From: Lorenz Stechauner <l.stechauner@proxmox.com>
To: Lorenz Stechauner <l.stechauner@proxmox.com>,
Proxmox VE development discussion <pve-devel@lists.proxmox.com>
Subject: Re: [pve-devel] [PATCH v7 manager 1/5] api: nodes: add query_url_metadata method
Date: Tue, 15 Jun 2021 09:58:10 +0200 [thread overview]
Message-ID: <a9e126d3-c240-2ea2-fb69-cce5a2b97f64@proxmox.com> (raw)
In-Reply-To: <20210614090557.33455-4-l.stechauner@proxmox.com>
metadata is gained using a HEAD request.
Due to the ability of this api endpoint to request files on internal
networks (which would not be visible/accessible from outside) it is
restricted to users with permissions `Sys.Audit` and `Sys.Modify` on
`/`. Users with these permissions are able to alter node (network)
config anyway, so this should not create any further security risk.
On 14.06.21 11:05, Lorenz Stechauner wrote:
> Signed-off-by: Lorenz Stechauner <l.stechauner@proxmox.com>
> ---
> PVE/API2/Nodes.pm | 96 +++++++++++++++++++++++++++++++++++++++++++++++
> 1 file changed, 96 insertions(+)
>
> diff --git a/PVE/API2/Nodes.pm b/PVE/API2/Nodes.pm
> index e58d9c10..77fa710a 100644
> --- a/PVE/API2/Nodes.pm
> +++ b/PVE/API2/Nodes.pm
> @@ -11,6 +11,7 @@ use JSON;
> use POSIX qw(LONG_MAX);
> use Time::Local qw(timegm_nocheck);
> use Socket;
> +use IO::Socket::SSL;
>
> use PVE::API2Tools;
> use PVE::APLInfo;
> @@ -238,6 +239,7 @@ __PACKAGE__->register_method ({
> { name => 'netstat' },
> { name => 'network' },
> { name => 'qemu' },
> + { name => 'query-url-metadata' },
> { name => 'replication' },
> { name => 'report' },
> { name => 'rrd' }, # fixme: remove?
> @@ -1595,6 +1597,100 @@ __PACKAGE__->register_method({
> return $rpcenv->fork_worker('download', undef, $user, $worker);
> }});
>
> +__PACKAGE__->register_method({
> + name => 'query_url_metadata',
> + path => 'query-url-metadata',
> + method => 'GET',
> + description => "Query metadata of an URL: file size, file name and mime type.",
> + proxyto => 'node',
> + permissions => {
> + check => ['perm', '/', [ 'Sys.Audit', 'Sys.Modify' ]],
> + },
> + parameters => {
> + additionalProperties => 0,
> + properties => {
> + node => get_standard_option('pve-node'),
> + url => {
> + description => "The URL to query the metadata from.",
> + type => 'string',
> + pattern => 'https?://.*',
> + },
> + 'verify-certificates' => {
> + description => "If false, no SSL/TLS certificates will be verified.",
> + type => 'boolean',
> + optional => 1,
> + default => 1,
> + }
> + },
> + },
> + returns => {
> + type => "object",
> + properties => {
> + filename => {
> + type => 'string',
> + optional => 1,
> + },
> + size => {
> + type => 'integer',
> + renderer => 'bytes',
> + optional => 1,
> + },
> + mimetype => {
> + type => 'string',
> + optional => 1,
> + },
> + },
> + },
> + code => sub {
> + my ($param) = @_;
> +
> + my $url = $param->{url};
> +
> + my $ua = LWP::UserAgent->new();
> +
> + my $dccfg = PVE::Cluster::cfs_read_file('datacenter.cfg');
> + if ($dccfg->{http_proxy}) {
> + $ua->proxy('http', $dccfg->{http_proxy});
> + }
> +
> + my $verify = $param->{'verify-certificates'} // 1;
> + if (!$verify) {
> + $ua->ssl_opts(
> + verify_hostname => 0,
> + SSL_verify_mode => IO::Socket::SSL::SSL_VERIFY_NONE,
> + );
> + }
> +
> + my $req = HTTP::Request->new(HEAD => $url);
> + my $res = $ua->request($req);
> +
> + die "invalid server response: '" . $res->status_line() . "'\n" if ($res->code() != 200);
> +
> + my $size = $res->header("Content-Length");
> + my $disposition = $res->header("Content-Disposition");
> + my $type = $res->header("Content-Type");
> +
> + my $filename;
> +
> + if ($disposition && ($disposition =~ m/filename="([^"]*)"/ || $disposition =~ m/filename=([^;]*)/)) {
> + $filename = $1;
> + } elsif ($url =~ m!^[^?]+/([^?/]*)(?:\?.*)?$!) {
> + $filename = $1;
> + }
> +
> + # Content-Type: text/html; charset=utf-8
> + if ($type && $type =~ m/^([^;]+);/) {
> + $type = $1;
> + }
> +
> + my $ret = {};
> + $ret->{filename} = $filename if $filename;
> + $ret->{size} = $size + 0 if $size;
> + $ret->{mimetype} = $type if $type;
> +
> + return $ret;
> + }});
> +
> __PACKAGE__->register_method({
> name => 'report',
> path => 'report',
next prev parent reply other threads:[~2021-06-15 7:58 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-06-14 9:05 [pve-devel] [PATCH-SERIES v7 manager/common/storage] fix #1710: add downlaod from url button Lorenz Stechauner
2021-06-14 9:05 ` [pve-devel] [PATCH v7 common 1/1] tools: add download_file_from_url Lorenz Stechauner
2021-06-15 7:58 ` Lorenz Stechauner
2021-06-15 12:25 ` [pve-devel] applied: " Thomas Lamprecht
2021-06-14 9:05 ` [pve-devel] [PATCH v7 storage 1/1] status: add download_url method Lorenz Stechauner
2021-06-15 7:58 ` Lorenz Stechauner
2021-06-14 9:05 ` [pve-devel] [PATCH v7 manager 1/5] api: nodes: add query_url_metadata method Lorenz Stechauner
2021-06-15 7:58 ` Lorenz Stechauner [this message]
2021-06-14 9:05 ` [pve-devel] [PATCH v7 manager 2/5] api: nodes: refactor aplinfo to use common download function Lorenz Stechauner
2021-06-15 7:57 ` Lorenz Stechauner
2021-06-14 9:05 ` [pve-devel] [PATCH v7 manager 3/5] ui: add HashAlgorithmSelector Lorenz Stechauner
2021-06-14 9:05 ` [pve-devel] [PATCH v7 manager 4/5] ui: Utils: change download task format Lorenz Stechauner
2021-06-14 9:05 ` [pve-devel] [PATCH v7 manager 5/5] fix #1710: ui: storage: add download from url button Lorenz Stechauner
2021-06-15 7:58 ` Lorenz Stechauner
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=a9e126d3-c240-2ea2-fb69-cce5a2b97f64@proxmox.com \
--to=l.stechauner@proxmox.com \
--cc=pve-devel@lists.proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox