Skip to content

Commit

Permalink
disallow links outside root
Browse files Browse the repository at this point in the history
  • Loading branch information
lkingland committed Feb 13, 2024
1 parent 6e44cac commit ebe56f1
Show file tree
Hide file tree
Showing 2 changed files with 62 additions and 0 deletions.
28 changes: 28 additions & 0 deletions pkg/oci/containerize.go
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@ import (
v1 "github.com/google/go-containerregistry/pkg/v1"
"github.com/google/go-containerregistry/pkg/v1/tarball"
"github.com/google/go-containerregistry/pkg/v1/types"
"github.com/pkg/errors"
)

// languageLayerBuilder builds the layer for the given language whuch may
Expand Down Expand Up @@ -157,6 +158,12 @@ func newDataTarball(source, target string, ignored []string, verbose bool) error
return err
}
}
ok, err := isWithin(link, source)
if err != nil {
return errors.Wrap(err, "error checking if link is outside function root")
} else if !ok {
return fmt.Errorf("links outside Function root disallowed. Link %v references %v", path, link)
}

header, err := tar.FileInfoHeader(info, link)
if err != nil {
Expand Down Expand Up @@ -185,6 +192,27 @@ func newDataTarball(source, target string, ignored []string, verbose bool) error
})
}

// isWithin returns true if the parent path has the child path within.
// If parent and child are the same target, this is considered within.
func isWithin(parent, child string) (bool, error) {
var err error
// Convert the paths to clean absolute paths.
if parent, err = filepath.Abs(filepath.Clean(parent)); err != nil {
return false, err
}
if child, err = filepath.Abs(filepath.Clean(child)); err != nil {
return false, err
}
// Calculate the relative path between them
relPath, err := filepath.Rel(parent, child)
if err != nil {
return false, err
}
// Child is not within parent if the relative path from parent to child
// requires ..
return !strings.HasPrefix(relPath, ".."), nil
}

// newCertLayer creates the shared data layer in the container file hierarchy and
// returns both its descriptor and layer metadata.
func newCertsLayer(cfg *buildConfig) (desc v1.Descriptor, layer v1.Layer, err error) {
Expand Down
34 changes: 34 additions & 0 deletions pkg/oci/containerize_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
package oci

import "testing"

// Test_isWithin ensures that the isWithin method checks
// that various combinations of parent and child paths.
func Test_isWithin(t *testing.T) {
tests := []struct {
parent string
child string
want bool
name string
}{
{"/", "/b", true, "Base case, a subdir of an absolute path"},
{"/a", "/ab", false, "Ensure simple substring does not match"},
{"./", ".", true, "Ensure links are both made absolute"},
{"/a/b/../c", "/a/c/d/../", true, "Ensure the links are both sanitized"},
{"/a", "/a/b/../../", false, "Ensure escaping the parent is a mismatch"},
{"./", "../", false, "Ensure simple relative mismatch"},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
got, err := isWithin(tt.parent, tt.child)
if err != nil {
t.Fatal(err)
}
if got != tt.want {
t.Log(tt.name)
t.Errorf("isWithin() = %v, want %v", got, tt.want)
}
})
}

}

0 comments on commit ebe56f1

Please sign in to comment.