mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-07 20:31:22 +00:00
perf(test): fold discord voice hardening into web media suite
This commit is contained in:
@@ -1,24 +0,0 @@
|
||||
import path from "node:path";
|
||||
import { describe, expect, it } from "vitest";
|
||||
import { sendVoiceMessageDiscord } from "./send.js";
|
||||
|
||||
describe("sendVoiceMessageDiscord - media hardening", () => {
|
||||
it("rejects local paths outside allowed media roots (prevents local file exfiltration)", async () => {
|
||||
const candidate = path.join(process.cwd(), "package.json");
|
||||
await expect(sendVoiceMessageDiscord("channel:123", candidate)).rejects.toThrow(
|
||||
/Local media path is not under an allowed directory/,
|
||||
);
|
||||
});
|
||||
|
||||
it("blocks SSRF targets when given a private-network URL", async () => {
|
||||
await expect(
|
||||
sendVoiceMessageDiscord("channel:123", "http://127.0.0.1/voice.ogg"),
|
||||
).rejects.toThrow(/Failed to fetch media|Blocked/);
|
||||
});
|
||||
|
||||
it("does not allow non-http URL schemes to reach ffmpeg/ffprobe", async () => {
|
||||
await expect(
|
||||
sendVoiceMessageDiscord("channel:123", "rtsp://example.com/voice.ogg"),
|
||||
).rejects.toThrow(/Local media path is not under an allowed directory|ENOENT|no such file/i);
|
||||
});
|
||||
});
|
||||
@@ -3,6 +3,7 @@ import os from "node:os";
|
||||
import path from "node:path";
|
||||
import sharp from "sharp";
|
||||
import { afterAll, afterEach, beforeAll, describe, expect, it, vi } from "vitest";
|
||||
import { sendVoiceMessageDiscord } from "../discord/send.js";
|
||||
import * as ssrf from "../infra/net/ssrf.js";
|
||||
import { optimizeImageToPng } from "../media/image-ops.js";
|
||||
import { captureEnv } from "../test-utils/env.js";
|
||||
@@ -333,6 +334,27 @@ describe("web media loading", () => {
|
||||
});
|
||||
});
|
||||
|
||||
describe("Discord voice message input hardening", () => {
|
||||
it("rejects local paths outside allowed media roots", async () => {
|
||||
const candidate = path.join(process.cwd(), "package.json");
|
||||
await expect(sendVoiceMessageDiscord("channel:123", candidate)).rejects.toThrow(
|
||||
/Local media path is not under an allowed directory/i,
|
||||
);
|
||||
});
|
||||
|
||||
it("blocks SSRF targets when given a private-network URL", async () => {
|
||||
await expect(
|
||||
sendVoiceMessageDiscord("channel:123", "http://127.0.0.1/voice.ogg"),
|
||||
).rejects.toThrow(/Failed to fetch media|Blocked|private|internal/i);
|
||||
});
|
||||
|
||||
it("rejects non-http URL schemes", async () => {
|
||||
await expect(
|
||||
sendVoiceMessageDiscord("channel:123", "rtsp://example.com/voice.ogg"),
|
||||
).rejects.toThrow(/Local media path is not under an allowed directory|ENOENT|no such file/i);
|
||||
});
|
||||
});
|
||||
|
||||
describe("local media root guard", () => {
|
||||
it("rejects local paths outside allowed roots", async () => {
|
||||
// Explicit roots that don't contain the temp file.
|
||||
|
||||
Reference in New Issue
Block a user