mirror of
https://github.com/golang/net.git
synced 2026-03-31 18:37:08 +09:00
http2: check that Unicode-aware functions are not used
Change-Id: I366ba1f21c48773fa923e47501ccd7efb8c99a2d Reviewed-on: https://go-review.googlesource.com/c/net/+/318430 Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Go Bot <gobot@golang.org> Trust: Filippo Valsorda <filippo@golang.org> Trust: Katie Hockman <katie@golang.org> Reviewed-by: Katie Hockman <katie@golang.org>
This commit is contained in:
committed by
Filippo Valsorda
parent
52da8fb2a6
commit
84b48f89b1
@@ -6,6 +6,10 @@ package http2
|
||||
|
||||
import "strings"
|
||||
|
||||
// The HTTP protocols are defined in terms of ASCII, not Unicode. This file
|
||||
// contains helper functions which may use Unicode-aware functions which would
|
||||
// otherwise be unsafe and could introduce vulnerabilities if used improperly.
|
||||
|
||||
// asciiEqualFold is strings.EqualFold, ASCII only. It reports whether s and t
|
||||
// are equal, ASCII-case-insensitively.
|
||||
func asciiEqualFold(s, t string) bool {
|
||||
|
||||
@@ -9,8 +9,12 @@ import (
|
||||
"errors"
|
||||
"flag"
|
||||
"fmt"
|
||||
"io/ioutil"
|
||||
"net/http"
|
||||
"os"
|
||||
"os/exec"
|
||||
"path/filepath"
|
||||
"regexp"
|
||||
"strconv"
|
||||
"strings"
|
||||
"testing"
|
||||
@@ -288,3 +292,57 @@ func TestConfigureServerIdleTimeout_Go18(t *testing.T) {
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
var forbiddenStringsFunctions = map[string]bool{
|
||||
// Functions that use Unicode-aware case folding.
|
||||
"EqualFold": true,
|
||||
"Title": true,
|
||||
"ToLower": true,
|
||||
"ToLowerSpecial": true,
|
||||
"ToTitle": true,
|
||||
"ToTitleSpecial": true,
|
||||
"ToUpper": true,
|
||||
"ToUpperSpecial": true,
|
||||
|
||||
// Functions that use Unicode-aware spaces.
|
||||
"Fields": true,
|
||||
"TrimSpace": true,
|
||||
}
|
||||
|
||||
// TestNoUnicodeStrings checks that nothing in net/http uses the Unicode-aware
|
||||
// strings and bytes package functions. HTTP is mostly ASCII based, and doing
|
||||
// Unicode-aware case folding or space stripping can introduce vulnerabilities.
|
||||
func TestNoUnicodeStrings(t *testing.T) {
|
||||
re := regexp.MustCompile(`(strings|bytes).([A-Za-z]+)`)
|
||||
if err := filepath.Walk(".", func(path string, info os.FileInfo, err error) error {
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
|
||||
if path == "h2i" || path == "h2c" {
|
||||
return filepath.SkipDir
|
||||
}
|
||||
if !strings.HasSuffix(path, ".go") ||
|
||||
strings.HasSuffix(path, "_test.go") ||
|
||||
path == "ascii.go" || info.IsDir() {
|
||||
return nil
|
||||
}
|
||||
|
||||
contents, err := ioutil.ReadFile(path)
|
||||
if err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
for lineNum, line := range strings.Split(string(contents), "\n") {
|
||||
for _, match := range re.FindAllStringSubmatch(line, -1) {
|
||||
if !forbiddenStringsFunctions[match[2]] {
|
||||
continue
|
||||
}
|
||||
t.Errorf("disallowed call to %s at %s:%d", match[0], path, lineNum+1)
|
||||
}
|
||||
}
|
||||
|
||||
return nil
|
||||
}); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user