Passed
Push — master ( 9fced0...e8e611 )
by Robbie
17:39 queued 14:35
created
src/Extension/RichLinksExtension.php 1 patch
Indentation   +39 added lines, -39 removed lines patch added patch discarded remove patch
@@ -17,49 +17,49 @@
 block discarded – undo
17 17
 class RichLinksExtension extends Extension
18 18
 {
19 19
 
20
-    /**
21
-     * @var array
22
-     */
23
-    private static $casting = [
24
-        'RichLinks' => 'HTMLText'
25
-    ];
20
+	/**
21
+	 * @var array
22
+	 */
23
+	private static $casting = [
24
+		'RichLinks' => 'HTMLText'
25
+	];
26 26
 
27
-    /**
28
-     * @return string
29
-     */
30
-    public function RichLinks()
31
-    {
32
-        // Note:
33
-        // Assume we can use Regexes because the link will always be formatted
34
-        // in the same way coming from the CMS.
27
+	/**
28
+	 * @return string
29
+	 */
30
+	public function RichLinks()
31
+	{
32
+		// Note:
33
+		// Assume we can use Regexes because the link will always be formatted
34
+		// in the same way coming from the CMS.
35 35
 
36
-        $content = $this->owner->value;
36
+		$content = $this->owner->value;
37 37
 
38
-        // Find all file links for processing.
39
-        preg_match_all('/<a.*href="\[file_link,id=([0-9]+)\].*".*>.*<\/a>/U', $content, $matches);
38
+		// Find all file links for processing.
39
+		preg_match_all('/<a.*href="\[file_link,id=([0-9]+)\].*".*>.*<\/a>/U', $content, $matches);
40 40
 
41
-        // Attach the file type and size to each of the links.
42
-        for ($i = 0; $i < count($matches[0]); $i++) {
43
-            $file = DataObject::get_by_id(File::class, $matches[1][$i]);
44
-            if ($file) {
45
-                $size = $file->getSize();
46
-                $ext = strtoupper($file->getExtension());
47
-                // Replace the closing </a> tag with the size span (and reattach the closing tag).
48
-                $newLink = substr($matches[0][$i], 0, strlen($matches[0][$i]) - 4)
49
-                    . "<span class='fileExt'> [$ext, $size]</span></a>";
50
-                $content = str_replace($matches[0][$i], $newLink, $content);
51
-            }
52
-        }
41
+		// Attach the file type and size to each of the links.
42
+		for ($i = 0; $i < count($matches[0]); $i++) {
43
+			$file = DataObject::get_by_id(File::class, $matches[1][$i]);
44
+			if ($file) {
45
+				$size = $file->getSize();
46
+				$ext = strtoupper($file->getExtension());
47
+				// Replace the closing </a> tag with the size span (and reattach the closing tag).
48
+				$newLink = substr($matches[0][$i], 0, strlen($matches[0][$i]) - 4)
49
+					. "<span class='fileExt'> [$ext, $size]</span></a>";
50
+				$content = str_replace($matches[0][$i], $newLink, $content);
51
+			}
52
+		}
53 53
 
54
-        // Inject extra attributes into the external links.
55
-        $pattern = '/(<a.*)(href=\"https?:\/\/[^\"]*\"[^>]*>.*)(<\/a>)/iU';
56
-        $replacement = sprintf(
57
-            '$1class="external" rel="external" title="%s" $2<span class="nonvisual-indicator">(%s)</span>$3',
58
-            _t(__CLASS__ . '.OpenLinkTitle', 'Open external link'),
59
-            _t(__CLASS__ . '.ExternalLink', 'external link')
60
-        );
61
-        $content = preg_replace($pattern, $replacement, $content, -1);
54
+		// Inject extra attributes into the external links.
