fix: Remove ability to use GET for RPC API requests by default (#4042)

* fix: Remove ability to use GET for RPC API requests by default

* tsc
This commit is contained in:
Tom Moor
2022-09-02 10:05:40 +02:00
committed by GitHub
parent 2d29f0f042
commit c85f3bd7b4
10 changed files with 85 additions and 31 deletions

View File

@@ -7,6 +7,7 @@ import { AuthorizationError, ValidationError } from "@server/errors";
import auth from "@server/middlewares/authentication";
import { Attachment, Document, Event } from "@server/models";
import { authorize } from "@server/policies";
import { ContextWithState } from "@server/types";
import {
getPresignedPost,
publicS3Endpoint,
@@ -145,9 +146,10 @@ router.post("attachments.delete", auth(), async (ctx) => {
};
});
router.post("attachments.redirect", auth(), async (ctx) => {
const { id } = ctx.body;
const handleAttachmentsRedirect = async (ctx: ContextWithState) => {
const { id } = ctx.body as { id?: string };
assertUuid(id, "id is required");
const { user } = ctx.state;
const attachment = await Attachment.findByPk(id, {
rejectOnEmpty: true,
@@ -163,6 +165,9 @@ router.post("attachments.redirect", auth(), async (ctx) => {
} else {
ctx.redirect(attachment.canonicalUrl);
}
});
};
router.get("attachments.redirect", auth(), handleAttachmentsRedirect);
router.post("attachments.redirect", auth(), handleAttachmentsRedirect);
export default router;

View File

@@ -40,9 +40,11 @@ const cronHandler = async (ctx: Context) => {
};
};
router.get("cron.:period", cronHandler);
router.post("cron.:period", cronHandler);
// For backwards compatibility
router.get("utils.gc", cronHandler);
router.post("utils.gc", cronHandler);
export default router;

View File

@@ -14,6 +14,7 @@ import {
NotFoundError,
InvalidRequestError,
AuthenticationError,
ValidationError,
} from "@server/errors";
import auth from "@server/middlewares/authentication";
import {
@@ -478,8 +479,10 @@ router.post("documents.restore", auth({ member: true }), async (ctx) => {
// be caught as a 403 on the authorize call below. Otherwise we're checking here
// that the original collection still exists and advising to pass collectionId
// if not.
if (!collectionId) {
assertPresent(collection, "collectionId is required");
if (!collectionId && !collection) {
throw ValidationError(
"Unable to restore to original collection, it may have been deleted"
);
}
authorize(user, "update", collection);

View File

@@ -17,3 +17,10 @@ describe("GET unknown endpoint", () => {
expect(res.status).toEqual(404);
});
});
describe("PATCH unknown endpoint", () => {
it("should be method not allowed", async () => {
const res = await server.patch("/api/blah");
expect(res.status).toEqual(405);
});
});

View File

@@ -1,4 +1,4 @@
import Koa from "koa";
import Koa, { DefaultContext, DefaultState } from "koa";
import bodyParser from "koa-body";
import Router from "koa-router";
import env from "@server/env";
@@ -6,6 +6,7 @@ import { NotFoundError } from "@server/errors";
import errorHandling from "@server/middlewares/errorHandling";
import methodOverride from "@server/middlewares/methodOverride";
import { defaultRateLimiter } from "@server/middlewares/rateLimiter";
import { AuthenticatedState } from "@server/types";
import apiKeys from "./apiKeys";
import attachments from "./attachments";
import auth from "./auth";
@@ -33,7 +34,10 @@ import users from "./users";
import views from "./views";
import webhookSubscriptions from "./webhookSubscriptions";
const api = new Koa();
const api = new Koa<
DefaultState & AuthenticatedState,
DefaultContext & { body: Record<string, any> }
>();
const router = new Router();
// middlewares
@@ -83,10 +87,15 @@ router.post("*", (ctx) => {
ctx.throw(NotFoundError("Endpoint not found"));
});
router.get("*", (ctx) => {
ctx.throw(NotFoundError("Endpoint not found"));
});
api.use(defaultRateLimiter());
// Router is embedded in a Koa application wrapper, because koa-router does not
// allow middleware to catch any routes which were not explicitly defined.
api.use(router.routes());
api.use(router.allowedMethods());
export default api;

View File

@@ -4,6 +4,7 @@ import auth from "@server/middlewares/authentication";
import { Team, NotificationSetting } from "@server/models";
import { authorize } from "@server/policies";
import { presentNotificationSetting } from "@server/presenters";
import { ContextWithState } from "@server/types";
import { assertPresent, assertUuid } from "@server/validation";
const router = new Router();
@@ -55,8 +56,8 @@ router.post("notificationSettings.delete", auth(), async (ctx) => {
};
});
router.post("notificationSettings.unsubscribe", async (ctx) => {
const { id, token } = ctx.body;
const handleUnsubscribe = async (ctx: ContextWithState) => {
const { id, token } = ctx.body as { id?: string; token?: string };
assertUuid(id, "id is required");
assertPresent(token, "token is required");
@@ -77,6 +78,9 @@ router.post("notificationSettings.unsubscribe", async (ctx) => {
}
ctx.redirect(`${env.URL}?notice=invalid-auth`);
});
};
router.get("notificationSettings.unsubscribe", handleUnsubscribe);
router.post("notificationSettings.unsubscribe", handleUnsubscribe);
export default router;