test_generate_filename.py 9.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249
  1. import os
  2. from django.core.exceptions import SuspiciousFileOperation
  3. from django.core.files.base import ContentFile
  4. from django.core.files.storage import FileSystemStorage, Storage
  5. from django.db.models import FileField
  6. from django.test import SimpleTestCase
  7. class AWSS3Storage(Storage):
  8. """
  9. Simulate an AWS S3 storage which uses Unix-like paths and allows any
  10. characters in file names but where there aren't actual folders but just
  11. keys.
  12. """
  13. prefix = "mys3folder/"
  14. def _save(self, name, content):
  15. """
  16. This method is important to test that Storage.save() doesn't replace
  17. '\' with '/' (rather FileSystemStorage.save() does).
  18. """
  19. return name
  20. def get_valid_name(self, name):
  21. return name
  22. def get_available_name(self, name, max_length=None):
  23. return name
  24. def generate_filename(self, filename):
  25. """
  26. This is the method that's important to override when using S3 so that
  27. os.path() isn't called, which would break S3 keys.
  28. """
  29. return self.prefix + self.get_valid_name(filename)
  30. class StorageGenerateFilenameTests(SimpleTestCase):
  31. """Tests for base Storage's generate_filename method."""
  32. storage_class = Storage
  33. def test_valid_names(self):
  34. storage = self.storage_class()
  35. name = "UnTRIVíAL @fil$ena#me!"
  36. valid_name = storage.get_valid_name(name)
  37. candidates = [
  38. (name, valid_name),
  39. (f"././././././{name}", valid_name),
  40. (f"some/path/{name}", f"some/path/{valid_name}"),
  41. (f"some/./path/./{name}", f"some/path/{valid_name}"),
  42. (f"././some/././path/./{name}", f"some/path/{valid_name}"),
  43. (f".\\.\\.\\.\\.\\.\\{name}", valid_name),
  44. (f"some\\path\\{name}", f"some/path/{valid_name}"),
  45. (f"some\\.\\path\\.\\{name}", f"some/path/{valid_name}"),
  46. (f".\\.\\some\\.\\.\\path\\.\\{name}", f"some/path/{valid_name}"),
  47. ]
  48. for name, expected in candidates:
  49. with self.subTest(name=name):
  50. result = storage.generate_filename(name)
  51. self.assertEqual(result, os.path.normpath(expected))
  52. class FileSystemStorageGenerateFilenameTests(StorageGenerateFilenameTests):
  53. storage_class = FileSystemStorage
  54. class GenerateFilenameStorageTests(SimpleTestCase):
  55. def test_storage_dangerous_paths(self):
  56. candidates = [
  57. ("/tmp/..", ".."),
  58. ("\\tmp\\..", ".."),
  59. ("/tmp/.", "."),
  60. ("\\tmp\\.", "."),
  61. ("..", ".."),
  62. (".", "."),
  63. ("", ""),
  64. ]
  65. s = FileSystemStorage()
  66. s_overwrite = FileSystemStorage(allow_overwrite=True)
  67. msg = "Could not derive file name from '%s'"
  68. for file_name, base_name in candidates:
  69. with self.subTest(file_name=file_name):
  70. with self.assertRaisesMessage(SuspiciousFileOperation, msg % base_name):
  71. s.get_available_name(file_name)
  72. with self.assertRaisesMessage(SuspiciousFileOperation, msg % base_name):
  73. s_overwrite.get_available_name(file_name)
  74. with self.assertRaisesMessage(SuspiciousFileOperation, msg % base_name):
  75. s.generate_filename(file_name)
  76. def test_storage_dangerous_paths_dir_name(self):
  77. candidates = [
  78. ("../path", ".."),
  79. ("..\\path", ".."),
  80. ("tmp/../path", "tmp/.."),
  81. ("tmp\\..\\path", "tmp/.."),
  82. ("/tmp/../path", "/tmp/.."),
  83. ("\\tmp\\..\\path", "/tmp/.."),
  84. ]
  85. s = FileSystemStorage()
  86. s_overwrite = FileSystemStorage(allow_overwrite=True)
  87. for file_name, path in candidates:
  88. msg = "Detected path traversal attempt in '%s'" % path
  89. with self.subTest(file_name=file_name):
  90. with self.assertRaisesMessage(SuspiciousFileOperation, msg):
  91. s.get_available_name(file_name)
  92. with self.assertRaisesMessage(SuspiciousFileOperation, msg):
  93. s_overwrite.get_available_name(file_name)
  94. with self.assertRaisesMessage(SuspiciousFileOperation, msg):
  95. s.generate_filename(file_name)
  96. def test_filefield_dangerous_filename(self):
  97. candidates = [
  98. ("..", "some/folder/.."),
  99. (".", "some/folder/."),
  100. ("", "some/folder/"),
  101. ("???", "???"),
  102. ("$.$.$", "$.$.$"),
  103. ]
  104. f = FileField(upload_to="some/folder/")
  105. for file_name, msg_file_name in candidates:
  106. msg = f"Could not derive file name from '{msg_file_name}'"
  107. with self.subTest(file_name=file_name):
  108. with self.assertRaisesMessage(SuspiciousFileOperation, msg):
  109. f.generate_filename(None, file_name)
  110. def test_filefield_dangerous_filename_dot_segments(self):
  111. f = FileField(upload_to="some/folder/")
  112. msg = "Detected path traversal attempt in 'some/folder/../path'"
  113. with self.assertRaisesMessage(SuspiciousFileOperation, msg):
  114. f.generate_filename(None, "../path")
  115. def test_filefield_generate_filename_absolute_path(self):
  116. f = FileField(upload_to="some/folder/")
  117. candidates = [
  118. "/tmp/path",
  119. "/tmp/../path",
  120. ]
  121. for file_name in candidates:
  122. msg = f"Detected path traversal attempt in '{file_name}'"
  123. with self.subTest(file_name=file_name):
  124. with self.assertRaisesMessage(SuspiciousFileOperation, msg):
  125. f.generate_filename(None, file_name)
  126. def test_filefield_generate_filename(self):
  127. f = FileField(upload_to="some/folder/")
  128. self.assertEqual(
  129. f.generate_filename(None, "test with space.txt"),
  130. os.path.normpath("some/folder/test_with_space.txt"),
  131. )
  132. def test_filefield_generate_filename_with_upload_to(self):
  133. def upload_to(instance, filename):
  134. return "some/folder/" + filename
  135. f = FileField(upload_to=upload_to)
  136. self.assertEqual(
  137. f.generate_filename(None, "test with space.txt"),
  138. os.path.normpath("some/folder/test_with_space.txt"),
  139. )
  140. def test_filefield_generate_filename_upload_to_overrides_dangerous_filename(self):
  141. def upload_to(instance, filename):
  142. return "test.txt"
  143. f = FileField(upload_to=upload_to)
  144. candidates = [
  145. "/tmp/.",
  146. "/tmp/..",
  147. "/tmp/../path",
  148. "/tmp/path",
  149. "some/folder/",
  150. "some/folder/.",
  151. "some/folder/..",
  152. "some/folder/???",
  153. "some/folder/$.$.$",
  154. "some/../test.txt",
  155. "",
  156. ]
  157. for file_name in candidates:
  158. with self.subTest(file_name=file_name):
  159. self.assertEqual(f.generate_filename(None, file_name), "test.txt")
  160. def test_filefield_generate_filename_upload_to_absolute_path(self):
  161. def upload_to(instance, filename):
  162. return "/tmp/" + filename
  163. f = FileField(upload_to=upload_to)
  164. candidates = [
  165. "path",
  166. "../path",
  167. "???",
  168. "$.$.$",
  169. ]
  170. for file_name in candidates:
  171. msg = f"Detected path traversal attempt in '/tmp/{file_name}'"
  172. with self.subTest(file_name=file_name):
  173. with self.assertRaisesMessage(SuspiciousFileOperation, msg):
  174. f.generate_filename(None, file_name)
  175. def test_filefield_generate_filename_upload_to_dangerous_filename(self):
  176. def upload_to(instance, filename):
  177. return "/tmp/" + filename
  178. f = FileField(upload_to=upload_to)
  179. candidates = ["..", ".", ""]
  180. for file_name in candidates:
  181. msg = f"Could not derive file name from '/tmp/{file_name}'"
  182. with self.subTest(file_name=file_name):
  183. with self.assertRaisesMessage(SuspiciousFileOperation, msg):
  184. f.generate_filename(None, file_name)
  185. def test_filefield_awss3_storage(self):
  186. """
  187. Simulate a FileField with an S3 storage which uses keys rather than
  188. folders and names. FileField and Storage shouldn't have any os.path()
  189. calls that break the key.
  190. """
  191. storage = AWSS3Storage()
  192. folder = "not/a/folder/"
  193. f = FileField(upload_to=folder, storage=storage)
  194. key = "my-file-key\\with odd characters"
  195. data = ContentFile("test")
  196. expected_key = AWSS3Storage.prefix + folder + key
  197. # Simulate call to f.save()
  198. result_key = f.generate_filename(None, key)
  199. self.assertEqual(result_key, expected_key)
  200. result_key = storage.save(result_key, data)
  201. self.assertEqual(result_key, expected_key)
  202. # Repeat test with a callable.
  203. def upload_to(instance, filename):
  204. # Return a non-normalized path on purpose.
  205. return folder + filename
  206. f = FileField(upload_to=upload_to, storage=storage)
  207. # Simulate call to f.save()
  208. result_key = f.generate_filename(None, key)
  209. self.assertEqual(result_key, expected_key)
  210. result_key = storage.save(result_key, data)
  211. self.assertEqual(result_key, expected_key)