2020-01-16 11:50:27 +08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
##
|
|
|
|
# A note on determining whether an upload should be marked as secure:
|
|
|
|
#
|
|
|
|
# Some of these flags checked (e.g. all of the for_X flags and the opts[:type])
|
|
|
|
# are only set when _initially uploading_ via UploadCreator and are not present
|
2021-01-29 07:03:44 +08:00
|
|
|
# when an upload already exists, these will only be checked when the @creating
|
|
|
|
# option is present.
|
2020-01-16 11:50:27 +08:00
|
|
|
#
|
|
|
|
# If the upload already exists the best way to figure out whether it should be
|
|
|
|
# secure alongside the site settings is the access_control_post_id, because the
|
|
|
|
# original post the upload is linked to has far more bearing on its security context
|
|
|
|
# post-upload. If the access_control_post_id does not exist then we just rely
|
|
|
|
# on the current secure? status, otherwise there would be a lot of additional
|
2021-01-29 07:03:44 +08:00
|
|
|
# complex queries and joins to perform. Over time more of these specific
|
|
|
|
# queries will be implemented.
|
2022-05-23 11:14:11 +08:00
|
|
|
#
|
|
|
|
# NOTE: When updating this to add more cases where uploads will be marked
|
|
|
|
# secure, consider uploads:secure_upload_analyse_and_update as well, which
|
|
|
|
# does not use this class directly but uses an SQL version of its rules for
|
|
|
|
# efficient updating of many uploads in bulk.
|
2020-01-16 11:50:27 +08:00
|
|
|
class UploadSecurity
|
2020-09-18 09:54:33 +08:00
|
|
|
@@custom_public_types = []
|
|
|
|
|
2020-08-24 15:12:28 +08:00
|
|
|
PUBLIC_TYPES = %w[
|
2020-09-18 09:54:33 +08:00
|
|
|
avatar
|
|
|
|
custom_emoji
|
|
|
|
profile_background
|
|
|
|
card_background
|
|
|
|
category_logo
|
2022-10-07 23:00:44 +08:00
|
|
|
category_logo_dark
|
2020-09-18 09:54:33 +08:00
|
|
|
category_background
|
2021-02-16 10:34:03 +08:00
|
|
|
group_flair
|
2021-05-28 10:35:52 +08:00
|
|
|
badge_image
|
2020-08-24 15:12:28 +08:00
|
|
|
]
|
|
|
|
|
2020-09-18 09:54:33 +08:00
|
|
|
def self.register_custom_public_type(type)
|
|
|
|
@@custom_public_types << type if !@@custom_public_types.include?(type)
|
|
|
|
end
|
|
|
|
|
2020-09-19 02:35:36 +08:00
|
|
|
# used in tests
|
|
|
|
def self.reset_custom_public_types
|
|
|
|
@@custom_public_types = []
|
|
|
|
end
|
|
|
|
|
2020-01-16 11:50:27 +08:00
|
|
|
def initialize(upload, opts = {})
|
|
|
|
@upload = upload
|
|
|
|
@opts = opts
|
2020-01-17 11:16:27 +08:00
|
|
|
@upload_type = @opts[:type]
|
2021-01-29 07:03:44 +08:00
|
|
|
@creating = @opts[:creating]
|
2020-01-16 11:50:27 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def should_be_secure?
|
2021-01-29 07:03:44 +08:00
|
|
|
should_be_secure_with_reason.first
|
2020-01-16 11:50:27 +08:00
|
|
|
end
|
|
|
|
|
2021-01-29 07:03:44 +08:00
|
|
|
def should_be_secure_with_reason
|
|
|
|
insecure_context_checks.each { |check, reason| return false, reason if perform_check(check) }
|
|
|
|
secure_context_checks.each do |check, reason|
|
|
|
|
return perform_check(check), reason if priority_check?(check)
|
|
|
|
return true, reason if perform_check(check)
|
|
|
|
end
|
|
|
|
|
|
|
|
[false, "no checks satisfied"]
|
2020-01-16 11:50:27 +08:00
|
|
|
end
|
|
|
|
|
2022-09-29 07:24:33 +08:00
|
|
|
def secure_uploads_disabled_check
|
|
|
|
!SiteSetting.secure_uploads?
