mirror of
https://github.com/gocsaf/csaf.git
synced 2025-12-22 11:55:40 +01:00
Adjusted TLS check.
This commit is contained in:
parent
8623728a9a
commit
ffd43d510b
2 changed files with 30 additions and 20 deletions
|
|
@ -23,10 +23,11 @@ import (
|
|||
type processor struct {
|
||||
opts *options
|
||||
redirects map[string]string
|
||||
noneTLS map[string]struct{}
|
||||
}
|
||||
|
||||
type check interface {
|
||||
executeOrder() int
|
||||
executionOrder() int
|
||||
run(*processor, string) error
|
||||
report(*processor, *Domain)
|
||||
}
|
||||
|
|
@ -35,6 +36,7 @@ func newProcessor(opts *options) *processor {
|
|||
return &processor{
|
||||
opts: opts,
|
||||
redirects: map[string]string{},
|
||||
noneTLS: map[string]struct{}{},
|
||||
}
|
||||
}
|
||||
|
||||
|
|
@ -42,6 +44,9 @@ func (p *processor) clean() {
|
|||
for k := range p.redirects {
|
||||
delete(p.redirects, k)
|
||||
}
|
||||
for k := range p.noneTLS {
|
||||
delete(p.noneTLS, k)
|
||||
}
|
||||
}
|
||||
|
||||
func (p *processor) run(checks []check, domains []string) (*Report, error) {
|
||||
|
|
@ -51,7 +56,7 @@ func (p *processor) run(checks []check, domains []string) (*Report, error) {
|
|||
execs := make([]check, len(checks))
|
||||
copy(execs, checks)
|
||||
sort.SliceStable(execs, func(i, j int) bool {
|
||||
return execs[i].executeOrder() < execs[j].executeOrder()
|
||||
return execs[i].executionOrder() < execs[j].executionOrder()
|
||||
})
|
||||
|
||||
for _, d := range domains {
|
||||
|
|
@ -71,6 +76,12 @@ func (p *processor) run(checks []check, domains []string) (*Report, error) {
|
|||
return &report, nil
|
||||
}
|
||||
|
||||
func (p *processor) checkTLS(url string) {
|
||||
if !strings.HasPrefix(strings.ToLower(url), "https://") {
|
||||
p.noneTLS[url] = struct{}{}
|
||||
}
|
||||
}
|
||||
|
||||
func (p *processor) checkRedirect(r *http.Request, via []*http.Request) error {
|
||||
|
||||
var path strings.Builder
|
||||
|
|
@ -80,7 +91,9 @@ func (p *processor) checkRedirect(r *http.Request, via []*http.Request) error {
|
|||
}
|
||||
path.WriteString(v.URL.String())
|
||||
}
|
||||
p.redirects[r.URL.String()] = path.String()
|
||||
url := r.URL.String()
|
||||
p.checkTLS(url)
|
||||
p.redirects[url] = path.String()
|
||||
|
||||
if len(via) > 10 {
|
||||
return errors.New("Too many redirections")
|
||||
|
|
@ -163,7 +176,7 @@ type publicPGPKeyCheck struct {
|
|||
baseCheck
|
||||
}
|
||||
|
||||
func (bc *baseCheck) executeOrder() int {
|
||||
func (bc *baseCheck) executionOrder() int {
|
||||
return bc.exec
|
||||
}
|
||||
|
||||
|
|
@ -193,22 +206,19 @@ func (bc *baseCheck) ok(message string) bool {
|
|||
}
|
||||
|
||||
func (tc *tlsCheck) run(p *processor, domain string) error {
|
||||
url := "https://" + domain + "/.well-known/csaf/provider-metadata.json"
|
||||
client := p.httpClient()
|
||||
req, err := http.NewRequest(http.MethodHead, url, nil)
|
||||
if err != nil {
|
||||
return err
|
||||
if len(p.noneTLS) == 0 {
|
||||
tc.add("All tested URLs were https.")
|
||||
} else {
|
||||
urls := make([]string, len(p.noneTLS))
|
||||
var i int
|
||||
for k := range p.noneTLS {
|
||||
urls[i] = k
|
||||
i++
|
||||
}
|
||||
res, err := client.Do(req)
|
||||
if err != nil {
|
||||
msg := fmt.Sprintf("Fetching provider metadata failed: %s.", err.Error())
|
||||
tc.add(msg)
|
||||
sort.Strings(urls)
|
||||
tc.add("Following none https URLs were used:")
|
||||
tc.add(urls...)
|
||||
}
|
||||
if res != nil && res.StatusCode != http.StatusOK {
|
||||
msg := fmt.Sprintf("Status: %d (%s).", res.StatusCode, res.Status)
|
||||
tc.add(msg)
|
||||
}
|
||||
tc.ok("TLS check worked.")
|
||||
return nil
|
||||
}
|
||||
|
||||
|
|
|
|||
|
|
@ -100,7 +100,7 @@ func writeReport(report *Report, opts *options) error {
|
|||
|
||||
func buildChecks() []check {
|
||||
return []check{
|
||||
&tlsCheck{baseCheck{exec: 0, num: 3, description: "TLS"}},
|
||||
&tlsCheck{baseCheck{exec: 13, num: 3, description: "TLS"}},
|
||||
&redirectsCheck{baseCheck{exec: 12, num: 6, description: "Redirects"}},
|
||||
&providerMetadataCheck{baseCheck{exec: 1, num: 7, description: "provider-metadata.json"}},
|
||||
&securityCheck{baseCheck{exec: 2, num: 8, description: "security.txt"}},
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue