gitx.do 0.0.3 → 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +319 -92
- package/dist/cli/commands/add.d.ts +174 -0
- package/dist/cli/commands/add.d.ts.map +1 -0
- package/dist/cli/commands/add.js +131 -0
- package/dist/cli/commands/add.js.map +1 -0
- package/dist/cli/commands/merge.d.ts +106 -0
- package/dist/cli/commands/merge.d.ts.map +1 -0
- package/dist/cli/commands/merge.js +55 -0
- package/dist/cli/commands/merge.js.map +1 -0
- package/dist/cli/fsx-cli-adapter.d.ts +359 -0
- package/dist/cli/fsx-cli-adapter.d.ts.map +1 -0
- package/dist/cli/fsx-cli-adapter.js +619 -0
- package/dist/cli/fsx-cli-adapter.js.map +1 -0
- package/dist/cli/index.js +0 -0
- package/dist/do/BashModule.d.ts +871 -0
- package/dist/do/BashModule.d.ts.map +1 -0
- package/dist/do/BashModule.js +1143 -0
- package/dist/do/BashModule.js.map +1 -0
- package/dist/do/FsModule.d.ts +601 -0
- package/dist/do/FsModule.d.ts.map +1 -0
- package/dist/do/FsModule.js +1120 -0
- package/dist/do/FsModule.js.map +1 -0
- package/dist/do/GitModule.d.ts +635 -0
- package/dist/do/GitModule.d.ts.map +1 -0
- package/dist/do/GitModule.js +781 -0
- package/dist/do/GitModule.js.map +1 -0
- package/dist/do/GitRepoDO.d.ts +281 -0
- package/dist/do/GitRepoDO.d.ts.map +1 -0
- package/dist/do/GitRepoDO.js +479 -0
- package/dist/do/GitRepoDO.js.map +1 -0
- package/dist/do/bash-ast.d.ts +246 -0
- package/dist/do/bash-ast.d.ts.map +1 -0
- package/dist/do/bash-ast.js +888 -0
- package/dist/do/bash-ast.js.map +1 -0
- package/dist/do/container-executor.d.ts +491 -0
- package/dist/do/container-executor.d.ts.map +1 -0
- package/dist/do/container-executor.js +730 -0
- package/dist/do/container-executor.js.map +1 -0
- package/dist/do/index.d.ts +53 -0
- package/dist/do/index.d.ts.map +1 -0
- package/dist/do/index.js +91 -0
- package/dist/do/index.js.map +1 -0
- package/dist/do/tiered-storage.d.ts +403 -0
- package/dist/do/tiered-storage.d.ts.map +1 -0
- package/dist/do/tiered-storage.js +689 -0
- package/dist/do/tiered-storage.js.map +1 -0
- package/dist/do/withBash.d.ts +231 -0
- package/dist/do/withBash.d.ts.map +1 -0
- package/dist/do/withBash.js +244 -0
- package/dist/do/withBash.js.map +1 -0
- package/dist/do/withFs.d.ts +237 -0
- package/dist/do/withFs.d.ts.map +1 -0
- package/dist/do/withFs.js +387 -0
- package/dist/do/withFs.js.map +1 -0
- package/dist/do/withGit.d.ts +180 -0
- package/dist/do/withGit.d.ts.map +1 -0
- package/dist/do/withGit.js +271 -0
- package/dist/do/withGit.js.map +1 -0
- package/dist/durable-object/object-store.d.ts +157 -15
- package/dist/durable-object/object-store.d.ts.map +1 -1
- package/dist/durable-object/object-store.js +432 -47
- package/dist/durable-object/object-store.js.map +1 -1
- package/dist/durable-object/schema.d.ts +12 -1
- package/dist/durable-object/schema.d.ts.map +1 -1
- package/dist/durable-object/schema.js +87 -2
- package/dist/durable-object/schema.js.map +1 -1
- package/dist/index.d.ts +29 -1
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +34 -0
- package/dist/index.js.map +1 -1
- package/dist/mcp/sandbox/miniflare-evaluator.d.ts +22 -0
- package/dist/mcp/sandbox/miniflare-evaluator.d.ts.map +1 -0
- package/dist/mcp/sandbox/miniflare-evaluator.js +140 -0
- package/dist/mcp/sandbox/miniflare-evaluator.js.map +1 -0
- package/dist/mcp/sandbox/object-store-proxy.d.ts +32 -0
- package/dist/mcp/sandbox/object-store-proxy.d.ts.map +1 -0
- package/dist/mcp/sandbox/object-store-proxy.js +30 -0
- package/dist/mcp/sandbox/object-store-proxy.js.map +1 -0
- package/dist/mcp/sandbox/template.d.ts +17 -0
- package/dist/mcp/sandbox/template.d.ts.map +1 -0
- package/dist/mcp/sandbox/template.js +71 -0
- package/dist/mcp/sandbox/template.js.map +1 -0
- package/dist/mcp/sandbox.d.ts.map +1 -1
- package/dist/mcp/sandbox.js +16 -4
- package/dist/mcp/sandbox.js.map +1 -1
- package/dist/mcp/tools/do.d.ts +32 -0
- package/dist/mcp/tools/do.d.ts.map +1 -0
- package/dist/mcp/tools/do.js +115 -0
- package/dist/mcp/tools/do.js.map +1 -0
- package/dist/pack/delta.d.ts +8 -0
- package/dist/pack/delta.d.ts.map +1 -1
- package/dist/pack/delta.js +236 -29
- package/dist/pack/delta.js.map +1 -1
- package/dist/refs/branch.d.ts +22 -24
- package/dist/refs/branch.d.ts.map +1 -1
- package/dist/refs/branch.js +409 -66
- package/dist/refs/branch.js.map +1 -1
- package/dist/refs/storage.d.ts +77 -5
- package/dist/refs/storage.d.ts.map +1 -1
- package/dist/refs/storage.js +193 -43
- package/dist/refs/storage.js.map +1 -1
- package/dist/refs/tag.d.ts +44 -24
- package/dist/refs/tag.d.ts.map +1 -1
- package/dist/refs/tag.js +411 -70
- package/dist/refs/tag.js.map +1 -1
- package/dist/storage/backend.d.ts +425 -0
- package/dist/storage/backend.d.ts.map +1 -0
- package/dist/storage/backend.js +41 -0
- package/dist/storage/backend.js.map +1 -0
- package/dist/storage/fsx-adapter.d.ts +204 -0
- package/dist/storage/fsx-adapter.d.ts.map +1 -0
- package/dist/storage/fsx-adapter.js +470 -0
- package/dist/storage/fsx-adapter.js.map +1 -0
- package/dist/types/capability.d.ts +1385 -0
- package/dist/types/capability.d.ts.map +1 -0
- package/dist/types/capability.js +36 -0
- package/dist/types/capability.js.map +1 -0
- package/dist/types/index.d.ts +13 -0
- package/dist/types/index.d.ts.map +1 -0
- package/dist/types/index.js +18 -0
- package/dist/types/index.js.map +1 -0
- package/dist/types/objects.d.ts +182 -0
- package/dist/types/objects.d.ts.map +1 -1
- package/dist/types/objects.js +249 -4
- package/dist/types/objects.js.map +1 -1
- package/dist/types/storage.d.ts +114 -0
- package/dist/types/storage.d.ts.map +1 -1
- package/dist/types/storage.js +160 -1
- package/dist/types/storage.js.map +1 -1
- package/dist/types/worker-loader.d.ts +60 -0
- package/dist/types/worker-loader.d.ts.map +1 -0
- package/dist/types/worker-loader.js +62 -0
- package/dist/types/worker-loader.js.map +1 -0
- package/dist/utils/hash.d.ts +125 -80
- package/dist/utils/hash.d.ts.map +1 -1
- package/dist/utils/hash.js +187 -100
- package/dist/utils/hash.js.map +1 -1
- package/dist/utils/sha1.d.ts +171 -0
- package/dist/utils/sha1.d.ts.map +1 -1
- package/dist/utils/sha1.js +352 -0
- package/dist/utils/sha1.js.map +1 -1
- package/dist/wire/path-security.d.ts +157 -0
- package/dist/wire/path-security.d.ts.map +1 -0
- package/dist/wire/path-security.js +307 -0
- package/dist/wire/path-security.js.map +1 -0
- package/dist/wire/receive-pack.d.ts +7 -0
- package/dist/wire/receive-pack.d.ts.map +1 -1
- package/dist/wire/receive-pack.js +29 -1
- package/dist/wire/receive-pack.js.map +1 -1
- package/package.json +10 -1
|
@@ -0,0 +1,157 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* @fileoverview Path Security Validation for Wire Protocol
|
|
3
|
+
*
|
|
4
|
+
* This module provides security validation for paths and refs received from
|
|
5
|
+
* clients via the wire protocol. It prevents path traversal attacks and ensures
|
|
6
|
+
* paths are properly normalized and scoped.
