import os import sys import subprocess import textwrap from pathlib import Path import pytest REPO_ROOT = Path(__file__).resolve().parents[3] def _merge_pythonpath(env: dict[str, str]) -> dict[str, str]: env.pop("DATA_DIR", None) pythonpath = env.get("PYTHONPATH", "") if pythonpath: env["PYTHONPATH"] = f"{REPO_ROOT}{os.pathsep}{pythonpath}" else: env["PYTHONPATH"] = str(REPO_ROOT) return env def _run_python(script: str, cwd: Path, timeout: int = 60, env_overrides: dict[str, str] | None = None) -> subprocess.CompletedProcess: env = _merge_pythonpath(os.environ.copy()) if env_overrides: env.update(env_overrides) return subprocess.run( [sys.executable, "-"], cwd=cwd, env=env, input=script, capture_output=True, text=True, timeout=timeout, ) def _build_script(body: str) -> str: prelude = textwrap.dedent( """ import os from pathlib import Path os.environ.setdefault("DJANGO_SETTINGS_MODULE", "archivebox.core.settings") import django django.setup() from django.test import Client from django.contrib.auth import get_user_model from archivebox.core.models import Snapshot, ArchiveResult from archivebox.crawls.models import Crawl from archivebox.config.common import SERVER_CONFIG from archivebox.core.host_utils import ( get_admin_host, get_api_host, get_web_host, get_snapshot_host, get_original_host, get_listen_subdomain, split_host_port, host_matches, is_snapshot_subdomain, build_snapshot_url, ) def response_body(resp): if getattr(resp, "streaming", False): return b"".join(resp.streaming_content) return resp.content def ensure_admin_user(): User = get_user_model() admin, _ = User.objects.get_or_create( username="testadmin", defaults={"email": "admin@example.com", "is_staff": True, "is_superuser": True}, ) admin.set_password("testpassword") admin.save() return admin def get_snapshot(): snapshot = Snapshot.objects.order_by("-created_at").first() if snapshot is None: admin = ensure_admin_user() crawl = Crawl.objects.create( urls="https://example.com", created_by=admin, ) snapshot = Snapshot.objects.create( url="https://example.com", title="Example Domain", crawl=crawl, status=Snapshot.StatusChoices.SEALED, ) snapshot_dir = Path(snapshot.output_dir) snapshot_dir.mkdir(parents=True, exist_ok=True) (snapshot_dir / "index.json").write_text('{"url": "https://example.com"}', encoding="utf-8") (snapshot_dir / "favicon.ico").write_bytes(b"ico") screenshot_dir = snapshot_dir / "screenshot" screenshot_dir.mkdir(parents=True, exist_ok=True) (screenshot_dir / "screenshot.png").write_bytes(b"png") responses_root = snapshot_dir / "responses" / snapshot.domain responses_root.mkdir(parents=True, exist_ok=True) (responses_root / "index.html").write_text( "
Response Danger
", encoding="utf-8", ) return "dangerous.html", "safe.json", "dangerous-response" """ ) return prelude + "\n" + textwrap.dedent(body) class TestUrlRouting: data_dir: Path @pytest.fixture(autouse=True) def _setup_data_dir(self, initialized_archive: Path) -> None: self.data_dir = initialized_archive def _run(self, body: str, timeout: int = 120, mode: str | None = None) -> None: script = _build_script(body) env_overrides = {"SERVER_SECURITY_MODE": mode} if mode else None result = _run_python(script, cwd=self.data_dir, timeout=timeout, env_overrides=env_overrides) assert result.returncode == 0, result.stderr assert "OK" in result.stdout def test_host_utils_and_public_redirect(self) -> None: self._run( """ snapshot = get_snapshot() snapshot_id = str(snapshot.id) domain = snapshot.domain web_host = get_web_host() admin_host = get_admin_host() api_host = get_api_host() snapshot_host = get_snapshot_host(snapshot_id) original_host = get_original_host(domain) base_host = SERVER_CONFIG.LISTEN_HOST host_only, port = split_host_port(base_host) assert host_only == "archivebox.localhost" assert port == "8000" assert web_host == "web.archivebox.localhost:8000" assert admin_host == "admin.archivebox.localhost:8000" assert api_host == "api.archivebox.localhost:8000" assert snapshot_host == f"{snapshot_id}.archivebox.localhost:8000" assert original_host == f"{domain}.archivebox.localhost:8000" assert get_listen_subdomain(web_host) == "web" assert get_listen_subdomain(admin_host) == "admin" assert get_listen_subdomain(api_host) == "api" assert get_listen_subdomain(snapshot_host) == snapshot_id assert get_listen_subdomain(original_host) == domain assert get_listen_subdomain(base_host) == "" assert host_matches(web_host, get_web_host()) assert is_snapshot_subdomain(snapshot_id) client = Client() resp = client.get("/public.html", HTTP_HOST=web_host) assert resp.status_code in (301, 302) assert resp["Location"].endswith("/public/") resp = client.get("/public/", HTTP_HOST=base_host) assert resp.status_code in (301, 302) assert resp["Location"].startswith(f"http://{web_host}/public/") resp = client.get("/", HTTP_HOST=api_host) assert resp.status_code in (301, 302) assert resp["Location"].startswith("/api/") print("OK") """ ) def test_web_admin_routing(self) -> None: self._run( """ ensure_admin_user() client = Client() web_host = get_web_host() admin_host = get_admin_host() resp = client.get("/admin/login/", HTTP_HOST=web_host) assert resp.status_code in (301, 302) assert admin_host in resp["Location"] resp = client.get("/admin/login/", HTTP_HOST=admin_host) assert resp.status_code == 200 print("OK") """ ) def test_snapshot_routing_and_hosts(self) -> None: self._run( """ snapshot = get_snapshot() output_rel, response_file, response_rel, response_output_path = get_snapshot_files(snapshot) snapshot_id = str(snapshot.id) snapshot_host = get_snapshot_host(snapshot_id) original_host = get_original_host(snapshot.domain) web_host = get_web_host() client = Client() snapshot_path = f"/{snapshot.url_path}/" resp = client.get(snapshot_path, HTTP_HOST=web_host) assert resp.status_code == 200 resp = client.get(f"/web/{snapshot.domain}", HTTP_HOST=web_host) assert resp.status_code in (301, 302) assert resp["Location"].endswith(f"/{snapshot.url_path}") resp = client.get(f"/{snapshot.url_path}", HTTP_HOST=web_host) assert resp.status_code == 200 date_segment = snapshot.url_path.split("/")[1] resp = client.get(f"/web/{date_segment}/{date_segment}/{snapshot_id}/", HTTP_HOST=web_host) assert resp.status_code == 404 resp = client.get(f"/{snapshot.url_path}/{output_rel}", HTTP_HOST=web_host) assert resp.status_code in (301, 302) assert snapshot_host in resp["Location"] resp = client.get(f"/{output_rel}", HTTP_HOST=snapshot_host) assert resp.status_code == 200 assert response_body(resp) == Path(snapshot.output_dir, output_rel).read_bytes() resp = client.get(f"/{response_rel}", HTTP_HOST=snapshot_host) assert resp.status_code == 200 snapshot_body = response_body(resp) if response_output_path.exists(): assert snapshot_body == response_output_path.read_bytes() else: assert snapshot_body == response_file.read_bytes() resp = client.get(f"/{response_rel}", HTTP_HOST=original_host) assert resp.status_code == 200 assert response_body(resp) == response_file.read_bytes() print("OK") """ ) def