stable
Clone or download
We have made plenty of protection on new SSRF filtering proxy but we have not thought about smokescreen misbehaving. If things goes full wrong for some reasons, we should be able to give admins a way to bypass smokescreen entirely. How to test ----------- 1. Setup strict rules for your dev environment[1] 2. Ensure traffic is filtered 3. tuleap config-set filtering_proxy_usage disabled 4. Ensure traffic should no longer be filtered, no warning in system events 5. tuleap config-reset filtering_proxy_usage 6. Ensure traffice is filtered again [1] https://docs.tuleap.org/administration-guide/system-administration/filtering-outbound-requests.html#adjusting-the-allow-and-deny-filter-lists Part of: request #31580: Filter outbound HTTP requests Change-Id: I73df28a7049212eadf38e06d626960f7b8cbf4c0
Modified Files
Name | ||||
---|---|---|---|---|
M | src/common/Http/Client/FilteredOutboundHTTPResponseAlerter.php | +1 | −1 | Go to diff View file |
M | src/common/Http/Client/OutboundHTTPRequestProxy.php | +13 | −1 | Go to diff View file |
M | src/common/Http/Client/OutboundHTTPRequestSettings.php | +2 | −1 | Go to diff View file |
M | src/common/Http/HttpClientFactory.php | +7 | −4 | Go to diff View file |
M | tests/unit/common/Http/Client/FilteredOutboundHTTPResponseAlerterTest.php | +18 | −0 | Go to diff View file |