55
+		$pattern = '/(<a.*)(href=\"https?:\/\/[^\"]*\"[^>]*>.*)(<\/a>)/iU';
56
+		$replacement = sprintf(
57
+			'$1class="external" rel="external" title="%s" $2<span class="nonvisual-indicator">(%s)</span>$3',
58
+			_t(__CLASS__ . '.OpenLinkTitle', 'Open external link'),
59
+			_t(__CLASS__ . '.ExternalLink', 'external link')
60
+		);
61
+		$content = preg_replace($pattern, $replacement, $content, -1);
62 62
 
63
-        return $content;
64
-    }
63
+		return $content;
64
+	}
65 65
 }
Please login to merge, or discard this patch.
tests/Control/InitialisationMiddlewareTest.php 1 patch
Indentation   +116 added lines, -116 removed lines patch added patch discarded remove patch
@@ -10,120 +10,120 @@
 block discarded – undo
10 10
 
11 11
 class InitialisationMiddlewareTest extends FunctionalTest
12 12
 {
13
-    /**
14
-     * @var HTTPRequest
15
-     */
16
-    protected $request;
17
-
18
-    /**
19
-     * @var InitialisationMiddleware
20
-     */
21
-    protected $middleware;
22
-
23
-    protected $usesDatabase = true;
24
-
25
-    protected function setUp()
26
-    {
27
-        parent::setUp();
28
-
29
-        $this->request = new HTTPRequest('GET', '/');
30
-        $this->middleware = new InitialisationMiddleware();
31
-
32
-        Environment::setEnv('SS_OUTBOUND_PROXY', '');
33
-        Environment::setEnv('SS_OUTBOUND_PROXY_PORT', '');
34
-        putenv('NO_PROXY=');
35
-    }
36
-
37
-    public function testDoNotConfigureProxyIfNoEnvironmentVarsAreSet()
38
-    {
39
-        $this->runMiddleware();
40
-
41
-        $this->assertEmpty(
42
-            Environment::getEnv('http_proxy'),
43
-            'Proxy information is not set if no outbound proxy is configured'
44
-        );
45
-    }
46
-
47
-    public function testConfigureEgressProxyWhenVarsAreSet()
48
-    {
49
-        Environment::setEnv('SS_OUTBOUND_PROXY', 'http://example.com');
50
-        Environment::setEnv('SS_OUTBOUND_PROXY_PORT', '8024');
51
-
52
-        $this->runMiddleware();
53
-
54
-        $this->assertEquals(
55
-            'http://example.com:8024',
56
-            Environment::getEnv('http_proxy'),
57
-            'Proxy is configured with proxy and port'
58
-        );
59
-    }
60
-
61
-    public function testDoNotConfigureProxyDomainExclusionsWhenNoneAreDefined()
62
-    {
63
-        Config::modify()->remove(InitialisationMiddleware::class, 'egress_proxy_exclude_domains');
64
-
65
-        $this->runMiddleware();
66
-
67
-        $this->assertSame(
68
-            '',
69
-            Environment::getEnv('NO_PROXY'),
70
-            'No domain exclusions are set when none are defined'
71
-        );
72
-    }
73
-
74
-    public function testConfigureEgressProxyDomainExclusions()
75
-    {
76
-        Config::modify()->set(
77
-            InitialisationMiddleware::class,
78
-            'egress_proxy_exclude_domains',
79
-            'example.com'
80
-        );
81
-
82
-        putenv('NO_PROXY=foo.com,bar.com');
83
-        $this->runMiddleware();
84
-
85
-        $this->assertSame(
86
-            'foo.com,bar.com,example.com',
87
-            Environment::getEnv('NO_PROXY'),
88
-            'Domain exclusions are combined with existing values and configuration settings'
89
-        );
90
-    }
91
-
92
-    public function testSecurityHeadersAddedByDefault()
93
-    {
94
-        $response = $this->get('Security/login');
95
-        $this->assertArrayHasKey('x-xss-protection', $response->getHeaders());
96
-        $this->assertSame('1; mode=block', $response->getHeader('x-xss-protection'));
97
-    }
98
-
99
-    public function testXSSProtectionHeaderNotAdded()
100
-    {
101
-        Config::modify()->set(InitialisationMiddleware::class, 'xss_protection_enabled', false);
102
-        $response = $this->get('Security/login');
103
-        $this->assertArrayNotHasKey('x-xss-protection', $response->getHeaders());
104
-    }
105
-
106
-    public function testHstsNotAddedByDefault()
107
-    {
108
-        Config::modify()->remove(InitialisationMiddleware::class, 'strict_transport_security');
109
-        $response = $this->get('Security/login');
110
-        $this->assertArrayNotHasKey('strict-transport-security', $response->getHeaders());
