Merge "Merge branch 'stable-3.3' into stable-3.4" into stable-3.4
This commit is contained in:
@@ -296,14 +296,32 @@ The change that fixes the security vulnerability should contain an integration
|
||||
test that verifies that the security vulnerability is no longer present.
|
||||
+
|
||||
Review and approval of the security fixes must be done by the Gerrit
|
||||
maintainers. Verifications must be done manually since the Gerrit CI doesn't
|
||||
build and test changes of the `gerrit-security-fixes` repository (and it
|
||||
shouldn't because everything on the CI server is public which would break
|
||||
the embargo).
|
||||
maintainers.
|
||||
+
|
||||
Once a security fix is ready and submitted, it should be cherry-picked to all
|
||||
branches that should be fixed.
|
||||
|
||||
. CI validation of the security fix:
|
||||
+
|
||||
The validation of the security fixes does not happen on the regular Gerrit CI,
|
||||
because it would compromise the confidentiality of the fix and therefore break
|
||||
the embargo.
|
||||
+
|
||||
The release manager maintains a private branch on the
|
||||
link:https://gerrit-review.googlesource.com/admin/repos/gerrit-ci-scripts[gerrit-ci-scripts,role=external,window=_blank] repository
|
||||
which contains a special build pipeline with special visibility restrictions.
|
||||
+
|
||||
The validation process provides feedback, in terms of Code-Style, Verification
|
||||
and Checks, to the incoming security changes. The links associated
|
||||
with the build logs are exposed over the Internet but their access limited
|
||||
to only those who are actively participating in the development and review of
|
||||
the security fix.
|
||||
+
|
||||
The maintainers that are willing to access the links to the CI logs need
|
||||
to request a time-limited (maximum 30 days) nominal X.509 certificate from a
|
||||
CI maintainer, which allows to access the build logs and analyze failures.
|
||||
The release manager may help obtaining that certificate from CI maintainers.
|
||||
|
||||
. Creation of fixed releases and announcement of the security vulnerability:
|
||||
+
|
||||
A release manager should create new bug fix releases for all fixed branches.
|
||||
|
||||
@@ -477,8 +477,9 @@ class OpenIdServiceImpl {
|
||||
final StringBuilder rdr = new StringBuilder();
|
||||
rdr.append(urlProvider.get(req));
|
||||
String nextToken = Url.decode(token);
|
||||
if (isNew && !token.startsWith(PageLinks.REGISTER + "/")) {
|
||||
rdr.append('#' + PageLinks.REGISTER);
|
||||
String registerUri = PageLinks.REGISTER + "/";
|
||||
if (isNew && !token.startsWith(registerUri)) {
|
||||
rdr.append('#' + registerUri);
|
||||
if (nextToken.startsWith("#")) {
|
||||
// Need to strip the leading # off the token to fix registration page redirect
|
||||
nextToken = nextToken.substring(1);
|
||||
|
||||
@@ -0,0 +1,42 @@
|
||||
// Copyright (C) 2021 The Android Open Source Project
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
package com.google.gerrit.sshd;
|
||||
|
||||
import com.google.common.flogger.FluentLogger;
|
||||
import com.google.inject.Singleton;
|
||||
import java.io.IOException;
|
||||
import org.apache.sshd.common.Service;
|
||||
import org.apache.sshd.common.session.Session;
|
||||
import org.apache.sshd.common.session.SessionDisconnectHandler;
|
||||
|
||||
@Singleton
|
||||
public class LogMaxConnectionsPerUserExceeded implements SessionDisconnectHandler {
|
||||
private static final FluentLogger logger = FluentLogger.forEnclosingClass();
|
||||
|
||||
@Override
|
||||
public boolean handleSessionsCountDisconnectReason(
|
||||
Session session,
|
||||
Service service,
|
||||
String username,
|
||||
int currentSessionCount,
|
||||
int maxSessionCount)
|
||||
throws IOException {
|
||||
logger.atWarning().log(
|
||||
"Max connection count for user %s exceeded, rejecting new connection."
