summaryrefslogtreecommitdiffstats
path: root/Bugzilla
diff options
context:
space:
mode:
authorFrédéric Buclin <LpSolit@gmail.com>2016-04-09 01:15:25 +0200
committerFrédéric Buclin <LpSolit@gmail.com>2016-04-09 01:15:25 +0200
commitfa360bee1863b1cb715a29966567ae08118de9a5 (patch)
tree1a1509aa44770306882f8f85b76bef1d08887e58 /Bugzilla
parent60299ec5c0edac882d5552be61e4602e71447af8 (diff)
downloadbugzilla-fa360bee1863b1cb715a29966567ae08118de9a5.tar.gz
bugzilla-fa360bee1863b1cb715a29966567ae08118de9a5.tar.xz
Bug 1261538 - Bugzilla is unable to access attachment.cgi when ssl_redirect = true and using Plack
r=dylan
Diffstat (limited to 'Bugzilla')
-rw-r--r--Bugzilla/CGI.pm32
-rw-r--r--Bugzilla/Util.pm23
2 files changed, 39 insertions, 16 deletions
diff --git a/Bugzilla/CGI.pm b/Bugzilla/CGI.pm
index f92dfddad..4258cd552 100644
--- a/Bugzilla/CGI.pm
+++ b/Bugzilla/CGI.pm
@@ -53,10 +53,18 @@ sub new {
# Make sure our outgoing cookie list is empty on each invocation
$self->{Bugzilla_cookie_list} = [];
+ my $script = basename($0);
+
+ # attachment.cgi handles this itself.
+ if ($script ne 'attachment.cgi') {
+ $self->do_ssl_redirect_if_required();
+ $self->redirect_to_urlbase if $self->url_is_attachment_base;
+ }
+
+
# Path-Info is of no use for Bugzilla and interacts badly with IIS.
# Moreover, it causes unexpected behaviors, such as totally breaking
# the rendering of pages.
- my $script = basename($0);
if (my $path_info = $self->path_info) {
my @whitelist = ("rest.cgi");
Bugzilla::Hook::process('path_info_whitelist', { whitelist => \@whitelist });
@@ -75,11 +83,6 @@ sub new {
# Send appropriate charset
$self->charset('UTF-8');
- # Redirect to urlbase/sslbase if we are not viewing an attachment.
- if ($self->url_is_attachment_base and $script ne 'attachment.cgi') {
- $self->redirect_to_urlbase();
- }
-
# Check for errors
# All of the Bugzilla code wants to do this, so do it here instead of
# in each script
@@ -539,7 +542,7 @@ sub redirect_to_urlbase {
sub url_is_attachment_base {
my ($self, $id) = @_;
- return 0 if !use_attachbase() or !i_am_cgi();
+ return 0 unless use_attachbase() && i_am_cgi();
my $attach_base = Bugzilla->params->{'attachment_base'};
# If we're passed an id, we only want one specific attachment base
# for a particular bug. If we're not passed an ID, we just want to
@@ -556,7 +559,20 @@ sub url_is_attachment_base {
$regex =~ s/\\\%bugid\\\%/\\d+/;
}
$regex = "^$regex";
- return ($self->url =~ $regex) ? 1 : 0;
+
+ my $url = $self->url;
+
+ # If we are behind a reverse proxy, we need to determine the original
+ # URL, else the comparison with the attachment_base URL will fail.
+ if (Bugzilla->params->{'inbound_proxies'}) {
+ # X-Forwarded-Proto is defined in RFC 7239.
+ my $protocol = $ENV{HTTP_X_FORWARDED_PROTO} || $self->protocol;
+ my $host = $self->virtual_host;
+ # X-Forwarded-URI is not standard.
+ my $uri = $ENV{HTTP_X_FORWARDED_URI} || $self->request_uri || '';
+ $url = "$protocol://$host$uri";
+ }
+ return ($url =~ $regex) ? 1 : 0;
}
sub set_dated_content_disp {
diff --git a/Bugzilla/Util.pm b/Bugzilla/Util.pm
index e030ff8a8..06022ce7c 100644
--- a/Bugzilla/Util.pm
+++ b/Bugzilla/Util.pm
@@ -250,29 +250,36 @@ sub i_am_webservice {
sub do_ssl_redirect_if_required {
return if !i_am_cgi();
return if !Bugzilla->params->{'ssl_redirect'};
+ return if !Bugzilla->params->{'sslbase'};
- my $sslbase = Bugzilla->params->{'sslbase'};
-
# If we're already running under SSL, never redirect.
+ if (Bugzilla->params->{'inbound_proxies'}
+ && uc($ENV{HTTP_X_FORWARDED_PROTO} || '') eq 'HTTPS') {
+ return;
+ }
return if uc($ENV{HTTPS} || '') eq 'ON';
- # Never redirect if there isn't an sslbase.
- return if !$sslbase;
- Bugzilla->cgi->redirect_to_https();
+
+ # If called from Bugzilla::CGI->new itself, use the newly created
+ # CGI object, to avoid deep recursions.
+ my $cgi = shift || Bugzilla->cgi;
+ $cgi->redirect_to_https();
}
sub correct_urlbase {
- my $ssl = Bugzilla->params->{'ssl_redirect'};
my $urlbase = Bugzilla->params->{'urlbase'};
my $sslbase = Bugzilla->params->{'sslbase'};
if (!$sslbase) {
return $urlbase;
}
- elsif ($ssl) {
+ elsif (Bugzilla->params->{'ssl_redirect'}) {
return $sslbase;
}
+ # Return what the user currently uses.
+ elsif (Bugzilla->params->{'inbound_proxies'}) {
+ return (uc($ENV{HTTP_X_FORWARDED_PROTO} || '') eq 'HTTPS') ? $sslbase : $urlbase;
+ }
else {
- # Return what the user currently uses.
return (uc($ENV{HTTPS} || '') eq 'ON') ? $sslbase : $urlbase;
}
}