test(handlers/org_helpers): add security-critical test coverage for resolveInsideRoot, isSafeRoleName, mergeCategoryRouting #956

Merged
devops-engineer merged 1 commits from feat/org-helpers-security-tests into main 2026-05-14 04:47:10 +00:00

View File

@ -0,0 +1,316 @@
package handlers
import (
"path/filepath"
"strings"
"testing"
)
// org_helpers_security_test.go — security-critical path sanitization + role-name
// validation for org template processing. Covers OFFSEC-006-class attacks:
// path traversal via user-controlled files_dir / prompt_file refs, and role-name
// injection via the persona env loader.
// ── resolveInsideRoot ──────────────────────────────────────────────────────────
func TestResolveInsideRoot_EmptyUserPath(t *testing.T) {
_, err := resolveInsideRoot("/safe/root", "")
if err == nil {
t.Error("empty userPath: expected error, got nil")
}
if err.Error() != "path is empty" {
t.Errorf("empty userPath: got %q, want %q", err.Error(), "path is empty")
}
}
func TestResolveInsideRoot_AbsolutePathRejected(t *testing.T) {
_, err := resolveInsideRoot("/safe/root", "/etc/passwd")
if err == nil {
t.Error("absolute userPath: expected error, got nil")
}
if err.Error() != "absolute paths are not allowed" {
t.Errorf("absolute userPath: got %q, want %q", err.Error(), "absolute paths are not allowed")
}
}
func TestResolveInsideRoot_DotDotTraversal(t *testing.T) {
// ../../etc/passwd from /safe/root
got, err := resolveInsideRoot("/safe/root", "../../etc/passwd")
if err == nil {
t.Errorf("dotdot traversal: expected error, got %q", got)
}
if err.Error() != "path escapes root" {
t.Errorf("dotdot traversal: got %q, want %q", err.Error(), "path escapes root")
}
}
func TestResolveInsideRoot_DotDotWithIntermediate(t *testing.T) {
// a/b/../../c should escape if a/b is not under root
got, err := resolveInsideRoot("/safe/root", "a/b/../../c")
if err == nil {
t.Errorf("dotdot with intermediate: expected error, got %q", got)
}
if err.Error() != "path escapes root" {
t.Errorf("dotdot with intermediate: got %q, want %q", err.Error(), "path escapes root")
}
}
func TestResolveInsideRoot_ValidRelativePath(t *testing.T) {
// This test uses the real filesystem since resolveInsideRoot calls filepath.Abs.
// Use t.TempDir() so we have a real root to work with.
root := t.TempDir()
got, err := resolveInsideRoot(root, "subdir/file.txt")
if err != nil {
t.Fatalf("valid relative: unexpected error: %v", err)
}
// Must be inside root
if got[:len(root)] != root {
t.Errorf("result should start with root %q, got %q", root, got)
}
}
func TestResolveInsideRoot_ExactRootMatch(t *testing.T) {
root := t.TempDir()
got, err := resolveInsideRoot(root, ".")
if err != nil {
t.Fatalf("exact root: unexpected error: %v", err)
}
if got != root {
t.Errorf("exact root match: got %q, want %q", got, root)
}
}
func TestResolveInsideRoot_DotPathComponent(t *testing.T) {
root := t.TempDir()
// ./subdir/./file.txt should resolve to root/subdir/file.txt
got, err := resolveInsideRoot(root, "./subdir/./file.txt")
if err != nil {
t.Fatalf("dot path component: unexpected error: %v", err)
}
if got[len(got)-14:] != "/subdir/file.txt" {
t.Errorf("dot path component: got %q, want suffix /subdir/file.txt", got)
}
}
func TestResolveInsideRoot_NestedDotDotEscapes(t *testing.T) {
root := t.TempDir()
// a/../../b from /tmp/dirsomething → /tmp/b (escapes temp dir)
got, err := resolveInsideRoot(root, "a/../../b")
if err == nil {
t.Errorf("nested dotdot: expected error, got %q", got)
}
if err.Error() != "path escapes root" {
t.Errorf("nested dotdot: got %q, want %q", err.Error(), "path escapes root")
}
}
func TestResolveInsideRoot_DotdotAtStart(t *testing.T) {
root := t.TempDir()
got, err := resolveInsideRoot(root, "../sibling")
if err == nil {
t.Errorf("../sibling: expected error, got %q", got)
}
if err.Error() != "path escapes root" {
t.Errorf("../sibling: got %q, want %q", err.Error(), "path escapes root")
}
}
func TestResolveInsideRoot_SiblingNotEscaped(t *testing.T) {
// /foo/bar and /foo/baz are siblings — the prefix check with
// filepath.Separator guard must allow /foo/bar/child without matching /foo/baz
// (which would be wrong if the check were just strings.HasPrefix).
root := t.TempDir()
got, err := resolveInsideRoot(root, "valid-subdir/file.txt")
if err != nil {
t.Fatalf("sibling not escaped: unexpected error: %v", err)
}
// Must be inside root
if !strings.HasPrefix(got, root+string(filepath.Separator)) {
t.Errorf("result should be inside root %q, got %q", root, got)
}
}
// ── isSafeRoleName ────────────────────────────────────────────────────────────
func TestIsSafeRoleName_Valid(t *testing.T) {
valid := []string{
"backend",
"Frontend-Engineer",
"research_lead",
"devOps123",
"a",
"A",
"team_42-leads",
}
for _, name := range valid {
if !isSafeRoleName(name) {
t.Errorf("isSafeRoleName(%q): expected true, got false", name)
}
}
}
func TestIsSafeRoleName_Empty(t *testing.T) {
if isSafeRoleName("") {
t.Error("isSafeRoleName(\"\"): expected false, got true")
}
}
func TestIsSafeRoleName_Dot(t *testing.T) {
if isSafeRoleName(".") {
t.Error("isSafeRoleName(\".\"): expected false, got true")
}
}
func TestIsSafeRoleName_DotDot(t *testing.T) {
if isSafeRoleName("..") {
t.Error("isSafeRoleName(\"..\"): expected false, got true")
}
}
func TestIsSafeRoleName_PathTraversal(t *testing.T) {
unsafe := []string{
"../etc",
"foo/../../../etc",
"foo/../../bar",
}
for _, name := range unsafe {
if isSafeRoleName(name) {
t.Errorf("isSafeRoleName(%q): expected false (path traversal), got true", name)
}
}
}
func TestIsSafeRoleName_SpecialChars(t *testing.T) {
unsafe := []string{
"foo:bar",
"foo bar",
"foo\tbar",
"foo\nbar",
"foo\x00bar",
"foo@bar",
"foo#bar",
"foo$bar",
}
for _, name := range unsafe {
if isSafeRoleName(name) {
t.Errorf("isSafeRoleName(%q): expected false (special char), got true", name)
}
}
}
// ── mergeCategoryRouting ──────────────────────────────────────────────────────
func TestMergeCategoryRouting_BothNil(t *testing.T) {
got := mergeCategoryRouting(nil, nil)
if len(got) != 0 {
t.Errorf("both nil: got %v, want empty", got)
}
}
func TestMergeCategoryRouting_DefaultOnly(t *testing.T) {
defaultRouting := map[string][]string{
"security": {"Backend Engineer", "DevOps"},
}
got := mergeCategoryRouting(defaultRouting, nil)
if len(got) != 1 {
t.Fatalf("default only: got %d entries, want 1", len(got))
}
if len(got["security"]) != 2 {
t.Errorf("security roles: got %v, want [Backend Engineer, DevOps]", got["security"])
}
}
func TestMergeCategoryRouting_WorkspaceOnly(t *testing.T) {
wsRouting := map[string][]string{
"ui": {"Frontend Engineer"},
}
got := mergeCategoryRouting(nil, wsRouting)
if len(got) != 1 {
t.Fatalf("ws only: got %d entries, want 1", len(got))
}
if got["ui"][0] != "Frontend Engineer" {
t.Errorf("ui roles: got %v, want [Frontend Engineer]", got["ui"])
}
}
func TestMergeCategoryRouting_MergeNoOverlap(t *testing.T) {
defaultRouting := map[string][]string{
"security": {"Backend Engineer"},
}
wsRouting := map[string][]string{
"ui": {"Frontend Engineer"},
}
got := mergeCategoryRouting(defaultRouting, wsRouting)
if len(got) != 2 {
t.Errorf("merge no overlap: got %d entries, want 2", len(got))
}
}
func TestMergeCategoryRouting_WsOverrideDropsDefault(t *testing.T) {
defaultRouting := map[string][]string{
"security": {"Backend Engineer", "DevOps"},
}
wsRouting := map[string][]string{
"security": {"Security Engineer"},
}
got := mergeCategoryRouting(defaultRouting, wsRouting)
if len(got["security"]) != 1 {
t.Errorf("ws override: got %v, want [Security Engineer]", got["security"])
}
if got["security"][0] != "Security Engineer" {
t.Errorf("ws override: got %v, want [Security Engineer]", got["security"])
}
}
func TestMergeCategoryRouting_EmptyListDropsCategory(t *testing.T) {
defaultRouting := map[string][]string{
"security": {"Backend Engineer"},
"ui": {"Frontend Engineer"},
}
wsRouting := map[string][]string{
"security": {}, // empty list = opt out
}
got := mergeCategoryRouting(defaultRouting, wsRouting)
if _, exists := got["security"]; exists {
t.Error("empty ws list should delete the category from output")
}
if len(got["ui"]) != 1 {
t.Errorf("ui should still exist: got %v", got["ui"])
}
}
func TestMergeCategoryRouting_EmptyKeySkipped(t *testing.T) {
defaultRouting := map[string][]string{
"": {"Backend Engineer"},
}
got := mergeCategoryRouting(defaultRouting, nil)
if _, exists := got[""]; exists {
t.Error("empty key should be skipped")
}
}
func TestMergeCategoryRouting_EmptyRolesInDefaultSkipped(t *testing.T) {
defaultRouting := map[string][]string{
"security": {},
}
got := mergeCategoryRouting(defaultRouting, nil)
if len(got) != 0 {
t.Errorf("empty roles in default should be skipped, got %v", got)
}
}
func TestMergeCategoryRouting_OriginalMapsUnmodified(t *testing.T) {
defaultRouting := map[string][]string{
"security": {"Backend Engineer"},
}
wsRouting := map[string][]string{
"ui": {"Frontend Engineer"},
}
mergeCategoryRouting(defaultRouting, wsRouting)
if len(defaultRouting) != 1 || len(defaultRouting["security"]) != 1 {
t.Error("default routing should be unmodified after merge")
}
if len(wsRouting) != 1 {
t.Error("ws routing should be unmodified after merge")
}
}