111
-    }
112
-
113
-    public function testHstsAddedWhenConfigured()
114
-    {
115
-        Config::modify()->update(InitialisationMiddleware::class, 'strict_transport_security', 'max-age=1');
116
-        $response = $this->get('Security/login');
117
-        $this->assertArrayHasKey('strict-transport-security', $response->getHeaders());
118
-    }
119
-
120
-    /**
121
-     * Runs the middleware with a stubbed delegate
122
-     */
123
-    protected function runMiddleware()
124
-    {
125
-        $this->middleware->process($this->request, function () {
126
-            // no op
127
-        });
128
-    }
13
+	/**
14
+	 * @var HTTPRequest
15
+	 */
16
+	protected $request;
17
+
18
+	/**
19
+	 * @var InitialisationMiddleware
20
+	 */
21
+	protected $middleware;
22
+
23
+	protected $usesDatabase = true;
24
+
25
+	protected function setUp()
26
+	{
27
+		parent::setUp();
28
+
29
+		$this->request = new HTTPRequest('GET', '/');
30
+		$this->middleware = new InitialisationMiddleware();
31
+
32
+		Environment::setEnv('SS_OUTBOUND_PROXY', '');
33
+		Environment::setEnv('SS_OUTBOUND_PROXY_PORT', '');
34
+		putenv('NO_PROXY=');
35
+	}
36
+
37
+	public function testDoNotConfigureProxyIfNoEnvironmentVarsAreSet()
38
+	{
39
+		$this->runMiddleware();
40
+
41
+		$this->assertEmpty(
42
+			Environment::getEnv('http_proxy'),
43
+			'Proxy information is not set if no outbound proxy is configured'
44
+		);
45
+	}
46
+
47
+	public function testConfigureEgressProxyWhenVarsAreSet()
48
+	{
49
+		Environment::setEnv('SS_OUTBOUND_PROXY', 'http://example.com');
50
+		Environment::setEnv('SS_OUTBOUND_PROXY_PORT', '8024');
51
+
52
+		$this->runMiddleware();
53
+
54
+		$this->assertEquals(
55
+			'http://example.com:8024',
56
+			Environment::getEnv('http_proxy'),
57
+			'Proxy is configured with proxy and port'
58
+		);
59
+	}
60
+
61
+	public function testDoNotConfigureProxyDomainExclusionsWhenNoneAreDefined()
62
+	{
63
+		Config::modify()->remove(InitialisationMiddleware::class, 'egress_proxy_exclude_domains');
64
+
65
+		$this->runMiddleware();
66
+
67
+		$this->assertSame(
68
+			'',
69
+			Environment::getEnv('NO_PROXY'),
70
+			'No domain exclusions are set when none are defined'
71
+		);
72
+	}
73
+
74
+	public function testConfigureEgressProxyDomainExclusions()
75
+	{
76
+		Config::modify()->set(
77
+			InitialisationMiddleware::class,
78
+			'egress_proxy_exclude_domains',
79
+			'example.com'
80
+		);
81
+
82
+		putenv('NO_PROXY=foo.com,bar.com');
83
+		$this->runMiddleware();
84
+
85
+		$this->assertSame(
86
+			'foo.com,bar.com,example.com',
87
+			Environment::getEnv('NO_PROXY'),
88
+			'Domain exclusions are combined with existing values and configuration settings'
89
+		);
90
+	}
91
+
92
+	public function testSecurityHeadersAddedByDefault()
93
+	{
94
+		$response = $this->get('Security/login');
95
+		$this->assertArrayHasKey('x-xss-protection', $response->getHeaders());
96
+		$this->assertSame('1; mode=block', $response->getHeader('x-xss-protection'));
97
+	}
98
+
99
+	public function testXSSProtectionHeaderNotAdded()
100
+	{
101
+		Config::modify()->set(InitialisationMiddleware::class, 'xss_protection_enabled', false);
102
+		$response = $this->get('Security/login');
103
+		$this->assertArrayNotHasKey('x-xss-protection', $response->getHeaders());
104
+	}
105
+
106
+	public function testHstsNotAddedByDefault()
107
+	{
108
+		Config::modify()->remove(InitialisationMiddleware::class, 'strict_transport_security');
109
+		$response = $this->get('Security/login');
110
+		$this->assertArrayNotHasKey('strict-transport-security', $response->getHeaders());
111
+	}
112
+
113
+	public function testHstsAddedWhenConfigured()
114
+	{
115
+		Config::modify()->update(InitialisationMiddleware::class, 'strict_transport_security', 'max-age=1');
116
+		$response = $this->get('Security/login');
117
+		$this->assertArrayHasKey('strict-transport-security', $response->getHeaders());
118
+	}
119
+
120
+	/**
121
+	 * Runs the middleware with a stubbed delegate
122
+	 */
123
+	protected function runMiddleware()
124
+	{
125
+		$this->middleware->process($this->request, function () {
126
+			// no op
127
+		});
128
+	}
129 129
 }
Please login to merge, or discard this patch.
src/Control/InitialisationMiddleware.php 1 patch
Indentation   +130 added lines, -130 removed lines patch added patch discarded remove patch
@@ -12,143 +12,143 @@
 block discarded – undo
12 12
  */
13 13
 class InitialisationMiddleware implements HTTPMiddleware
14 14
 {
15
-    use Configurable;
16
-
17
-    /**
18
-     * Disable the automatically added 'X-XSS-Protection' header that is added to all responses. This should be left
19
-     * alone in most circumstances to include the header. Refer to Mozilla Developer Network for more information:
20
-     * https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection
21
-     *
22
-     * @config
23
-     * @var bool
24
-     */
25
-    private static $xss_protection_enabled = true;
26
-
27
-    /**
28
-     * Enable egress proxy. This works on the principle of setting http(s)_proxy environment variables,
29
-     *  which will be automatically picked up by curl. This means RestfulService and raw curl
30
-     *  requests should work out of the box. Stream-based requests need extra manual configuration.
31
-     *  Refer to https://www.cwp.govt.nz/guides/core-technical-documentation/common-web-platform-core/en/how-tos/external_http_requests_with_proxy
32
-     *
33
-     * @config
34
-     * @var bool
35
-     */
36
-    private static $egress_proxy_default_enabled = true;
37
-
38
-    /**
39
-     * Configure the list of domains to bypass proxy by setting the NO_PROXY environment variable.
40
-     * 'services.cwp.govt.nz' needs to be present for Solr and Docvert internal CWP integration.
41
-     * 'localhost' is necessary for accessing services on the same instance such as tika-server for text extraction.
42
-     *
43
-     * @config
44
-     * @var string[]
45
-     */
46
-    private static $egress_proxy_exclude_domains = [
47
-        'services.cwp.govt.nz',
48
-        'localhost',
49
-    ];
50
-
51
-    /**
52
-     * Provide a value for the HTTP Strict Transport Security header.
53
-     * This header is only respected if you also redirect to SSL.
54
-     *
55
-     * Example configuration (short max-age, excluding dev environments):
56
-     * ```yml
57
-     * ---
58
-     * Name: appsecurity
59
-     * After: '#cwpsecurity'
60
-     * Except:
61
-     *   environment: dev
62
-     * ---
63
-     * CWP\Core\Control\InitialisationMiddleware:
64
-     *   strict_transport_security: 'max-age: 300'
65
-     * SilverStripe\Core\Injector\Injector:
66
-     *   SilverStripe\Control\Middleware\CanonicalURLMiddleware:
67
-     *     properties:
68
-     *       ForceSSL: true
69
-     *       ForceSSLPatterns: null
70
-     * ```
71
-     *
72
-     * Note: This is enabled by default in `cwp/installer` starting with 2.4.x,
73
-     * see `app/_config/security.yml`.