|
|
7
|
+
*
|
|
8
|
+
* @module wire/path-security
|
|
9
|
+
*
|
|
10
|
+
* ## Security Considerations
|
|
11
|
+
*
|
|
12
|
+
* - Prevents path traversal via `../` sequences
|
|
13
|
+
* - Rejects absolute paths starting with `/` or drive letters
|
|
14
|
+
* - Normalizes paths to remove redundant separators
|
|
15
|
+
* - Validates ref names are within allowed namespace
|
|
16
|
+
* - Blocks null bytes and other control characters
|
|
17
|
+
*
|
|
18
|
+
* @example
|
|
19
|
+
* ```typescript
|
|
20
|
+
* import { validateRefPath, validateRepositoryId, PathSecurityError } from './path-security'
|
|
21
|
+
*
|
|
22
|
+
* try {
|
|
23
|
+
* validateRefPath('refs/heads/main') // OK
|
|
24
|
+
* validateRefPath('refs/../../../etc/passwd') // Throws PathSecurityError
|
|
25
|
+
* } catch (e) {
|
|
26
|
+
* if (e instanceof PathSecurityError) {
|
|
27
|
+
* console.error('Security violation:', e.message)
|
|
28
|
+
* }
|
|
29
|
+
* }
|
|
30
|
+
* ```
|
|
31
|
+
*/
|
|
32
|
+
/**
|
|
33
|
+
* Error thrown when a path security violation is detected.
|
|
34
|
+
*/
|
|
35
|
+
export declare class PathSecurityError extends Error {
|
|
36
|
+
readonly code: string;
|
|
37
|
+
constructor(message: string, code?: string);
|
|
38
|
+
}
|
|
39
|
+
/**
|
|
40
|
+
* Result of path validation.
|
|
41
|
+
*/
|
|
42
|
+
export interface PathValidationResult {
|
|
43
|
+
/** Whether the path is valid */
|
|
44
|
+
valid: boolean;
|
|
45
|
+
/** Error message if invalid */
|
|
46
|
+
error?: string;
|
|
47
|
+
/** Error code if invalid */
|
|
48
|
+
code?: string;
|
|
49
|
+
/** Normalized path (if valid) */
|
|
50
|
+
normalizedPath?: string;
|
|
51
|
+
}
|
|
52
|
+
/**
|
|
53
|
+
* Check if a path contains path traversal sequences.
|
|
54
|
+
*
|
|
55
|
+
* @param path - Path to check
|
|
56
|
+
* @returns true if path traversal is detected
|
|
57
|
+
*/
|
|
58
|
+
export declare function containsPathTraversal(path: string): boolean;
|
|
59
|
+
/**
|
|
60
|
+
* Check if a path is absolute.
|
|
61
|
+
*
|
|
62
|
+
* @param path - Path to check
|
|
63
|
+
* @returns true if the path is absolute
|
|
64
|
+
*/
|
|
65
|
+
export declare function isAbsolutePath(path: string): boolean;
|
|
66
|
+
/**
|
|
67
|
+
* Check if a path contains dangerous characters.
|
|
68
|
+
*
|
|
69
|
+
* @param path - Path to check
|
|
70
|
+
* @returns Object with valid status and optional error
|
|
71
|
+
*/
|
|
72
|
+
export declare function containsDangerousCharacters(path: string): {
|
|
73
|
+
dangerous: boolean;
|
|
74
|
+
reason?: string;
|
|
75
|
+
};
|
|
76
|
+
/**
|
|
77
|
+
* Normalize a path by removing redundant separators and resolving . components.
|
|
78
|
+
* Does NOT resolve .. components - those should be rejected.
|
|
79
|
+
*
|
|
80
|
+
* @param path - Path to normalize
|
|
81
|
+
* @returns Normalized path
|
|
82
|
+
*/
|
|
83
|
+
export declare function normalizePath(path: string): string;
|
|
84
|
+
/**
|
|
85
|
+
* Validate a ref path for security issues.
|
|
86
|
+
*
|
|
87
|
+
* @description
|
|
88
|
+
* Validates a Git ref path to ensure it:
|
|
89
|
+
* - Does not contain path traversal sequences
|
|
90
|
+
* - Is not an absolute path
|
|
91
|
+
* - Does not contain dangerous characters
|
|
92
|
+
* - Starts with a valid ref prefix (refs/, HEAD)
|
|
93
|
+
*
|
|
94
|
+
* @param refPath - Ref path to validate
|
|
95
|
+
* @returns Validation result
|
|
96
|
+
*
|
|
97
|
+
* @example
|
|
98
|
+
* ```typescript
|
|
99
|
+
* const result = validateRefPath('refs/heads/main')
|
|
100
|
+
* // result.valid === true
|
|
101
|
+
*
|
|
102
|
+
* const badResult = validateRefPath('refs/heads/../../../etc/passwd')
|
|
103
|
+
* // badResult.valid === false
|
|
104
|
+
* // badResult.error === 'path traversal detected'
|
|
105
|
+
* ```
|
|
106
|
+
*/
|
|
107
|
+
export declare function validateRefPath(refPath: string): PathValidationResult;
|
|
108
|
+
/**
|
|
109
|
+
* Validate a repository identifier for security issues.
|
|
110
|
+
*
|
|
111
|
+
* @description
|
|
112
|
+
* Validates a repository identifier to ensure it:
|
|
113
|
+
* - Does not contain path traversal sequences
|
|
114
|
+
* - Is not an absolute path
|
|
115
|
+
* - Does not contain dangerous characters
|
|
116
|
+
* - Contains only allowed characters (alphanumeric, dash, underscore, dot, slash)
|
|
117
|
+
*
|
|
118
|
+
* @param repoId - Repository identifier to validate
|
|
119
|
+
* @returns Validation result
|
|
120
|
+
*
|
|
121
|
+
* @example
|
|
122
|
+
* ```typescript
|
|
123
|
+
* const result = validateRepositoryId('my-org/my-repo')
|
|
124
|
+
* // result.valid === true
|
|
125
|
+
*
|
|
126
|
+
* const badResult = validateRepositoryId('../../../etc/passwd')
|
|
127
|
+
* // badResult.valid === false
|
|
128
|
+
* ```
|
|
129
|
+
*/
|
|
130
|
+
export declare function validateRepositoryId(repoId: string): PathValidationResult;
|
|
131
|
+
/**
|
|
132
|
+
* Validate and sanitize a ref name for security.
|
|
133
|
+
*
|
|
134
|
+
* @description
|
|
135
|
+
* Combines Git ref name validation with security checks.
|
|
136
|
+
* This should be used in addition to the standard validateRefName function.
|
|
137
|
+
*
|
|
138
|
+
* @param refName - Ref name to validate
|
|
139
|
+
* @throws {PathSecurityError} If security violation detected
|
|
140
|
+
* @returns Normalized ref name
|
|
141
|
+
*
|
|
142
|
+
* @example
|
|
143
|
+
* ```typescript
|
|
144
|
+
* const safe = validateSecureRefName('refs/heads/main') // 'refs/heads/main'
|
|
145
|
+
* validateSecureRefName('refs/../etc/passwd') // throws PathSecurityError
|
|
146
|
+
* ```
|
|
147
|
+
*/
|
|
148
|
+
export declare function validateSecureRefName(refName: string): string;
|
|
149
|
+
/**
|
|
150
|
+
* Validate and sanitize a repository identifier for security.
|
|
151
|
+
*
|
|
152
|
+
* @param repoId - Repository identifier to validate
|
|
153
|
+
* @throws {PathSecurityError} If security violation detected
|
|
154
|
+
* @returns Normalized repository identifier
|
|
155
|
+
*/
|
|
156
|
+
export declare function validateSecureRepositoryId(repoId: string): string;
|
|
157
|
+
//# sourceMappingURL=path-security.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"path-security.d.ts","sourceRoot":"","sources":["../../src/wire/path-security.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AAEH;;GAEG;AACH,qBAAa,iBAAkB,SAAQ,KAAK;IAC1C,QAAQ,CAAC,IAAI,EAAE,MAAM,CAAA;gBAET,OAAO,EAAE,MAAM,EAAE,IAAI,GAAE,MAAkC;CAKtE;AAED;;GAEG;AACH,MAAM,WAAW,oBAAoB;IACnC,gCAAgC;IAChC,KAAK,EAAE,OAAO,CAAA;IACd,+BAA+B;IAC/B,KAAK,CAAC,EAAE,MAAM,CAAA;IACd,4BAA4B;IAC5B,IAAI,CAAC,EAAE,MAAM,CAAA;IACb,iCAAiC;IACjC,cAAc,CAAC,EAAE,MAAM,CAAA;CACxB;AAkBD;;;;;GAKG;AACH,wBAAgB,qBAAqB,CAAC,IAAI,EAAE,MAAM,GAAG,OAAO,CA0B3D;AAED;;;;;GAKG;AACH,wBAAgB,cAAc,CAAC,IAAI,EAAE,MAAM,GAAG,OAAO,CAcpD;AAED;;;;;GAKG;AACH,wBAAgB,2BAA2B,CAAC,IAAI,EAAE,MAAM,GAAG;IAAE,SAAS,EAAE,OAAO,CAAC;IAAC,MAAM,CAAC,EAAE,MAAM,CAAA;CAAE,CAejG;AAED;;;;;;GAMG;AACH,wBAAgB,aAAa,CAAC,IAAI,EAAE,MAAM,GAAG,MAAM,CAsBlD;AAED;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,wBAAgB,eAAe,CAAC,OAAO,EAAE,MAAM,GAAG,oBAAoB,CAiDrE;AAED;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,wBAAgB,oBAAoB,CAAC,MAAM,EAAE,MAAM,GAAG,oBAAoB,CAuCzE;AAED;;;;;;;;;;;;;;;;GAgBG;AACH,wBAAgB,qBAAqB,CAAC,OAAO,EAAE,MAAM,GAAG,MAAM,CAW7D;AAED;;;;;;GAMG;AACH,wBAAgB,0BAA0B,CAAC,MAAM,EAAE,MAAM,GAAG,MAAM,CAWjE"}
|
|
@@ -0,0 +1,307 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* @fileoverview Path Security Validation for Wire Protocol
|
|
3
|
+
*
|
|
4
|
+
* This module provides security validation for paths and refs received from
|
|
5
|
+
* clients via the wire protocol. It prevents path traversal attacks and ensures
|
|
6
|
+
* paths are properly normalized and scoped.
