X-Git-Url: http://source.bookstackapp.com/bookstack/blobdiff_plain/57ea2e92ec07d4682466857d27bd706a30e39652..refs/pull/3032/head:/tests/Entity/ExportTest.php diff --git a/tests/Entity/ExportTest.php b/tests/Entity/ExportTest.php index f437904e8..c8397b695 100644 --- a/tests/Entity/ExportTest.php +++ b/tests/Entity/ExportTest.php @@ -1,5 +1,8 @@ -first(); @@ -133,7 +135,7 @@ class ExportTest extends TestCase { $page = Page::query()->first(); - $customHeadContent = ""; + $customHeadContent = ''; $this->setSettings(['app-custom-head' => $customHeadContent]); $resp = $this->asEditor()->get($page->getUrl('/export/html')); @@ -144,7 +146,7 @@ class ExportTest extends TestCase { $page = Page::query()->first(); - $customHeadContent = ""; + $customHeadContent = ''; $this->setSettings(['app-custom-head' => $customHeadContent]); $resp = $this->asEditor()->get($page->getUrl('/export/html')); @@ -209,8 +211,8 @@ class ExportTest extends TestCase { $page = Page::query()->first(); $page->html = '' - .'' - .''; + . '' + . ''; $storageDisk = Storage::disk('local'); $storageDisk->makeDirectory('uploads/images/gallery'); $storageDisk->put('uploads/images/gallery/svg_test.svg', 'good'); @@ -227,6 +229,34 @@ class ExportTest extends TestCase $resp->assertSee('src="/uploads/svg_test.svg"'); } + public function test_page_export_contained_html_does_not_allow_upward_traversal_with_local() + { + $contents = file_get_contents(public_path('.htaccess')); + config()->set('filesystems.images', 'local'); + + $page = Page::query()->first(); + $page->html = ''; + $page->save(); + + $resp = $this->asEditor()->get($page->getUrl('/export/html')); + $resp->assertDontSee(base64_encode($contents)); + } + + public function test_page_export_contained_html_does_not_allow_upward_traversal_with_local_secure() + { + $testFilePath = storage_path('logs/test.txt'); + config()->set('filesystems.images', 'local_secure'); + file_put_contents($testFilePath, 'I am a cat'); + + $page = Page::query()->first(); + $page->html = ''; + $page->save(); + + $resp = $this->asEditor()->get($page->getUrl('/export/html')); + $resp->assertDontSee(base64_encode('I am a cat')); + unlink($testFilePath); + } + public function test_exports_removes_scripts_from_custom_head() { $entities = [ @@ -273,7 +303,7 @@ class ExportTest extends TestCase { $page = Page::query()->first()->forceFill([ 'markdown' => '# A header', - 'html' => '

Dogcat

', + 'html' => '

Dogcat

', ]); $page->save(); @@ -286,7 +316,7 @@ class ExportTest extends TestCase { $page = Page::query()->first()->forceFill([ 'markdown' => '', - 'html' => "

Dogcat

Some bold text

", + 'html' => '

Dogcat

Some bold text

', ]); $page->save(); @@ -298,7 +328,7 @@ class ExportTest extends TestCase { $page = Page::query()->first()->forceFill([ 'markdown' => '', - 'html' => "

Dogcat

Some callout text

Another line

", + 'html' => '

Dogcat

Some callout text

Another line

', ]); $page->save(); @@ -310,7 +340,7 @@ class ExportTest extends TestCase { $page = Page::query()->first()->forceFill([ 'markdown' => '', - 'html' => '

Dogcat

'."\r\n".'
var a = \'cat\';

Another line

', + 'html' => '

Dogcat

' . "\r\n" . '
var a = \'cat\';

Another line

', ]); $page->save(); @@ -340,4 +370,44 @@ class ExportTest extends TestCase $resp->assertSee('# ' . $page->name); } + public function test_export_option_only_visible_and_accessible_with_permission() + { + $book = Book::query()->whereHas('pages')->whereHas('chapters')->first(); + $chapter = $book->chapters()->first(); + $page = $chapter->pages()->first(); + $entities = [$book, $chapter, $page]; + $user = $this->getViewer(); + $this->actingAs($user); + + foreach ($entities as $entity) { + $resp = $this->get($entity->getUrl()); + $resp->assertSee('/export/pdf'); + } + + /** @var Role $role */ + $this->removePermissionFromUser($user, 'content-export'); + + foreach ($entities as $entity) { + $resp = $this->get($entity->getUrl()); + $resp->assertDontSee('/export/pdf'); + $resp = $this->get($entity->getUrl('/export/pdf')); + $this->assertPermissionError($resp); + } + } + + public function test_wkhtmltopdf_only_used_when_allow_untrusted_is_true() + { + /** @var Page $page */ + $page = Page::query()->first(); + + config()->set('snappy.pdf.binary', '/abc123'); + config()->set('app.allow_untrusted_server_fetching', false); + + $resp = $this->asEditor()->get($page->getUrl('/export/pdf')); + $resp->assertStatus(200); // Sucessful response with invalid snappy binary indicates dompdf usage. + + config()->set('app.allow_untrusted_server_fetching', true); + $resp = $this->get($page->getUrl('/export/pdf')); + $resp->assertStatus(500); // Bad response indicates wkhtml usage + } }