blob: 0cacf5f433bad20dba827ef56e5d188d63efa52b [file] [log] [blame]
Armin Ronacherccf284b2007-05-21 16:44:26 +02001# -*- coding: utf-8 -*-
2"""
3 unit test for security features
4 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
5
6 :copyright: 2007 by Armin Ronacher.
7 :license: BSD, see LICENSE for more details.
8"""
Armin Ronacher6df604e2008-05-23 22:18:38 +02009from jinja2.sandbox import SandboxedEnvironment, \
10 ImmutableSandboxedEnvironment, unsafe
Armin Ronacher4e6f9a22008-05-23 23:57:38 +020011from jinja2 import Markup, escape
Armin Ronacherccf284b2007-05-21 16:44:26 +020012
13
14class PrivateStuff(object):
Armin Ronacher4f7d2d52008-04-22 10:40:26 +020015
16 def bar(self):
17 return 23
18
19 @unsafe
20 def foo(self):
21 return 42
22
23 def __repr__(self):
24 return 'PrivateStuff'
Armin Ronacherccf284b2007-05-21 16:44:26 +020025
26
27class PublicStuff(object):
Armin Ronacherccf284b2007-05-21 16:44:26 +020028 bar = lambda self: 23
Armin Ronacher4f7d2d52008-04-22 10:40:26 +020029 _foo = lambda self: 42
30
31 def __repr__(self):
32 return 'PublicStuff'
Armin Ronacherccf284b2007-05-21 16:44:26 +020033
34
35test_unsafe = '''
Armin Ronacher4f7d2d52008-04-22 10:40:26 +020036>>> env = MODULE.SandboxedEnvironment()
Armin Ronacherccf284b2007-05-21 16:44:26 +020037>>> env.from_string("{{ foo.foo() }}").render(foo=MODULE.PrivateStuff())
Armin Ronacher4f7d2d52008-04-22 10:40:26 +020038Traceback (most recent call last):
39 ...
Armin Ronacher5cdc1ac2008-05-07 12:17:18 +020040SecurityError: <bound method PrivateStuff.foo of PrivateStuff> is not safely callable
Armin Ronacherccf284b2007-05-21 16:44:26 +020041>>> env.from_string("{{ foo.bar() }}").render(foo=MODULE.PrivateStuff())
42u'23'
43
Armin Ronacher4f7d2d52008-04-22 10:40:26 +020044>>> env.from_string("{{ foo._foo() }}").render(foo=MODULE.PublicStuff())
45Traceback (most recent call last):
46 ...
Armin Ronacher5cdc1ac2008-05-07 12:17:18 +020047SecurityError: access to attribute '_foo' of 'PublicStuff' object is unsafe.
Armin Ronacherccf284b2007-05-21 16:44:26 +020048>>> env.from_string("{{ foo.bar() }}").render(foo=MODULE.PublicStuff())
49u'23'
50
51>>> env.from_string("{{ foo.__class__ }}").render(foo=42)
52u''
Armin Ronacherccf284b2007-05-21 16:44:26 +020053>>> env.from_string("{{ foo.func_code }}").render(foo=lambda:None)
54u''
Armin Ronacher4f7d2d52008-04-22 10:40:26 +020055>>> env.from_string("{{ foo.__class__.__subclasses__() }}").render(foo=42)
56Traceback (most recent call last):
57 ...
Armin Ronacher5cdc1ac2008-05-07 12:17:18 +020058SecurityError: access to attribute '__class__' of 'int' object is unsafe.
Armin Ronacherccf284b2007-05-21 16:44:26 +020059'''
60
61
62test_restricted = '''
Armin Ronacher4f7d2d52008-04-22 10:40:26 +020063>>> env = MODULE.SandboxedEnvironment()
Armin Ronacherccf284b2007-05-21 16:44:26 +020064>>> env.from_string("{% for item.attribute in seq %}...{% endfor %}")
65Traceback (most recent call last):
66 ...
Armin Ronacher09c002e2008-05-10 22:21:30 +020067TemplateSyntaxError: expected token 'in', got '.' (line 1)
Armin Ronacherecc051b2007-06-01 18:25:28 +020068>>> env.from_string("{% for foo, bar.baz in seq %}...{% endfor %}")
69Traceback (most recent call last):
70 ...
Armin Ronacher09c002e2008-05-10 22:21:30 +020071TemplateSyntaxError: expected token 'in', got '.' (line 1)
Armin Ronacherccf284b2007-05-21 16:44:26 +020072'''
Armin Ronacher6df604e2008-05-23 22:18:38 +020073
74
75test_immutable_environment = '''
76>>> env = MODULE.ImmutableSandboxedEnvironment()
77>>> env.from_string('{{ [].append(23) }}').render()
78Traceback (most recent call last):
79 ...
80SecurityError: access to attribute 'append' of 'list' object is unsafe.
81>>> env.from_string('{{ {1:2}.clear() }}').render()
82Traceback (most recent call last):
83 ...
84SecurityError: access to attribute 'clear' of 'dict' object is unsafe.
85'''
Armin Ronacher4e6f9a22008-05-23 23:57:38 +020086
87def test_markup_operations():
88 # adding two strings should escape the unsafe one
89 unsafe = '<script type="application/x-some-script">alert("foo");</script>'
90 safe = Markup('<em>username</em>')
91 assert unsafe + safe == unicode(escape(unsafe)) + unicode(safe)
92
93 # string interpolations are safe to use too
94 assert Markup('<em>%s</em>') % '<bad user>' == \
95 '<em>&lt;bad user&gt;</em>'
96 assert Markup('<em>%(username)s</em>') % {
97 'username': '<bad user>'
98 } == '<em>&lt;bad user&gt;</em>'
99
100 # an escaped object is markup too
101 assert type(Markup('foo') + 'bar') is Markup
102
103 # and it implements __html__ by returning itself
104 x = Markup("foo")
105 assert x.__html__() is x
106
107 # it also knows how to treat __html__ objects
108 class Foo(object):
109 def __html__(self):
110 return '<em>awesome</em>'
111 def __unicode__(self):
112 return 'awesome'
113 assert Markup(Foo()) == '<em>awesome</em>'
114 assert Markup('<strong>%s</strong>') % Foo() == \
115 '<strong><em>awesome</em></strong>'