|
|
7
|
+
*
|
|
8
|
+
* @module wire/path-security
|
|
9
|
+
*
|
|
10
|
+
* ## Security Considerations
|
|
11
|
+
*
|
|
12
|
+
* - Prevents path traversal via `../` sequences
|
|
13
|
+
* - Rejects absolute paths starting with `/` or drive letters
|
|
14
|
+
* - Normalizes paths to remove redundant separators
|
|
15
|
+
* - Validates ref names are within allowed namespace
|
|
16
|
+
* - Blocks null bytes and other control characters
|
|
17
|
+
*
|
|
18
|
+
* @example
|
|
19
|
+
* ```typescript
|
|
20
|
+
* import { validateRefPath, validateRepositoryId, PathSecurityError } from './path-security'
|
|
21
|
+
*
|
|
22
|
+
* try {
|
|
23
|
+
* validateRefPath('refs/heads/main') // OK
|
|
24
|
+
* validateRefPath('refs/../../../etc/passwd') // Throws PathSecurityError
|
|
25
|
+
* } catch (e) {
|
|
26
|
+
* if (e instanceof PathSecurityError) {
|
|
27
|
+
* console.error('Security violation:', e.message)
|
|
28
|
+
* }
|
|
29
|
+
* }
|
|
30
|
+
* ```
|
|
31
|
+
*/
|
|
32
|
+
/**
|
|
33
|
+
* Error thrown when a path security violation is detected.
|
|
34
|
+
*/
|
|
35
|
+
export class PathSecurityError extends Error {
|
|
36
|
+
code;
|
|
37
|
+
constructor(message, code = 'PATH_SECURITY_VIOLATION') {
|
|
38
|
+
super(message);
|
|
39
|
+
this.name = 'PathSecurityError';
|
|
40
|
+
this.code = code;
|
|
41
|
+
}
|
|
42
|
+
}
|
|
43
|
+
/**
|
|
44
|
+
* Check if a path component is a traversal attempt.
|
|
45
|
+
*
|
|
46
|
+
* @param component - Path component to check
|
|
47
|
+
* @returns true if this is a traversal component
|
|
48
|
+
*/
|
|
49
|
+
function isTraversalComponent(component) {
|
|
50
|
+
// Exact match for ..
|
|
51
|
+
if (component === '..')
|
|
52
|
+
return true;
|
|
53
|
+
// URL-encoded variants
|
|
54
|
+
if (component === '%2e%2e' || component === '%2E%2E')
|
|
55
|
+
return true;
|
|
56
|
+
// Double-URL-encoded
|
|
57
|
+
if (component === '%252e%252e' || component === '%252E%252E')
|
|
58
|
+
return true;
|
|
59
|
+
return false;
|
|
60
|
+
}
|
|
61
|
+
/**
|
|
62
|
+
* Check if a path contains path traversal sequences.
|
|
63
|
+
*
|
|
64
|
+
* @param path - Path to check
|
|
65
|
+
* @returns true if path traversal is detected
|
|
66
|
+
*/
|
|
67
|
+
export function containsPathTraversal(path) {
|
|
68
|
+
// Check for null bytes
|
|
69
|
+
if (path.includes('\0') || path.includes('%00')) {
|
|
70
|
+
return true;
|
|
71
|
+
}
|
|
72
|
+
// Check for literal ..
|
|
73
|
+
if (path.includes('..')) {
|
|
74
|
+
return true;
|
|
75
|
+
}
|
|
76
|
+
// Check URL-encoded variants (case-insensitive)
|
|
77
|
+
const lowerPath = path.toLowerCase();
|
|
78
|
+
if (lowerPath.includes('%2e%2e') || lowerPath.includes('%252e%252e')) {
|
|
79
|
+
return true;
|
|
80
|
+
}
|
|
81
|
+
// Check each component after splitting
|
|
82
|
+
const components = path.split(/[/\\]/);
|
|
83
|
+
for (const component of components) {
|
|
84
|
+
if (isTraversalComponent(component)) {
|
|
85
|
+
return true;
|
|
86
|
+
}
|
|
87
|
+
}
|
|
88
|
+
return false;
|
|
89
|
+
}
|
|
90
|
+
/**
|
|
91
|
+
* Check if a path is absolute.
|
|
92
|
+
*
|
|
93
|
+
* @param path - Path to check
|
|
94
|
+
* @returns true if the path is absolute
|
|
95
|
+
*/
|
|
96
|
+
export function isAbsolutePath(path) {
|
|
97
|
+
// Unix absolute path
|
|
98
|
+
if (path.startsWith('/'))
|
|
99
|
+
return true;
|
|
100
|
+
// Windows absolute path (drive letter)
|
|
101
|
+
if (/^[a-zA-Z]:[/\\]/.test(path))
|
|
102
|
+
return true;
|
|
103
|
+
// Windows UNC path
|
|
104
|
+
if (path.startsWith('\\\\'))
|
|
105
|
+
return true;
|
|
106
|
+
// URL-encoded leading slash
|
|
107
|
+
if (path.startsWith('%2f') || path.startsWith('%2F'))
|
|
108
|
+
return true;
|
|
109
|
+
return false;
|
|
110
|
+
}
|
|
111
|
+
/**
|
|
112
|
+
* Check if a path contains dangerous characters.
|
|
113
|
+
*
|
|
114
|
+
* @param path - Path to check
|
|
115
|
+
* @returns Object with valid status and optional error
|
|
116
|
+
*/
|
|
117
|
+
export function containsDangerousCharacters(path) {
|
|
118
|
+
// Null byte
|
|
119
|
+
if (path.includes('\0')) {
|
|
120
|
+
return { dangerous: true, reason: 'null byte detected' };
|
|
121
|
+
}
|
|
122
|
+
// Control characters (0x00-0x1f except tab/newline, and 0x7f)
|
|
123
|
+
for (let i = 0; i < path.length; i++) {
|
|
124
|
+
const code = path.charCodeAt(i);
|
|
125
|
+
if ((code >= 0 && code < 0x20 && code !== 0x09 && code !== 0x0a) || code === 0x7f) {
|
|
126
|
+
return { dangerous: true, reason: 'control character detected' };
|
|
127
|
+
}
|
|
128
|
+
}
|
|
129
|
+
return { dangerous: false };
|
|
130
|
+
}
|
|
131
|
+
/**
|
|
132
|
+
* Normalize a path by removing redundant separators and resolving . components.
|
|
133
|
+
* Does NOT resolve .. components - those should be rejected.
|
|
134
|
+
*
|
|
135
|
+
* @param path - Path to normalize
|
|
136
|
+
* @returns Normalized path
|
|
137
|
+
*/
|
|
138
|
+
export function normalizePath(path) {
|
|
139
|
+
// Replace backslashes with forward slashes
|
|
140
|
+
let normalized = path.replace(/\\/g, '/');
|
|
141
|
+
// Remove duplicate slashes
|
|
142
|
+
normalized = normalized.replace(/\/+/g, '/');
|
|
143
|
+
// Remove trailing slash (unless it's the root)
|
|
144
|
+
if (normalized.length > 1 && normalized.endsWith('/')) {
|
|
145
|
+
normalized = normalized.slice(0, -1);
|
|
146
|
+
}
|
|
147
|
+
// Remove . components
|
|
148
|
+
const components = normalized.split('/');
|
|
149
|
+
const filtered = components.filter(c => c !== '.' && c !== '');
|
|
150
|
+
// Preserve leading slash if present
|
|
151
|
+
if (normalized.startsWith('/')) {
|
|
152
|
+
return '/' + filtered.join('/');
|
|
153
|
+
}
|
|
154
|
+
return filtered.join('/') || '.';
|
|
155
|
+
}
|
|
156
|
+
/**
|
|
157
|
+
* Validate a ref path for security issues.