|
2020-01-16 11:50:27 +08:00
|
|
|
end
|
|
|
|
|
2021-01-29 07:03:44 +08:00
|
|
|
def insecure_creation_for_modifiers_check
|
|
|
|
return false if !@creating
|
|
|
|
@upload.for_theme || @upload.for_site_setting || @upload.for_gravatar
|
|
|
|
end
|
|
|
|
|
|
|
|
def public_type_check
|
|
|
|
PUBLIC_TYPES.include?(@upload_type) || @@custom_public_types.include?(@upload_type)
|
|
|
|
end
|
|
|
|
|
|
|
|
def custom_emoji_check
|
|
|
|
@upload.id.present? && CustomEmoji.exists?(upload_id: @upload.id)
|
|
|
|
end
|
|
|
|
|
|
|
|
def regular_emoji_check
|
|
|
|
return false if @upload.origin.blank?
|
|
|
|
uri = URI.parse(@upload.origin)
|
|
|
|
return true if Emoji.all.map(&:url).include?("#{uri.path}?#{uri.query}")
|
|
|
|
uri.path.include?("images/emoji")
|
|
|
|
end
|
|
|
|
|
|
|
|
def login_required_check
|
|
|
|
SiteSetting.login_required?
|
|
|
|
end
|
2020-09-18 09:54:33 +08:00
|
|
|
|
2020-01-16 11:50:27 +08:00
|
|
|
# whether the upload should remain secure or not after posting depends on its context,
|
|
|
|
# which is based on the post it is linked to via access_control_post_id.
|
2022-09-29 07:24:33 +08:00
|
|
|
# if that post is with_secure_uploads? then the upload should also be secure.
|
2020-01-16 11:50:27 +08:00
|
|
|
# this may change to false if the upload was set to secure on upload e.g. in
|
|
|
|
# a post composer then it turned out that the post itself was not in a secure context
|
|
|
|
#
|
2022-09-29 07:24:33 +08:00
|
|
|
# a post is with secure uploads if it is a private message or in a read restricted
|
2021-01-29 07:03:44 +08:00
|
|
|
# category
|
2022-09-29 07:24:33 +08:00
|
|
|
def access_control_post_has_secure_uploads_check
|
|
|
|
access_control_post&.with_secure_uploads?
|
2020-01-16 11:50:27 +08:00
|
|
|
end
|
|
|
|
|
2021-01-29 07:03:44 +08:00
|
|
|
def uploading_in_composer_check
|
|
|
|
@upload_type == "composer"
|
2020-01-16 11:50:27 +08:00
|
|
|
end
|
|
|
|
|
2021-01-29 07:03:44 +08:00
|
|
|
def secure_creation_for_modifiers_check
|
|
|
|
return false if !@creating
|
|
|
|
@upload.for_private_message || @upload.for_group_message
|
2020-01-16 11:50:27 +08:00
|
|
|
end
|
2020-02-14 09:17:09 +08:00
|
|
|
|
2021-01-29 07:03:44 +08:00
|
|
|
def already_secure_check
|
|
|
|
@upload.secure?
|
2020-02-17 10:30:47 +08:00
|
|
|
end
|
|
|
|
|
2021-01-29 07:03:44 +08:00
|
|
|
private
|
|
|
|
|
|
|
|
def access_control_post
|
|
|
|
@access_control_post ||=
|
|
|
|
@upload.access_control_post_id.present? ? @upload.access_control_post : nil
|
|
|
|
end
|
|
|
|
|
|
|
|
def insecure_context_checks
|
|
|
|
{
|
2022-09-29 07:24:33 +08:00
|
|
|
secure_uploads_disabled: "secure uploads is disabled",
|
2021-01-29 07:03:44 +08:00
|
|
|
insecure_creation_for_modifiers: "one or more creation for_modifiers was satisfied",
|
|
|
|
public_type: "upload is public type",
|
|
|
|
custom_emoji: "upload is used for custom emoji",
|
|
|
|
regular_emoji: "upload is used for regular emoji",
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
def secure_context_checks
|
|
|
|
{
|
|
|
|
login_required: "login is required",
|
2022-09-29 07:24:33 +08:00
|
|
|
access_control_post_has_secure_uploads: "access control post dictates security",
|
2021-01-29 07:03:44 +08:00
|
|
|
secure_creation_for_modifiers: "one or more creation for_modifiers was satisfied",
|
|
|
|
uploading_in_composer: "uploading via the composer",
|
|
|
|
already_secure: "upload is already secure",
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
# the access control check is important because that is the truest indicator
|
|
|
|
# of whether an upload should be secure or not, and thus should be returned
|
|
|
|
# immediately if there is an access control post
|
|
|
|
def priority_check?(check)
|
2022-09-29 07:24:33 +08:00
|
|
|
check == :access_control_post_has_secure_uploads && access_control_post
|
2021-01-29 07:03:44 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
def perform_check(check)
|
|
|
|
send("#{check}_check")
|
2020-02-14 09:17:09 +08:00
|
|
|
end
|
2020-01-16 11:50:27 +08:00
|
|
|
end
|