74
-     *
75
-     * @see https://www.cwp.govt.nz/developer-docs/en/2/working_with_projects/security/
76
-     * @config
77
-     * @var string
78
-     */
79
-    private static $strict_transport_security = null;
80
-
81
-    public function process(HTTPRequest $request, callable $delegate)
82
-    {
83
-        if ($this->config()->get('egress_proxy_default_enabled')) {
84
-            $this->configureEgressProxy();
85
-        }
86
-
87
-        $this->configureProxyDomainExclusions();
88
-
89
-        $response = $delegate($request);
90
-
91
-        if ($this->config()->get('xss_protection_enabled') && $response) {
92
-            $response->addHeader('X-XSS-Protection', '1; mode=block');
93
-        }
94
-
95
-        $hsts = $this->config()->get('strict_transport_security');
96
-        if ($hsts && $response) {
97
-            $response->addHeader('Strict-Transport-Security', $hsts);
98
-        }
99
-
100
-        return $response;
101
-    }
102
-
103
-    /**
104
-     * If the outbound egress proxy details have been defined in environment variables, configure the proxy
105
-     * variables that are used to configure it.
106
-     */
107
-    protected function configureEgressProxy()
108
-    {
109
-        if (!Environment::getEnv('SS_OUTBOUND_PROXY')
110
-            || !Environment::getEnv('SS_OUTBOUND_PROXY_PORT')
111
-        ) {
112
-            return;
113
-        }
114
-
115
-        $proxy = Environment::getEnv('SS_OUTBOUND_PROXY');
116
-        $proxyPort = Environment::getEnv('SS_OUTBOUND_PROXY_PORT');
117
-
118
-        /*
15
+	use Configurable;
16
+
17
+	/**
18
+	 * Disable the automatically added 'X-XSS-Protection' header that is added to all responses. This should be left
19
+	 * alone in most circumstances to include the header. Refer to Mozilla Developer Network for more information:
20
+	 * https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection
21
+	 *
22
+	 * @config
23
+	 * @var bool
24
+	 */
25
+	private static $xss_protection_enabled = true;
26
+
27
+	/**
28
+	 * Enable egress proxy. This works on the principle of setting http(s)_proxy environment variables,
29
+	 *  which will be automatically picked up by curl. This means RestfulService and raw curl
30
+	 *  requests should work out of the box. Stream-based requests need extra manual configuration.
31
+	 *  Refer to https://www.cwp.govt.nz/guides/core-technical-documentation/common-web-platform-core/en/how-tos/external_http_requests_with_proxy
32
+	 *
33
+	 * @config
34
+	 * @var bool
35
+	 */
36
+	private static $egress_proxy_default_enabled = true;
37
+
38
+	/**
39
+	 * Configure the list of domains to bypass proxy by setting the NO_PROXY environment variable.
40
+	 * 'services.cwp.govt.nz' needs to be present for Solr and Docvert internal CWP integration.
41
+	 * 'localhost' is necessary for accessing services on the same instance such as tika-server for text extraction.
42
+	 *
43
+	 * @config
44
+	 * @var string[]
45
+	 */
46
+	private static $egress_proxy_exclude_domains = [
47
+		'services.cwp.govt.nz',
48
+		'localhost',
49
+	];
50
+
51
+	/**
52
+	 * Provide a value for the HTTP Strict Transport Security header.
53
+	 * This header is only respected if you also redirect to SSL.
54
+	 *
55
+	 * Example configuration (short max-age, excluding dev environments):
56
+	 * ```yml
57
+	 * ---
58
+	 * Name: appsecurity
59
+	 * After: '#cwpsecurity'
60
+	 * Except:
61
+	 *   environment: dev
62
+	 * ---
63
+	 * CWP\Core\Control\InitialisationMiddleware:
64
+	 *   strict_transport_security: 'max-age: 300'
65
+	 * SilverStripe\Core\Injector\Injector:
66
+	 *   SilverStripe\Control\Middleware\CanonicalURLMiddleware:
67
+	 *     properties:
68
+	 *       ForceSSL: true
69
+	 *       ForceSSLPatterns: null
70
+	 * ```
71
+	 *
72
+	 * Note: This is enabled by default in `cwp/installer` starting with 2.4.x,
73
+	 * see `app/_config/security.yml`.