|
|
158
|
+
*
|
|
159
|
+
* @description
|
|
160
|
+
* Validates a Git ref path to ensure it:
|
|
161
|
+
* - Does not contain path traversal sequences
|
|
162
|
+
* - Is not an absolute path
|
|
163
|
+
* - Does not contain dangerous characters
|
|
164
|
+
* - Starts with a valid ref prefix (refs/, HEAD)
|
|
165
|
+
*
|
|
166
|
+
* @param refPath - Ref path to validate
|
|
167
|
+
* @returns Validation result
|
|
168
|
+
*
|
|
169
|
+
* @example
|
|
170
|
+
* ```typescript
|
|
171
|
+
* const result = validateRefPath('refs/heads/main')
|
|
172
|
+
* // result.valid === true
|
|
173
|
+
*
|
|
174
|
+
* const badResult = validateRefPath('refs/heads/../../../etc/passwd')
|
|
175
|
+
* // badResult.valid === false
|
|
176
|
+
* // badResult.error === 'path traversal detected'
|
|
177
|
+
* ```
|
|
178
|
+
*/
|
|
179
|
+
export function validateRefPath(refPath) {
|
|
180
|
+
// Empty check
|
|
181
|
+
if (!refPath || refPath.trim() === '') {
|
|
182
|
+
return { valid: false, error: 'empty ref path', code: 'EMPTY_PATH' };
|
|
183
|
+
}
|
|
184
|
+
// Trim whitespace
|
|
185
|
+
const trimmed = refPath.trim();
|
|
186
|
+
// Check for dangerous characters
|
|
187
|
+
const dangerCheck = containsDangerousCharacters(trimmed);
|
|
188
|
+
if (dangerCheck.dangerous) {
|
|
189
|
+
return { valid: false, error: dangerCheck.reason, code: 'DANGEROUS_CHARS' };
|
|
190
|
+
}
|
|
191
|
+
// Check for path traversal
|
|
192
|
+
if (containsPathTraversal(trimmed)) {
|
|
193
|
+
return { valid: false, error: 'path traversal detected', code: 'PATH_TRAVERSAL' };
|
|
194
|
+
}
|
|
195
|
+
// Check for absolute path
|
|
196
|
+
if (isAbsolutePath(trimmed)) {
|
|
197
|
+
return { valid: false, error: 'absolute path not allowed', code: 'ABSOLUTE_PATH' };
|
|
198
|
+
}
|
|
199
|
+
// Validate ref prefix (must start with refs/ or be HEAD)
|
|
200
|
+
const validPrefixes = ['refs/', 'HEAD'];
|
|
201
|
+
const hasValidPrefix = validPrefixes.some(prefix => trimmed === prefix.replace(/\/$/, '') || trimmed.startsWith(prefix));
|
|
202
|
+
if (!hasValidPrefix) {
|
|
203
|
+
return { valid: false, error: 'invalid ref prefix', code: 'INVALID_PREFIX' };
|
|
204
|
+
}
|
|
205
|
+
// Normalize the path
|
|
206
|
+
const normalized = normalizePath(trimmed);
|
|
207
|
+
// After normalization, re-check that we still have valid prefix
|
|
208
|
+
// (normalization shouldn't change valid paths, but double-check)
|
|
209
|
+
const normalizedHasValidPrefix = validPrefixes.some(prefix => normalized === prefix.replace(/\/$/, '') || normalized.startsWith(prefix));
|
|
210
|
+
if (!normalizedHasValidPrefix) {
|
|
211
|
+
return { valid: false, error: 'path escapes ref namespace after normalization', code: 'NAMESPACE_ESCAPE' };
|
|
212
|
+
}
|
|
213
|
+
return { valid: true, normalizedPath: normalized };
|
|
214
|
+
}
|
|
215
|
+
/**
|
|
216
|
+
* Validate a repository identifier for security issues.
|
|
217
|
+
*
|
|
218
|
+
* @description
|
|
219
|
+
* Validates a repository identifier to ensure it:
|
|
220
|
+
* - Does not contain path traversal sequences
|
|
221
|
+
* - Is not an absolute path
|
|
222
|
+
* - Does not contain dangerous characters
|
|
223
|
+
* - Contains only allowed characters (alphanumeric, dash, underscore, dot, slash)
|
|
224
|
+
*
|
|
225
|
+
* @param repoId - Repository identifier to validate
|
|
226
|
+
* @returns Validation result
|
|
227
|
+
*
|
|
228
|
+
* @example
|
|
229
|
+
* ```typescript
|
|
230
|
+
* const result = validateRepositoryId('my-org/my-repo')
|
|
231
|
+
* // result.valid === true
|
|
232
|
+
*
|
|
233
|
+
* const badResult = validateRepositoryId('../../../etc/passwd')
|
|
234
|
+
* // badResult.valid === false
|
|
235
|
+
* ```
|
|
236
|
+
*/
|
|
237
|
+
export function validateRepositoryId(repoId) {
|
|
238
|
+
// Empty check
|
|
239
|
+
if (!repoId || repoId.trim() === '') {
|
|
240
|
+
return { valid: false, error: 'empty repository identifier', code: 'EMPTY_PATH' };
|
|
241
|
+
}
|
|
242
|
+
// Trim whitespace
|
|
243
|
+
const trimmed = repoId.trim();
|
|
244
|
+
// Check for dangerous characters
|
|
245
|
+
const dangerCheck = containsDangerousCharacters(trimmed);
|
|
246
|
+
if (dangerCheck.dangerous) {
|
|
247
|
+
return { valid: false, error: dangerCheck.reason, code: 'DANGEROUS_CHARS' };
|
|
248
|
+
}
|
|
249
|
+
// Check for path traversal
|
|
250
|
+
if (containsPathTraversal(trimmed)) {
|
|
251
|
+
return { valid: false, error: 'path traversal detected', code: 'PATH_TRAVERSAL' };
|
|
252
|
+
}
|
|
253
|
+
// Check for absolute path
|
|
254
|
+
if (isAbsolutePath(trimmed)) {
|
|
255
|
+
return { valid: false, error: 'absolute path not allowed', code: 'ABSOLUTE_PATH' };
|
|
256
|
+
}
|
|
257
|
+
// Validate allowed characters (alphanumeric, dash, underscore, dot, slash)
|
|
258
|
+
// Also allow .git suffix which is common
|
|
259
|
+
const allowedPattern = /^[a-zA-Z0-9_\-./]+$/;
|
|
260
|
+
if (!allowedPattern.test(trimmed)) {
|
|
261
|
+
return { valid: false, error: 'invalid characters in repository identifier', code: 'INVALID_CHARS' };
|
|
262
|
+
}
|
|
263
|
+
// Normalize the path
|
|
264
|
+
const normalized = normalizePath(trimmed);
|
|
265
|
+
// Strip .git suffix for consistency
|
|
266
|
+
const withoutGit = normalized.replace(/\.git\/?$/, '');
|
|
267
|
+
return { valid: true, normalizedPath: withoutGit || normalized };
|
|
268
|
+
}
|
|
269
|
+
/**
|
|
270
|
+
* Validate and sanitize a ref name for security.
|
|
271
|
+
*
|
|
272
|
+
* @description
|
|
273
|
+
* Combines Git ref name validation with security checks.
|
|
274
|
+
* This should be used in addition to the standard validateRefName function.
|
|
275
|
+
*
|
|
276
|
+
* @param refName - Ref name to validate
|
|
277
|
+
* @throws {PathSecurityError} If security violation detected
|
|
278
|
+
* @returns Normalized ref name
|
|
279
|
+
*
|
|
280
|
+
* @example
|
|
281
|
+
* ```typescript
|
|
282
|
+
* const safe = validateSecureRefName('refs/heads/main') // 'refs/heads/main'
|
|
283
|
+
* validateSecureRefName('refs/../etc/passwd') // throws PathSecurityError
|
|
284
|
+
* ```
|
|
285
|
+
*/
|
|
286
|
+
export function validateSecureRefName(refName) {
|
|
287
|
+
const result = validateRefPath(refName);
|
|
288
|
+
if (!result.valid) {
|
|
289
|
+
throw new PathSecurityError(`Invalid ref name: ${result.error}`, result.code);
|
|
290
|
+
}
|
|
291
|
+
return result.normalizedPath;
|
|
292
|
+
}
|
|
293
|
+
/**
|
|
294
|
+
* Validate and sanitize a repository identifier for security.