|
||||
+ " currentSessionCount = %d, maxSessionCount = %d",
|
||||
username, currentSessionCount, maxSessionCount);
|
||||
return false;
|
||||
}
|
||||
}
|
||||
@@ -27,10 +27,14 @@ import java.io.InputStream;
|
||||
import java.io.OutputStream;
|
||||
import java.net.MalformedURLException;
|
||||
import java.net.URL;
|
||||
import org.apache.sshd.common.io.IoInputStream;
|
||||
import org.apache.sshd.common.io.IoOutputStream;
|
||||
import org.apache.sshd.common.util.buffer.ByteArrayBuffer;
|
||||
import org.apache.sshd.server.Environment;
|
||||
import org.apache.sshd.server.ExitCallback;
|
||||
import org.apache.sshd.server.SessionAware;
|
||||
import org.apache.sshd.server.channel.ChannelSession;
|
||||
import org.apache.sshd.server.command.AsyncCommand;
|
||||
import org.apache.sshd.server.command.Command;
|
||||
import org.apache.sshd.server.session.ServerSession;
|
||||
import org.apache.sshd.server.shell.ShellFactory;
|
||||
@@ -56,13 +60,19 @@ class NoShell implements ShellFactory {
|
||||
return shell.get();
|
||||
}
|
||||
|
||||
static class SendMessage implements Command, SessionAware {
|
||||
/**
|
||||
* When AsyncCommand is implemented by a command as below, the usual blocking streams aren't set.
|
||||
*
|
||||
* @see org.apache.sshd.server.command.AsyncCommand
|
||||
*/
|
||||
static class SendMessage implements AsyncCommand, SessionAware {
|
||||
private final Provider<MessageFactory> messageFactory;
|
||||
private final SshScope sshScope;
|
||||
|
||||
private InputStream in;
|
||||
private OutputStream out;
|
||||
private OutputStream err;
|
||||
private IoInputStream in;
|
||||
private IoOutputStream out;
|
||||
private IoOutputStream err;
|
||||
|
||||
private ExitCallback exit;
|
||||
private Context context;
|
||||
|
||||
@@ -73,20 +83,35 @@ class NoShell implements ShellFactory {
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setInputStream(InputStream in) {
|
||||
public void setIoInputStream(IoInputStream in) {
|
||||
this.in = in;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setOutputStream(OutputStream out) {
|
||||
public void setIoOutputStream(IoOutputStream out) {
|
||||
this.out = out;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setErrorStream(OutputStream err) {
|
||||
public void setIoErrorStream(IoOutputStream err) {
|
||||
this.err = err;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setInputStream(InputStream in) {
|
||||
// ignored
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setOutputStream(OutputStream out) {
|
||||
// ignore
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setErrorStream(OutputStream err) {
|
||||
// ignore
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setExitCallback(ExitCallback callback) {
|
||||
this.exit = callback;
|
||||
@@ -107,8 +132,7 @@ class NoShell implements ShellFactory {
|
||||
} finally {
|
||||
sshScope.set(old);
|
||||
}
|
||||
err.write(Constants.encode(message));
|
||||
err.flush();
|
||||
err.writeBuffer(new ByteArrayBuffer(Constants.encode(message)));
|
||||
|
||||
in.close();
|
||||
out.close();
|
||||
|
||||
@@ -162,7 +162,8 @@ public class SshDaemon extends SshServer implements SshInfo, LifecycleListener {
|
||||
SshLog sshLog,
|
||||
@SshListenAddresses List<SocketAddress> listen,
|
||||
@SshAdvertisedAddresses List<String> advertised,
|
||||
MetricMaker metricMaker) {
|
||||
MetricMaker metricMaker,
|
||||
LogMaxConnectionsPerUserExceeded logMaxConnectionsPerUserExceeded) {
|
||||
setPort(IANA_SSH_PORT /* never used */);
|
||||
|
||||
this.cfg = cfg;
|
||||
@@ -235,6 +236,7 @@ public class SshDaemon extends SshServer implements SshInfo, LifecycleListener {
|
||||
setKeyPairProvider(hostKeyProvider);
|
||||
setCommandFactory(commandFactory);