74
+	 *
75
+	 * @see https://www.cwp.govt.nz/developer-docs/en/2/working_with_projects/security/
76
+	 * @config
77
+	 * @var string
78
+	 */
79
+	private static $strict_transport_security = null;
80
+
81
+	public function process(HTTPRequest $request, callable $delegate)
82
+	{
83
+		if ($this->config()->get('egress_proxy_default_enabled')) {
84
+			$this->configureEgressProxy();
85
+		}
86
+
87
+		$this->configureProxyDomainExclusions();
88
+
89
+		$response = $delegate($request);
90
+
91
+		if ($this->config()->get('xss_protection_enabled') && $response) {
92
+			$response->addHeader('X-XSS-Protection', '1; mode=block');
93
+		}
94
+
95
+		$hsts = $this->config()->get('strict_transport_security');
96
+		if ($hsts && $response) {
97
+			$response->addHeader('Strict-Transport-Security', $hsts);
98
+		}
99
+
100
+		return $response;
101
+	}
102
+
103
+	/**
104
+	 * If the outbound egress proxy details have been defined in environment variables, configure the proxy
105
+	 * variables that are used to configure it.
106
+	 */
107
+	protected function configureEgressProxy()
108
+	{
109
+		if (!Environment::getEnv('SS_OUTBOUND_PROXY')
110
+			|| !Environment::getEnv('SS_OUTBOUND_PROXY_PORT')
111
+		) {
112
+			return;
113
+		}
114
+
115
+		$proxy = Environment::getEnv('SS_OUTBOUND_PROXY');
116
+		$proxyPort = Environment::getEnv('SS_OUTBOUND_PROXY_PORT');
117
+
118
+		/*
119 119
          * This sets the environment variables so they are available in
120 120
          * external calls executed by exec() such as curl.
121 121
          * Environment::setEnv() would only availabe in context of SilverStripe.
122 122
          * Environment::getEnv() will fallback to getenv() and will therefore
123 123
          * fetch the variables
124 124
          */
125
-        putenv('http_proxy=' .  $proxy . ':' . $proxyPort);
126
-        putenv('https_proxy=' . $proxy . ':' . $proxyPort);
127
-    }
128
-
129
-    /**
130
-     * Configure any domains that should be excluded from egress proxy rules and provide them to the environment
131
-     */
132
-    protected function configureProxyDomainExclusions()
133
-    {
134
-        $noProxy = $this->config()->get('egress_proxy_exclude_domains');
135
-        if (empty($noProxy)) {
136
-            return;
137
-        }
138
-
139
-        if (!is_array($noProxy)) {
140
-            $noProxy = [$noProxy];
141
-        }
142
-
143
-        // Merge with exsiting if needed.
144
-        if (Environment::getEnv('NO_PROXY')) {
145
-            $noProxy = array_merge(explode(',', Environment::getEnv('NO_PROXY')), $noProxy);
146
-        }
147
-
148
-        /*
125
+		putenv('http_proxy=' .  $proxy . ':' . $proxyPort);
126
+		putenv('https_proxy=' . $proxy . ':' . $proxyPort);
127
+	}
128
+
129
+	/**
130
+	 * Configure any domains that should be excluded from egress proxy rules and provide them to the environment
131
+	 */
132
+	protected function configureProxyDomainExclusions()
133
+	{
134
+		$noProxy = $this->config()->get('egress_proxy_exclude_domains');
135
+		if (empty($noProxy)) {
136
+			return;
137
+		}
138
+
139
+		if (!is_array($noProxy)) {
140
+			$noProxy = [$noProxy];
141
+		}
142
+
143
+		// Merge with exsiting if needed.
144
+		if (Environment::getEnv('NO_PROXY')) {
145
+			$noProxy = array_merge(explode(',', Environment::getEnv('NO_PROXY')), $noProxy);
146
+		}
147
+
148
+		/*
149 149
          * Set the environment varial for NO_PROXY the same way the
150 150
          * proxy variables are set above
151 151
          */
152
-        putenv('NO_PROXY=' . implode(',', array_unique($noProxy)));
153
-    }
152
+		putenv('NO_PROXY=' . implode(',', array_unique($noProxy)));
153
+	}
154 154
 }
Please login to merge, or discard this patch.