|
|
295
|
+
*
|
|
296
|
+
* @param repoId - Repository identifier to validate
|
|
297
|
+
* @throws {PathSecurityError} If security violation detected
|
|
298
|
+
* @returns Normalized repository identifier
|
|
299
|
+
*/
|
|
300
|
+
export function validateSecureRepositoryId(repoId) {
|
|
301
|
+
const result = validateRepositoryId(repoId);
|
|
302
|
+
if (!result.valid) {
|
|
303
|
+
throw new PathSecurityError(`Invalid repository identifier: ${result.error}`, result.code);
|
|
304
|
+
}
|
|
305
|
+
return result.normalizedPath;
|
|
306
|
+
}
|
|
307
|
+
//# sourceMappingURL=path-security.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"path-security.js","sourceRoot":"","sources":["../../src/wire/path-security.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AAEH;;GAEG;AACH,MAAM,OAAO,iBAAkB,SAAQ,KAAK;IACjC,IAAI,CAAQ;IAErB,YAAY,OAAe,EAAE,OAAe,yBAAyB;QACnE,KAAK,CAAC,OAAO,CAAC,CAAA;QACd,IAAI,CAAC,IAAI,GAAG,mBAAmB,CAAA;QAC/B,IAAI,CAAC,IAAI,GAAG,IAAI,CAAA;IAClB,CAAC;CACF;AAgBD;;;;;GAKG;AACH,SAAS,oBAAoB,CAAC,SAAiB;IAC7C,qBAAqB;IACrB,IAAI,SAAS,KAAK,IAAI;QAAE,OAAO,IAAI,CAAA;IACnC,uBAAuB;IACvB,IAAI,SAAS,KAAK,QAAQ,IAAI,SAAS,KAAK,QAAQ;QAAE,OAAO,IAAI,CAAA;IACjE,qBAAqB;IACrB,IAAI,SAAS,KAAK,YAAY,IAAI,SAAS,KAAK,YAAY;QAAE,OAAO,IAAI,CAAA;IACzE,OAAO,KAAK,CAAA;AACd,CAAC;AAED;;;;;GAKG;AACH,MAAM,UAAU,qBAAqB,CAAC,IAAY;IAChD,uBAAuB;IACvB,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,IAAI,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC;QAChD,OAAO,IAAI,CAAA;IACb,CAAC;IAED,uBAAuB;IACvB,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,CAAC;QACxB,OAAO,IAAI,CAAA;IACb,CAAC;IAED,gDAAgD;IAChD,MAAM,SAAS,GAAG,IAAI,CAAC,WAAW,EAAE,CAAA;IACpC,IAAI,SAAS,CAAC,QAAQ,CAAC,QAAQ,CAAC,IAAI,SAAS,CAAC,QAAQ,CAAC,YAAY,CAAC,EAAE,CAAC;QACrE,OAAO,IAAI,CAAA;IACb,CAAC;IAED,uCAAuC;IACvC,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,CAAA;IACtC,KAAK,MAAM,SAAS,IAAI,UAAU,EAAE,CAAC;QACnC,IAAI,oBAAoB,CAAC,SAAS,CAAC,EAAE,CAAC;YACpC,OAAO,IAAI,CAAA;QACb,CAAC;IACH,CAAC;IAED,OAAO,KAAK,CAAA;AACd,CAAC;AAED;;;;;GAKG;AACH,MAAM,UAAU,cAAc,CAAC,IAAY;IACzC,qBAAqB;IACrB,IAAI,IAAI,CAAC,UAAU,CAAC,GAAG,CAAC;QAAE,OAAO,IAAI,CAAA;IAErC,uCAAuC;IACvC,IAAI,iBAAiB,CAAC,IAAI,CAAC,IAAI,CAAC;QAAE,OAAO,IAAI,CAAA;IAE7C,mBAAmB;IACnB,IAAI,IAAI,CAAC,UAAU,CAAC,MAAM,CAAC;QAAE,OAAO,IAAI,CAAA;IAExC,4BAA4B;IAC5B,IAAI,IAAI,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,IAAI,CAAC,UAAU,CAAC,KAAK,CAAC;QAAE,OAAO,IAAI,CAAA;IAEjE,OAAO,KAAK,CAAA;AACd,CAAC;AAED;;;;;GAKG;AACH,MAAM,UAAU,2BAA2B,CAAC,IAAY;IACtD,YAAY;IACZ,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,EAAE,CAAC;QACxB,OAAO,EAAE,SAAS,EAAE,IAAI,EAAE,MAAM,EAAE,oBAAoB,EAAE,CAAA;IAC1D,CAAC;IAED,8DAA8D;IAC9D,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,IAAI,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;QACrC,MAAM,IAAI,GAAG,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,CAAA;QAC/B,IAAI,CAAC,IAAI,IAAI,CAAC,IAAI,IAAI,GAAG,IAAI,IAAI,IAAI,KAAK,IAAI,IAAI,IAAI,KAAK,IAAI,CAAC,IAAI,IAAI,KAAK,IAAI,EAAE,CAAC;YAClF,OAAO,EAAE,SAAS,EAAE,IAAI,EAAE,MAAM,EAAE,4BAA4B,EAAE,CAAA;QAClE,CAAC;IACH,CAAC;IAED,OAAO,EAAE,SAAS,EAAE,KAAK,EAAE,CAAA;AAC7B,CAAC;AAED;;;;;;GAMG;AACH,MAAM,UAAU,aAAa,CAAC,IAAY;IACxC,2CAA2C;IAC3C,IAAI,UAAU,GAAG,IAAI,CAAC,OAAO,CAAC,KAAK,EAAE,GAAG,CAAC,CAAA;IAEzC,2BAA2B;IAC3B,UAAU,GAAG,UAAU,CAAC,OAAO,CAAC,MAAM,EAAE,GAAG,CAAC,CAAA;IAE5C,+CAA+C;IAC/C,IAAI,UAAU,CAAC,MAAM,GAAG,CAAC,IAAI,UAAU,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;QACtD,UAAU,GAAG,UAAU,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAAA;IACtC,CAAC;IAED,sBAAsB;IACtB,MAAM,UAAU,GAAG,UAAU,CAAC,KAAK,CAAC,GAAG,CAAC,CAAA;IACxC,MAAM,QAAQ,GAAG,UAAU,CAAC,MAAM,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,KAAK,GAAG,IAAI,CAAC,KAAK,EAAE,CAAC,CAAA;IAE9D,oCAAoC;IACpC,IAAI,UAAU,CAAC,UAAU,CAAC,GAAG,CAAC,EAAE,CAAC;QAC/B,OAAO,GAAG,GAAG,QAAQ,CAAC,IAAI,CAAC,GAAG,CAAC,CAAA;IACjC,CAAC;IAED,OAAO,QAAQ,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,GAAG,CAAA;AAClC,CAAC;AAED;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAM,UAAU,eAAe,CAAC,OAAe;IAC7C,cAAc;IACd,IAAI,CAAC,OAAO,IAAI,OAAO,CAAC,IAAI,EAAE,KAAK,EAAE,EAAE,CAAC;QACtC,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,gBAAgB,EAAE,IAAI,EAAE,YAAY,EAAE,CAAA;IACtE,CAAC;IAED,kBAAkB;IAClB,MAAM,OAAO,GAAG,OAAO,CAAC,IAAI,EAAE,CAAA;IAE9B,iCAAiC;IACjC,MAAM,WAAW,GAAG,2BAA2B,CAAC,OAAO,CAAC,CAAA;IACxD,IAAI,WAAW,CAAC,SAAS,EAAE,CAAC;QAC1B,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,WAAW,CAAC,MAAM,EAAE,IAAI,EAAE,iBAAiB,EAAE,CAAA;IAC7E,CAAC;IAED,2BAA2B;IAC3B,IAAI,qBAAqB,CAAC,OAAO,CAAC,EAAE,CAAC;QACnC,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,yBAAyB,EAAE,IAAI,EAAE,gBAAgB,EAAE,CAAA;IACnF,CAAC;IAED,0BAA0B;IAC1B,IAAI,cAAc,CAAC,OAAO,CAAC,EAAE,CAAC;QAC5B,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,2BAA2B,EAAE,IAAI,EAAE,eAAe,EAAE,CAAA;IACpF,CAAC;IAED,yDAAyD;IACzD,MAAM,aAAa,GAAG,CAAC,OAAO,EAAE,MAAM,CAAC,CAAA;IACvC,MAAM,cAAc,GAAG,aAAa,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CACjD,OAAO,KAAK,MAAM,CAAC,OAAO,CAAC,KAAK,EAAE,EAAE,CAAC,IAAI,OAAO,CAAC,UAAU,CAAC,MAAM,CAAC,CACpE,CAAA;IAED,IAAI,CAAC,cAAc,EAAE,CAAC;QACpB,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,oBAAoB,EAAE,IAAI,EAAE,gBAAgB,EAAE,CAAA;IAC9E,CAAC;IAED,qBAAqB;IACrB,MAAM,UAAU,GAAG,aAAa,CAAC,OAAO,CAAC,CAAA;IAEzC,gEAAgE;IAChE,iEAAiE;IACjE,MAAM,wBAAwB,GAAG,aAAa,