|
||||
setShellFactory(noShell);
|
||||
setSessionDisconnectHandler(logMaxConnectionsPerUserExceeded);
|
||||
|
||||
final AtomicInteger connected = new AtomicInteger();
|
||||
metricMaker.newCallbackMetric(
|
||||
|
||||
@@ -5,3 +5,9 @@ acceptance_tests(
|
||||
group = "peer-keys-auth",
|
||||
labels = ["ssh"],
|
||||
)
|
||||
|
||||
acceptance_tests(
|
||||
srcs = ["NoShellIT.java"],
|
||||
group = "no-shell",
|
||||
labels = ["ssh"],
|
||||
)
|
||||
|
||||
96
javatests/com/google/gerrit/integration/ssh/NoShellIT.java
Normal file
96
javatests/com/google/gerrit/integration/ssh/NoShellIT.java
Normal file
@@ -0,0 +1,96 @@
|
||||
// Copyright (C) 2021 The Android Open Source Project
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
package com.google.gerrit.integration.ssh;
|
||||
|
||||
import static com.google.common.truth.Truth.assertThat;
|
||||
import static com.google.gerrit.testing.GerritJUnit.assertThrows;
|
||||
import static java.nio.charset.StandardCharsets.UTF_8;
|
||||
|
||||
import com.google.common.collect.ImmutableList;
|
||||
import com.google.common.collect.ImmutableMap;
|
||||
import com.google.gerrit.acceptance.GerritServer.TestSshServerAddress;
|
||||
import com.google.gerrit.acceptance.NoHttpd;
|
||||
import com.google.gerrit.acceptance.StandaloneSiteTest;
|
||||
import com.google.gerrit.acceptance.UseSsh;
|
||||
import com.google.gerrit.extensions.api.GerritApi;
|
||||
import com.google.inject.Inject;
|
||||
import java.io.IOException;
|
||||
import java.net.InetSocketAddress;
|
||||
import org.junit.Test;
|
||||
|
||||
@NoHttpd
|
||||
@UseSsh
|
||||
public class NoShellIT extends StandaloneSiteTest {
|
||||
private static final String[] SSH_KEYGEN_CMD =
|
||||
new String[] {"ssh-keygen", "-t", "rsa", "-q", "-P", "", "-f"};
|
||||
|
||||
@Inject private GerritApi gApi;
|
||||
@Inject private @TestSshServerAddress InetSocketAddress sshAddress;
|
||||
|
||||
private String identityPath;
|
||||
|
||||
@Test(timeout = 30000)
|
||||
public void verifyCommandsIsClosed() throws Exception {
|
||||
try (ServerContext ctx = startServer()) {
|
||||
setUpTestHarness(ctx);
|
||||
|
||||
IOException thrown = assertThrows(IOException.class, () -> execute(cmd()));
|
||||
assertThat(thrown)
|
||||
.hasMessageThat()
|
||||
.contains("Hi Administrator, you have successfully connected over SSH.");
|
||||
}
|
||||
}
|
||||
|
||||
private void setUpTestHarness(ServerContext ctx) throws Exception {
|
||||
ctx.getInjector().injectMembers(this);
|
||||
setUpAuthentication();
|
||||
identityPath = sitePaths.data_dir.resolve(String.format("id_rsa_%s", "admin")).toString();
|
||||
}
|
||||
|
||||
private void setUpAuthentication() throws Exception {
|
||||
execute(
|
||||
ImmutableList.<String>builder()
|
||||
.add(SSH_KEYGEN_CMD)
|
||||
.add(String.format("id_rsa_%s", "admin"))
|
||||
.build());
|
||||
gApi.accounts()
|
||||
.id("admin")
|
||||
.addSshKey(
|
||||
new String(
|
||||
java.nio.file.Files.readAllBytes(
|
||||
sitePaths.data_dir.resolve(String.format("id_rsa_%s.pub", "admin"))),
|
||||
UTF_8));
|
||||
}
|
||||
|
||||
private ImmutableList<String> cmd() {
|
||||
return ImmutableList.<String>builder()
|
||||
.add("ssh")
|
||||
.add("-tt")
|
||||
.add("-o")
|
||||
.add("StrictHostKeyChecking=no")
|
||||
.add("-o")
|
||||
.add("UserKnownHostsFile=/dev/null")
|
||||
.add("-p")
|
||||
.add(String.valueOf(sshAddress.getPort()))
|
||||
.add("admin@" + sshAddress.getHostName())
|
||||
.add("-i")
|
||||
.add(identityPath)
|
||||
.build();
|
||||
}
|
||||
|
||||
private String execute(ImmutableList<String> cmd) throws Exception {
|
||||
return execute(cmd, sitePaths.data_dir.toFile(), ImmutableMap.of());
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user