FIX: Improve handling of 'PublicExceptions' when bootstrap_error_pages enabled (#26700)

- Run the CSP-nonce-related middlewares on the generated response

- Fix the readonly mode checking to avoid empty strings being passed (the `check_readonly_mode` before_action will not execute in the case of these re-dispatched exceptions)

- Move the BlockRequestsMiddleware cookie-setting to the middleware, so that it is included even for unusual HTML responses like these exceptions
This commit is contained in:
David Taylor
2024-04-24 09:40:13 +01:00
committed by GitHub
parent 25bcee43c6
commit bca855f239
7 changed files with 65 additions and 16 deletions

View File

@ -641,8 +641,8 @@ class ApplicationController < ActionController::Base
store_preloaded("customHTML", custom_html_json) store_preloaded("customHTML", custom_html_json)
store_preloaded("banner", banner_json) store_preloaded("banner", banner_json)
store_preloaded("customEmoji", custom_emoji) store_preloaded("customEmoji", custom_emoji)
store_preloaded("isReadOnly", @readonly_mode.to_s) store_preloaded("isReadOnly", get_or_check_readonly_mode.to_json)
store_preloaded("isStaffWritesOnly", @staff_writes_only_mode.to_s) store_preloaded("isStaffWritesOnly", get_or_check_staff_writes_only_mode.to_json)
store_preloaded("activatedThemes", activated_themes_json) store_preloaded("activatedThemes", activated_themes_json)
end end

View File

@ -62,16 +62,23 @@ if Rails.env.test?
request.cookies[RSPEC_CURRENT_EXAMPLE_COOKIE_STRING] request.cookies[RSPEC_CURRENT_EXAMPLE_COOKIE_STRING]
) )
) )
[ return [
503, 503,
{ "Content-Type" => "text/plain" }, { "Content-Type" => "text/plain" },
[ [
"Blocked by BlockRequestsMiddleware for requests initiated by #{request.cookies[RSPEC_CURRENT_EXAMPLE_COOKIE_STRING]} when running #{self.class.current_example_location}", "Blocked by BlockRequestsMiddleware for requests initiated by #{request.cookies[RSPEC_CURRENT_EXAMPLE_COOKIE_STRING]} when running #{self.class.current_example_location}",
], ]
] ]
else
@app.call(env)
end end
status, headers, body = @app.call(env)
if headers["Content-Type"]&.match?(/html/) && BlockRequestsMiddleware.current_example_location
headers["Set-Cookie"] = [
headers["Set-Cookie"],
"#{RSPEC_CURRENT_EXAMPLE_COOKIE_STRING}=#{BlockRequestsMiddleware.current_example_location}; path=/;",
].compact.join("\n")
end
[status, headers, body]
end end
end end

View File

@ -4,6 +4,12 @@
# we need to handle certain exceptions here # we need to handle certain exceptions here
module Middleware module Middleware
class DiscoursePublicExceptions < ::ActionDispatch::PublicExceptions class DiscoursePublicExceptions < ::ActionDispatch::PublicExceptions
# These middlewares will be re-run when the exception response is generated
EXCEPTION_RESPONSE_MIDDLEWARES = [
ContentSecurityPolicy::Middleware,
Middleware::CspScriptNonceInjector,
]
INVALID_REQUEST_ERRORS = INVALID_REQUEST_ERRORS =
Set.new( Set.new(
[ [
@ -60,7 +66,10 @@ module Middleware
if ApplicationController.rescue_with_handler(exception, object: fake_controller) if ApplicationController.rescue_with_handler(exception, object: fake_controller)
body = response.body body = response.body
body = [body] if String === body body = [body] if String === body
return response.status, response.headers, body rack_response = [response.status, response.headers, body]
app = lambda { |env| rack_response }
EXCEPTION_RESPONSE_MIDDLEWARES.each { |middleware| app = middleware.new(app) }
return app.call(env)
end end
rescue => e rescue => e
return super if INVALID_REQUEST_ERRORS.include?(e.class) return super if INVALID_REQUEST_ERRORS.include?(e.class)

View File

@ -32,6 +32,16 @@ module ReadOnlyMixin
end end
end end
def get_or_check_readonly_mode
check_readonly_mode if @readonly_mode.nil?
@readonly_mode
end
def get_or_check_staff_writes_only_mode
check_readonly_mode if @readonly_mode.nil?
@readonly_mode
end
def add_readonly_header def add_readonly_header
response.headers["Discourse-Readonly"] = "true" if @readonly_mode response.headers["Discourse-Readonly"] = "true" if @readonly_mode
end end

View File

@ -580,15 +580,6 @@ RSpec.configure do |config|
ActiveRecord::Base.connection.schema_cache.add(table) ActiveRecord::Base.connection.schema_cache.add(table)
end end
ApplicationController.before_action(prepend: true) do
if BlockRequestsMiddleware.current_example_location && !request.xhr? &&
request.format == "html"
cookies[
BlockRequestsMiddleware::RSPEC_CURRENT_EXAMPLE_COOKIE_STRING
] = BlockRequestsMiddleware.current_example_location
end
end
system_tests_initialized = true system_tests_initialized = true
end end

View File

@ -0,0 +1,19 @@
# frozen_string_literal: true
describe "bootstrap_error_pages", type: :system do
before { SiteSetting.bootstrap_error_pages = true }
it "boots ember for non-existent route" do
visit "/foobar"
expect(page).not_to have_css("body.no-ember")
expect(page).to have_css("#site-logo")
expect(page).to have_css("div.page-not-found")
end
it "boots ember for non-existent topic" do
visit "/t/999999999999"
expect(page).not_to have_css("body.no-ember")
expect(page).to have_css("#site-logo")
expect(page).to have_css("div.page-not-found")
end
end

View File

@ -9,6 +9,19 @@ describe "Content security policy", type: :system do
expect(page).to have_css("#site-logo") expect(page).to have_css("#site-logo")
end end
it "works for 'public exceptions' like RoutingError" do
expect(SiteSetting.content_security_policy).to eq(true)
SiteSetting.content_security_policy_strict_dynamic = true
SiteSetting.bootstrap_error_pages = true
get "/nonexistent"
expect(response.headers["Content-Security-Policy"]).to include("'strict-dynamic'")
visit "/nonexistent"
expect(page).not_to have_css("body.no-ember")
expect(page).to have_css("#site-logo")
end
it "can boot logster in strict_dynamic mode" do it "can boot logster in strict_dynamic mode" do
expect(SiteSetting.content_security_policy).to eq(true) expect(SiteSetting.content_security_policy).to eq(true)
sign_in Fabricate(:admin) sign_in Fabricate(:admin)