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAC3D,UAAU,KAAK,MAAM,CAAC,OAAO,CAAC,KAAK,EAAE,EAAE,CAAC,IAAI,UAAU,CAAC,UAAU,CAAC,MAAM,CAAC,CAC1E,CAAA;IAED,IAAI,CAAC,wBAAwB,EAAE,CAAC;QAC9B,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,gDAAgD,EAAE,IAAI,EAAE,kBAAkB,EAAE,CAAA;IAC5G,CAAC;IAED,OAAO,EAAE,KAAK,EAAE,IAAI,EAAE,cAAc,EAAE,UAAU,EAAE,CAAA;AACpD,CAAC;AAED;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,MAAM,UAAU,oBAAoB,CAAC,MAAc;IACjD,cAAc;IACd,IAAI,CAAC,MAAM,IAAI,MAAM,CAAC,IAAI,EAAE,KAAK,EAAE,EAAE,CAAC;QACpC,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,6BAA6B,EAAE,IAAI,EAAE,YAAY,EAAE,CAAA;IACnF,CAAC;IAED,kBAAkB;IAClB,MAAM,OAAO,GAAG,MAAM,CAAC,IAAI,EAAE,CAAA;IAE7B,iCAAiC;IACjC,MAAM,WAAW,GAAG,2BAA2B,CAAC,OAAO,CAAC,CAAA;IACxD,IAAI,WAAW,CAAC,SAAS,EAAE,CAAC;QAC1B,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,WAAW,CAAC,MAAM,EAAE,IAAI,EAAE,iBAAiB,EAAE,CAAA;IAC7E,CAAC;IAED,2BAA2B;IAC3B,IAAI,qBAAqB,CAAC,OAAO,CAAC,EAAE,CAAC;QACnC,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,yBAAyB,EAAE,IAAI,EAAE,gBAAgB,EAAE,CAAA;IACnF,CAAC;IAED,0BAA0B;IAC1B,IAAI,cAAc,CAAC,OAAO,CAAC,EAAE,CAAC;QAC5B,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,2BAA2B,EAAE,IAAI,EAAE,eAAe,EAAE,CAAA;IACpF,CAAC;IAED,2EAA2E;IAC3E,yCAAyC;IACzC,MAAM,cAAc,GAAG,qBAAqB,CAAA;IAC5C,IAAI,CAAC,cAAc,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;QAClC,OAAO,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,6CAA6C,EAAE,IAAI,EAAE,eAAe,EAAE,CAAA;IACtG,CAAC;IAED,qBAAqB;IACrB,MAAM,UAAU,GAAG,aAAa,CAAC,OAAO,CAAC,CAAA;IAEzC,oCAAoC;IACpC,MAAM,UAAU,GAAG,UAAU,CAAC,OAAO,CAAC,WAAW,EAAE,EAAE,CAAC,CAAA;IAEtD,OAAO,EAAE,KAAK,EAAE,IAAI,EAAE,cAAc,EAAE,UAAU,IAAI,UAAU,EAAE,CAAA;AAClE,CAAC;AAED;;;;;;;;;;;;;;;;GAgBG;AACH,MAAM,UAAU,qBAAqB,CAAC,OAAe;IACnD,MAAM,MAAM,GAAG,eAAe,CAAC,OAAO,CAAC,CAAA;IAEvC,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;QAClB,MAAM,IAAI,iBAAiB,CACzB,qBAAqB,MAAM,CAAC,KAAK,EAAE,EACnC,MAAM,CAAC,IAAI,CACZ,CAAA;IACH,CAAC;IAED,OAAO,MAAM,CAAC,cAAe,CAAA;AAC/B,CAAC;AAED;;;;;;GAMG;AACH,MAAM,UAAU,0BAA0B,CAAC,MAAc;IACvD,MAAM,MAAM,GAAG,oBAAoB,CAAC,MAAM,CAAC,CAAA;IAE3C,IAAI,CAAC,MAAM,CAAC,KAAK,EAAE,CAAC;QAClB,MAAM,IAAI,iBAAiB,CACzB,kCAAkC,MAAM,CAAC,KAAK,EAAE,EAChD,MAAM,CAAC,IAAI,CACZ,CAAA;IACH,CAAC;IAED,OAAO,MAAM,CAAC,cAAe,CAAA;AAC/B,CAAC"}
|
|
@@ -696,6 +696,12 @@ export declare function unpackObjects(packfile: Uint8Array, _store: ObjectStore,
|
|
|
696
696
|
* - Must not end with `.lock`
|
|
697
697
|
* - Components must not start with `.`
|
|
698
698
|
*
|
|
699
|
+
* Security considerations:
|
|
700
|
+
* - Prevents path traversal attacks via `../` sequences
|
|
701
|
+
* - Rejects absolute paths
|
|
702
|
+
* - Validates ref is within refs/ namespace or is HEAD
|
|
703
|
+
* - Blocks URL-encoded traversal attempts
|
|
704
|
+
*
|
|
699
705
|
* @param refName - Ref name to validate
|
|
700
706
|
* @returns true if the ref name is valid
|
|
701
707
|
*
|
|
@@ -706,6 +712,7 @@ export declare function unpackObjects(packfile: Uint8Array, _store: ObjectStore,
|
|
|
706
712
|
* validateRefName('refs/heads/.hidden') // false (starts with .)
|
|
707
713
|
* validateRefName('refs/heads/a..b') // false (contains ..)
|
|
708
714
|
* validateRefName('refs/heads/a b') // false (contains space)
|
|
715
|
+
* validateRefName('refs/../../../etc/passwd') // false (path traversal)
|
|
709
716
|
* ```
|
|
710
717
|
*/
|
|
711
718
|
export declare function validateRefName(refName: string): boolean;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"receive-pack.d.ts","sourceRoot":"","sources":["../../src/wire/receive-pack.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2CG;AAEH,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,kBAAkB,CAAA;
|
|
1
|
+
{"version":3,"file":"receive-pack.d.ts","sourceRoot":"","sources":["../../src/wire/receive-pack.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2CG;AAEH,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,kBAAkB,CAAA;AAQlD;;;;;;;;;;;;;;;;GAgBG;AACH,eAAO,MAAM,QAAQ,QAAiB,CAAA;AAatC;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,MAAM,WAAW,GAAG;IAClB,8CAA8C;IAC9C,IAAI,EAAE,MAAM,CAAA;IACZ,kDAAkD;IAClD,GAAG,EAAE,MAAM,CAAA;IACX,uDAAuD;IACvD,MAAM,CAAC,EAAE,MAAM,CAAA;CAChB;AAED;;;;;;;;;;;;;;;;;GAiBG;AACH,MAAM,WAAW,uBAAuB;IACtC,4CAA4C;IAC5C,YAAY,CAAC,EAAE,OAAO,CAAA;IACtB,sDAAsD;IACtD,cAAc,CAAC,EAAE,OAAO,CAAA;IACxB,kCAAkC;IAClC,UAAU,CAAC,EAAE,OAAO,CAAA;IACpB,iCAAiC;IACjC,KAAK,CAAC,EAAE,OAAO,CAAA;IACf,4CAA4C;IAC5C,MAAM,CAAC,EAAE,OAAO,CAAA;IAChB,6CAA6C;IAC7C,WAAW,CAAC,EAAE,OAAO,CAAA;IACrB,wCAAwC;IACxC,WAAW,CAAC,EAAE,OAAO,CAAA;IACrB,+CAA+C;IAC/C,QAAQ,CAAC,EAAE,MAAM,CAAA;IACjB,yCAAyC;IACzC,KAAK,CAAC,EAAE,MAAM,CAAA;CACf;AAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAM,WAAW,gBAAgB;IAC/B,+CAA+C;IAC/C,MAAM,EAAE,MAAM,CAAA;IACd,+CAA+C;IAC/C,MAAM,EAAE,MAAM,CAAA;IACd,8CAA8C;IAC9C,OAAO,EAAE,MAAM,CAAA;IACf,8CAA8C;IAC9C,IAAI,EAAE,QAAQ,GAAG,QAAQ,GAAG,QAAQ,CAAA;IACpC,oDAAoD;IACpD,YAAY,CAAC,EAAE,MAAM,EAAE,CAAA;CACxB;AAED;;;;;;;;;;;;;;;;GAgBG;AACH,MAAM,WAAW,eAAe;IAC9B,+BAA+B;IAC/B,OAAO,EAAE,MAAM,CAAA;IACf,mCAAmC;IACnC,OAAO,EAAE,OAAO,CAAA;IAChB,qCAAqC;IACrC,KAAK,CAAC,EAAE,MAAM,CAAA;IACd,6CAA6C;IAC7C,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,wCAAwC;IACxC,SAAS,CAAC,EAAE,MAAM,CAAA;IAClB,yDAAyD;IACzD,MAAM,CAAC,EAAE,OAAO,CAAA;CACjB;AAED;;;;;;GAMG;AACH,MAAM,WAAW,kBAAkB;IACjC,oCAAoC;IACpC,KAAK,EAAE,OAAO,CAAA;IACd,wCAAwC;IACxC,WAAW,CAAC,EAAE,MAAM,CAAA;IACpB,yCAAyC;IACzC,KAAK,CAAC,EAAE,MAAM,CAAA;CACf;AAED;;;;;;;;;GASG;AACH,MAAM,MAAM,kBAAkB,GAAG,aAAa,GAAG,QAAQ,GAAG,cAAc,GAAG,aAAa,CAAA;AAE1F;;;;;;GAMG;AACH,MAAM,WAAW,UAAU;IACzB,iCAAiC;IACjC,OAAO,EAAE,OAAO,CAAA;IAChB,kDAAkD;IAClD,OAAO,CAAC,EAAE,MAAM,CAAA;IAChB,0DAA0D;IAC1D,WAAW,CAAC,EAAE,OAAO,CAAA;IACrB,0DAA0D;IAC1D,WAAW,CAAC,EAAE,OAAO,CAAA;IACrB,uCAAuC;IACvC,OAAO,CAAC,EAAE,eAAe,EAAE,CAAA;CAC5B;AAED;;;;;;;;;;;;;GAaG;AACH,MAAM,WAAW,kBAAkB;IACjC,iDAAiD;IACjD,MAAM,EAAE,MAAM,CAAA;IACd,8BAA8B;IAC9B,YAAY,EAAE,uBAAuB,CAAA;IACrC,sCAAsC;IACtC,QAAQ,EAAE,gBAAgB,EAAE,CAAA;CAC7B;AAED;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,MAAM,WAAW,WAAW;IAC1B;;;;OAIG;IACH,SAAS,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC;QAAE,IAAI,EAAE,UAAU,CAAC;QAAC,IAAI,EAAE,UAAU,CAAA;KAAE,GAAG,IAAI,CAAC,CAAA;IAE9E;;;;OAIG;IACH,SAAS,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CAAA;IAExC;;;;OAIG;IACH,gBAAgB,CAAC,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,MAAM,EAAE,CAAC,CAAA;IAEhD;;;OAGG;IACH,OAAO,IAAI,OAAO,CAAC,GAAG,EAAE,CAAC,CAAA;IAEzB;;;;OAIG;IACH,MAAM,CAAC,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,GAAG,GAAG,IAAI,CAAC,CAAA;IAEzC;;;;OAIG;IACH,MAAM,CAAC,IAAI,EAAE,MAAM,EAAE,GAAG,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,CAAA;IAEhD;;;OAGG;IACH,SAAS,CAAC,IAAI,EAAE,MAAM,GAAG,OAAO,CAAC,IAAI,CAAC,CAAA;IAEtC;;;;;OAKG;IACH,WAAW,CAAC,GAAG,EAAE,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,EAAE,UAAU,GAAG,OAAO,CAAC,IAAI,CAAC,CAAA;IAEvE;;;;;OAKG;IACH,UAAU,CAAC,QAAQ,EAAE,MAAM,EAAE,UAAU,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CAAA;CACnE;AAED;;;;;;GAMG;AACH,MAAM,WAAW,kBAAkB;IACjC,0BAA0B;IAC1B,QAAQ,EAAE,gBAAgB,EAAE,CAAA;IAC5B,sCAAsC;IACtC,YAAY,EAAE,MAAM,EAAE,CAAA;IACtB,2BAA2B;IAC3B,QAAQ,EAAE,UAAU,CAAA;IACpB,wDAAwD;IACxD,WAAW,EAAE,MAAM,EAAE,CAAA;CACtB;AAED;;;;;GAKG;AACH,MAAM,WAAW,iBAAiB;IAChC,2DAA2D;IAC3D,YAAY,EAAE,MAAM,CAAA;IACpB,kCAAkC;IAClC,UAAU,EAAE,eAAe,EAAE,CAAA;IAC7B,gDAAgD;IAChD,OAAO,CAAC,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,CAAA;CACjC;AAED;;;;;GAKG;AACH,MAAM,WAAW,YAAY;IAC3B,kCAAkC;IAClC,OAAO,EAAE,OAAO,CAAA;IAChB,iCAAiC;IACjC,eAAe,EAAE,MAAM,CAAA;IACvB,+BAA+B;IAC/B,YAAY,EAAE,MAAM,EAAE,CAAA;IACtB,wCAAwC;IACxC,KAAK,CAAC,EAAE,MAAM,CAAA;CACf;AAED;;;;;GAKG;AACH,MAAM,WAAW,qBAAqB;IACpC,kCAAkC;IAClC,OAAO,EAAE,eAAe,EAAE,CAAA;CAC3B;AAED;;;;;;GAMG;AACH,MAAM,WAAW,qBAAqB;IACpC,oCAAoC;IACpC,OAAO,EAAE,OAAO,CAAA;IAChB,2BAA2B;IAC3B,OAAO,EAAE,eAAe,EAAE,CAAA;CAC3B;AAED;;;;;GAKG;AACH,MAAM,WAAW,qBAAqB;IACpC,uCAAuC;IACvC,OAAO,EAAE,OAAO,CAAA;IAChB,4CAA4C;IAC5C,MAAM,CAAC,EAAE,MAAM,CAAA;CAChB;AAED;;;;;GAKG;AACH,MAAM,WAAW,sBAAsB;IACrC,mCAAmC;IACnC,aAAa,CAAC,EAAE,MAAM,EAAE,CAAA;IACxB,oCAAoC;IACpC,kBAAkB,CAAC,EAAE,MAAM,EAAE,CAAA;CAC9B;AAED;;;;;GAKG;AACH,MAAM,WAAW,sBAAsB;IACrC,qCAAqC;IACrC,SAAS,CAAC,EAAE,OAAO,CAAA;CACpB;AAED;;;;;GAKG;AACH,MAAM,WAAW,yBAAyB;IACxC,4BAA4B;IAC5B,cAAc,CAAC,EAAE,OAAO,CAAA;IACxB,2BAA2B;IAC3B,UAAU,CAAC,EAAE,OAAO,CAAA;CACrB;AAED;;;;;GAKG;AACH,MAAM,WAAW,aAAa;IAC5B,4BAA4B;IAC5B,YAAY,CAAC,EAAE,OAAO,CAAA;IACtB,wBAAwB;IACxB,UAAU,CAAC,EAAE,CAAC,OAAO,EAAE,MAAM,KAAK,IAAI,CAAA;CACvC;AAED;;;;;GAKG;AACH,MAAM,WAAW,WAAW;IAC1B,8BAA8B;IAC9B,OAAO,CAAC,EAAE,MAAM,CAAA;IAChB,oCAAoC;IACpC,WAAW,CAAC,EAAE,MAAM,EAAE,CAAA;CACvB;AAMD;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,wBAAgB,4BAA4B,CAAC,YAAY,EAAE,uBAAuB,GAAG,MAAM,CAc1F;AAED;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,wBAAgB,wBAAwB,CAAC,UAAU,EAAE,MAAM,GAAG,uBAAuB,CAsBpF;AAMD;;;;;;;;;;;;;;;;GAgBG;AACH,wBAAgB,oBAAoB,CAAC,MAAM,EAAE,MAAM,GAAG,kBAAkB,CAMvE;AAMD;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,wBAAsB,oBAAoB,CACxC,KAAK,EAAE,WAAW,EAClB,YAAY,CAAC,EAAE,uBAAuB,GACrC,OAAO,CAAC,MAAM,CAAC,CAyDjB;AAMD;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,wBAAgB,gBAAgB,CAAC,IAAI,EAAE,MAAM,GAAG,gBAAgB,CA+C/D;AAqCD;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,wBAAgB,uBAAuB,CAAC,IAAI,EAAE,UAAU,GAAG,kBAAkB,CA+E5E;AAMD;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,wBAAsB,gBAAgB,CACpC,QAAQ,EAAE,UAAU,EACpB,OAAO,CAAC,EAAE,yBAAyB,GAClC,OAAO,CAAC,kBAAkB,CAAC,CA4D7B;AAED;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,wBAAsB,aAAa,CACjC,QAAQ,EAAE,UAAU,EACpB,MAAM,EAAE,WAAW,EACnB,OAAO,CAAC,EAAE,aAAa,GACtB,OAAO,CAAC,YAAY,CAAC,CAgDvB;AAMD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,wBAAgB,eAAe,CAAC,OAAO,EAAE,MAAM,GAAG,OAAO,CAoFxD;AAED;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,wBAAsB,mBAAmB,CACvC,MAAM,EAAE,MAAM,EACd,MAAM,EAAE,MAAM,EACd,KAAK,EAAE,WAAW,GACjB,OAAO,CAAC,OAAO,CAAC,CAalB;AAED;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,wBAAsB,mBAAmB,CACvC,OAAO,EAAE,MAAM,EACf,SAAS,EAAE,QAAQ,GAAG,QAAQ,GAAG,QAAQ,GAAG,cAAc,EAC1D,OAAO,EAAE,sBAAsB,GAC9B,OAAO,CAAC,qBAAqB,CAAC,CAwBhC;AAqBD;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,wBAAsB,eAAe,CACnC,OAAO,EAAE,kBAAkB,EAC3B,QAAQ,EAAE,gBAAgB,EAAE,EAC5B,KAAK,EAAE,WAAW,EAClB,OAAO,CAAC,EAAE,sBAAsB,GAC/B,OAAO,CAAC,qBAAqB,CAAC,CA2DhC;AAED;;;;;;;;;;;;;;;GAeG;AACH,wBAAsB,UAAU,CAC9B,QAAQ,EAAE,gBAAgB,EAAE,EAC5B,KAAK,EAAE,WAAW,GACjB,OAAO,CAAC,IAAI,CAAC,CAQf;AAED;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,wBAAsB,eAAe,CACnC,QAAQ,EAAE,gBAAgB,EAAE,EAC5B,KAAK,EAAE,WAAW,GACjB,OAAO,CAAC,qBAAqB,CAAC,CAsDhC;AAMD,KAAK,gBAAgB,GAAG,CACtB,QAAQ,EAAE,gBAAgB,EAAE,EAC5B,GAAG,