "div.file-view" )
data , err := div . Html ( )
assert . NoError ( t , err )
assert . Equal ( t , "<div>\n\ttest external renderer\n</div>" , strings . TrimSpace ( data ) )
// the content is fully sanitized
assert . Equal ( t , ` <div><script></script></div> ` , strings . TrimSpace ( data ) )
} )
// above tested "no-sanitizer" mode , then we test iframe mode below
// above tested in-page rendering (no iframe) , then we test iframe mode below
r := markup . GetRendererByFileName ( "any-file.html" ) . ( * external . Renderer )
defer test . MockVariableValue ( & r . RenderContentMode , setting . RenderContentModeIframe ) ( )
assert . True ( t , r . NeedPostProcess ( ) )
r = markup . GetRendererByFileName ( "any-file.no-sanitizer" ) . ( * external . Renderer )
defer test . MockVariableValue ( & r . RenderContentMode , setting . RenderContentModeIframe ) ( )
assert . False ( t , r . NeedPostProcess ( ) )
t . Run ( "RenderContentInIFrame" , func ( t * testing . T ) {
t . Run ( "DefaultSandbox" , func ( t * testing . T ) {
req := NewRequest ( t , "GET" , "/user 30/renderer/src/branch/master/README .html")
req := NewRequest ( t , "GET" , "/user 2/repo1/src/branch/master/test .html")
t . Run ( "ParentPage" , func ( t * testing . T ) {
respParent := MakeRequest ( t , req , http . StatusOK )
@ -77,31 +97,42 @@ func TestExternalMarkupRenderer(t *testing.T) {
// default sandbox on parent page
assert . Equal ( t , "allow-scripts allow-popups" , iframe . AttrOr ( "sandbox" , "" ) )
assert . Equal ( t , "/user 30/renderer/render/branch/master/README .html", iframe . AttrOr ( "data-src" , "" ) )
assert . Equal ( t , "/user 2/repo1/render/branch/master/test .html", iframe . AttrOr ( "data-src" , "" ) )
} )
t . Run ( "SubPage" , func ( t * testing . T ) {
req = NewRequest ( t , "GET" , "/user 30/renderer/render/branch/master/README .html")
req = NewRequest ( t , "GET" , "/user 2/repo1/render/branch/master/test .html")
respSub := MakeRequest ( t , req , http . StatusOK )
assert . Equal ( t , "text/html; charset=utf-8" , respSub . Header ( ) . Get ( "Content-Type" ) )
// default sandbox in sub page response
assert . Equal ( t , "frame-src 'self'; sandbox allow-scripts allow-popups" , respSub . Header ( ) . Get ( "Content-Security-Policy" ) )
assert . Equal ( t , "<script src=\"/assets/js/external-render-iframe.js\"></script><link rel=\"stylesheet\" href=\"/assets/css/external-render-iframe.css\"><div>\n\ttest external renderer\n</div>\n" , respSub . Body . String ( ) )
// FIXME: actually here is a bug (legacy design problem), the "PostProcess" will escape "<script>" tag, but it indeed is the sanitizer's job
assert . Equal ( t , ` <script src="/assets/js/external-render-iframe.js"></script><link rel="stylesheet" href="/assets/css/external-render-iframe.css"><div><any attr="val"><script></script></any></div> ` , respSub . Body . String ( ) )
} )
} )
t . Run ( "NoSanitizerNoSandbox" , func ( t * testing . T ) {
req := NewRequest ( t , "GET" , "/user2/repo1/src/branch/master/file.no-sanitizer" )
respParent := MakeRequest ( t , req , http . StatusOK )
iframe := NewHTMLParser ( t , respParent . Body ) . Find ( "iframe.external-render-iframe" )
assert . Equal ( t , "/user2/repo1/render/branch/master/file.no-sanitizer" , iframe . AttrOr ( "data-src" , "" ) )
t . Run ( "BinaryContent" , func ( t * testing . T ) {
req := NewRequest ( t , "GET" , "/user2/repo1/src/branch/master/bin.no-sanitizer" )
respParent := MakeRequest ( t , req , http . StatusOK )
iframe := NewHTMLParser ( t , respParent . Body ) . Find ( "iframe.external-render-iframe" )
assert . Equal ( t , "/user2/repo1/render/branch/master/bin.no-sanitizer" , iframe . AttrOr ( "data-src" , "" ) )
req = NewRequest ( t , "GET" , "/user2/repo1/render/branch/master/file.no-sanitizer" )
respSub := MakeRequest ( t , req , http . StatusOK )
req = NewRequest ( t , "GET" , "/user2/repo1/render/branch/master/bin.no-sanitizer" )
respSub := MakeRequest ( t , req , http . StatusOK )
assert . Equal ( t , binaryContent , respSub . Body . String ( ) ) // raw content should keep the raw bytes (including invalid UTF-8 bytes), and no "external-render-iframe" helpers
// no sandbox (disabled by RENDER_CONTENT_SANDBOX)
assert . Empty ( t , iframe . AttrOr ( "sandbox" , "" ) )
assert . Equal ( t , "frame-src 'self'" , respSub . Header ( ) . Get ( "Content-Security-Policy" ) )
} )
// no sandbox (disabled by RENDER_CONTENT_SANDBOX)
assert . Empty ( t , iframe . AttrOr ( "sandbox" , "" ) )
assert . Equal ( t , "frame-src 'self'" , respSub . Header ( ) . Get ( "Content-Security-Policy" ) )
t . Run ( "HTMLContentWithExternalRenderIframeHelper" , func ( t * testing . T ) {
req := NewRequest ( t , "GET" , "/user2/repo1/render/branch/master/html.no-sanitizer" )
respSub := MakeRequest ( t , req , http . StatusOK )
assert . Equal ( t , ` <script src="/assets/js/external-render-iframe.js"></script><link rel="stylesheet" href="/assets/css/external-render-iframe.css"><script>foo("raw")</script> ` , respSub . Body . String ( ) )
assert . Equal ( t , "frame-src 'self'" , respSub . Header ( ) . Get ( "Content-Security-Policy" ) )
} )
} )
} )
}