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,KACxB,OAAO,CAAC,UAAU,CAAC,CAAA;AAExB,KAAK,YAAY,GAAG,CAClB,OAAO,EAAE,MAAM,EACf,MAAM,EAAE,MAAM,EACd,MAAM,EAAE,MAAM,EACd,GAAG,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,KACxB,OAAO,CAAC,UAAU,CAAC,CAAA;AAExB,KAAK,iBAAiB,GAAG,CACvB,QAAQ,EAAE,gBAAgB,EAAE,EAC5B,OAAO,EAAE,eAAe,EAAE,EAC1B,GAAG,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,KACxB,OAAO,CAAC,UAAU,CAAC,CAAA;AAExB,KAAK,gBAAgB,GAAG,CAAC,QAAQ,EAAE,MAAM,EAAE,KAAK,OAAO,CAAC,UAAU,CAAC,CAAA;AAEnE;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,wBAAsB,qBAAqB,CACzC,QAAQ,EAAE,gBAAgB,EAAE,EAC5B,MAAM,EAAE,WAAW,EACnB,MAAM,EAAE,gBAAgB,EACxB,GAAG,GAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAM,EAChC,OAAO,CAAC,EAAE,WAAW,GACpB,OAAO,CAAC,UAAU,CAAC,CAiBrB;AAED;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,wBAAsB,iBAAiB,CACrC,QAAQ,EAAE,gBAAgB,EAAE,EAC5B,MAAM,EAAE,WAAW,EACnB,MAAM,EAAE,YAAY,EACpB,GAAG,GAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAM,GAC/B,OAAO,CAAC;IAAE,OAAO,EAAE,eAAe,EAAE,CAAA;CAAE,CAAC,CAazC;AAED;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,wBAAsB,sBAAsB,CAC1C,QAAQ,EAAE,gBAAgB,EAAE,EAC5B,OAAO,EAAE,eAAe,EAAE,EAC1B,MAAM,EAAE,WAAW,EACnB,MAAM,EAAE,iBAAiB,EACzB,OAAO,CAAC,EAAE,WAAW,GACpB,OAAO,CAAC;IAAE,WAAW,EAAE,OAAO,CAAC;IAAC,WAAW,EAAE,OAAO,CAAA;CAAE,CAAC,CAmBzD;AAED;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,wBAAsB,qBAAqB,CACzC,SAAS,EAAE,gBAAgB,EAAE,EAC7B,OAAO,EAAE,eAAe,EAAE,EAC1B,MAAM,EAAE,gBAAgB,GACvB,OAAO,CAAC,IAAI,CAAC,CAQf;AAMD;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,wBAAgB,kBAAkB,CAAC,KAAK,EAAE,iBAAiB,GAAG,MAAM,CAoBnE;AAED;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,wBAAgB,oBAAoB,CAAC,KAAK,EAAE,iBAAiB,GAAG,MAAM,CA+BrE;AAED;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,wBAAgB,UAAU,CACxB,OAAO,EAAE,MAAM,EACf,MAAM,EAAE,MAAM,EACd,OAAO,EAAE;IAAE,YAAY,CAAC,EAAE,OAAO,CAAC;IAAC,QAAQ,CAAC,EAAE,OAAO,CAAA;CAAE,GACtD,MAAM,GAAG,UAAU,CAgBrB;AAMD;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,wBAAsB,iBAAiB,CACrC,OAAO,EAAE,kBAAkB,EAC3B,OAAO,EAAE,UAAU,EACnB,KAAK,EAAE,WAAW,GACjB,OAAO,CAAC,UAAU,CAAC,CA4GrB"}
|
|
@@ -43,6 +43,7 @@
|
|
|
43
43
|
* ```
|
|
44
44
|
*/
|
|
45
45
|
import { encodePktLine, FLUSH_PKT } from './pkt-line';
|
|
46
|
+
import { containsPathTraversal, isAbsolutePath, containsDangerousCharacters } from './path-security';
|
|
46
47
|
// ============================================================================
|
|
47
48
|
// Constants
|
|
48
49
|
// ============================================================================
|
|
@@ -624,6 +625,12 @@ export async function unpackObjects(packfile, _store, options) {
|
|
|
624
625
|
* - Must not end with `.lock`
|
|
625
626
|
* - Components must not start with `.`
|
|
626
627
|
*
|
|
628
|
+
* Security considerations:
|
|
629
|
+
* - Prevents path traversal attacks via `../` sequences
|
|
630
|
+
* - Rejects absolute paths
|
|
631
|
+
* - Validates ref is within refs/ namespace or is HEAD
|
|
632
|
+
* - Blocks URL-encoded traversal attempts
|
|
633
|
+
*
|
|
627
634
|
* @param refName - Ref name to validate
|
|
628
635
|
* @returns true if the ref name is valid
|
|
629
636
|
*
|
|
@@ -634,6 +641,7 @@ export async function unpackObjects(packfile, _store, options) {
|
|
|
634
641
|
* validateRefName('refs/heads/.hidden') // false (starts with .)
|
|
635
642
|
* validateRefName('refs/heads/a..b') // false (contains ..)
|
|
636
643
|
* validateRefName('refs/heads/a b') // false (contains space)
|
|
644
|
+
* validateRefName('refs/../../../etc/passwd') // false (path traversal)
|
|
637
645
|
* ```
|
|
638
646
|
*/
|
|
639
647
|
export function validateRefName(refName) {
|
|
@@ -641,6 +649,26 @@ export function validateRefName(refName) {
|
|
|
641
649
|
if (!refName || refName.length === 0) {
|
|
642
650
|
return false;
|
|
643
651
|
}
|
|
652
|
+
// SECURITY: Check for path traversal attacks
|
|
653
|
+
if (containsPathTraversal(refName)) {
|
|
654
|
+
return false;
|
|
655
|
+
}
|
|
656
|
+
// SECURITY: Check for absolute paths
|
|
657
|
+
if (isAbsolutePath(refName)) {
|
|
658
|
+
return false;
|
|
659
|
+
}
|
|
660
|
+
// SECURITY: Check for dangerous characters (null bytes, control chars)
|
|
661
|
+
const dangerCheck = containsDangerousCharacters(refName);
|
|
662
|
+
if (dangerCheck.dangerous) {
|
|
663
|
+
return false;
|
|
664
|
+
}
|
|
665
|
+
// SECURITY: Validate ref prefix (must start with refs/ or be HEAD)
|
|
666
|
+
// This ensures refs can't escape to arbitrary filesystem paths
|
|
667
|
+
const validPrefixes = ['refs/', 'HEAD'];
|
|
668
|
+
const hasValidPrefix = validPrefixes.some(prefix => refName === prefix.replace(/\/$/, '') || refName.startsWith(prefix));
|
|
669
|
+
if (!hasValidPrefix) {
|
|
670
|
+
return false;
|
|
671
|
+
}
|
|
644
672
|
// Must not start or end with slash
|
|
645
673
|
if (refName.startsWith('/') || refName.endsWith('/')) {
|
|
646
674
|
return false;
|
|
@@ -649,7 +677,7 @@ export function validateRefName(refName) {
|
|
|
649
677
|
if (refName.includes('//')) {
|
|
650
678
|
return false;
|
|
651
679
|
}
|
|
652
|
-
// Must not contain double dots
|
|
680
|
+
// Must not contain double dots (already caught by containsPathTraversal, but explicit)
|
|
653
681
|
if (refName.includes('..')) {
|
|
654
682
|
return false;
|
|
655
683
|
}
|