test_safe_subdomains_fullreplay_leaves_risky_replay_unrestricted(self) -> None: self._run( """ snapshot = get_snapshot() dangerous_rel, safe_json_rel, sniffed_rel = write_replay_fixtures(snapshot) snapshot_host = get_snapshot_host(str(snapshot.id)) client = Client() resp = client.get(f"/{dangerous_rel}", HTTP_HOST=snapshot_host) assert resp.status_code == 200 assert resp.headers.get("Content-Security-Policy") is None assert resp.headers.get("X-Content-Type-Options") == "nosniff" resp = client.get(f"/{safe_json_rel}", HTTP_HOST=snapshot_host) assert resp.status_code == 200 assert resp.headers.get("Content-Security-Policy") is None resp = client.get(f"/{sniffed_rel}", HTTP_HOST=snapshot_host) assert resp.status_code == 200 assert resp.headers.get("Content-Security-Policy") is None print("OK") """ ) def test_safe_onedomain_nojsreplay_routes_and_neuters_risky_documents(self) -> None: self._run( """ ensure_admin_user() snapshot = get_snapshot() dangerous_rel, safe_json_rel, sniffed_rel = write_replay_fixtures(snapshot) snapshot_id = str(snapshot.id) client = Client() base_host = SERVER_CONFIG.LISTEN_HOST web_host = get_web_host() admin_host = get_admin_host() api_host = get_api_host() assert SERVER_CONFIG.SERVER_SECURITY_MODE == "safe-onedomain-nojsreplay" assert web_host == base_host assert admin_host == base_host assert api_host == base_host assert get_snapshot_host(snapshot_id) == base_host assert get_original_host(snapshot.domain) == base_host assert get_listen_subdomain(base_host) == "" replay_url = build_snapshot_url(snapshot_id, dangerous_rel) assert replay_url == f"http://{base_host}/snapshot/{snapshot_id}/{dangerous_rel}" resp = client.get(f"/{snapshot.url_path}/{dangerous_rel}", HTTP_HOST=base_host) assert resp.status_code in (301, 302) assert resp["Location"] == replay_url resp = client.get("/admin/login/", HTTP_HOST=base_host) assert resp.status_code == 200 resp = client.get("/api/v1/docs", HTTP_HOST=base_host) assert resp.status_code == 200 resp = client.get(f"/snapshot/{snapshot_id}/{dangerous_rel}", HTTP_HOST=base_host) assert resp.status_code == 200 csp = resp.headers.get("Content-Security-Policy") or "" assert "sandbox" in csp assert "script-src 'none'" in csp assert resp.headers.get("X-Content-Type-Options") == "nosniff" resp = client.get(f"/snapshot/{snapshot_id}/{safe_json_rel}", HTTP_HOST=base_host) assert resp.status_code == 200 assert resp.headers.get("Content-Security-Policy") is None assert resp.headers.get("X-Content-Type-Options") == "nosniff" resp = client.get(f"/snapshot/{snapshot_id}/{sniffed_rel}", HTTP_HOST=base_host) assert resp.status_code == 200 csp = resp.headers.get("Content-Security-Policy") or "" assert "sandbox" in csp assert "script-src 'none'" in csp print("OK") """, mode="safe-onedomain-nojsreplay", ) def test_unsafe_onedomain_noadmin_blocks_control_plane_and_unsafe_methods(self) -> None: self._run( """ ensure_admin_user() snapshot = get_snapshot() dangerous_rel, _, _ = write_replay_fixtures(snapshot) snapshot_id = str(snapshot.id) client = Client() base_host = SERVER_CONFIG.LISTEN_HOST assert SERVER_CONFIG.SERVER_SECURITY_MODE == "unsafe-onedomain-noadmin" assert SERVER_CONFIG.CONTROL_PLANE_ENABLED is False assert SERVER_CONFIG.BLOCK_UNSAFE_METHODS is True assert get_web_host() == base_host assert get_admin_host() == base_host assert get_api_host() == base_host for blocked_path in ("/admin/login/", "/api/v1/docs", "/add/", f"/web/{snapshot.domain}"): resp = client.get(blocked_path, HTTP_HOST=base_host) assert resp.status_code == 403, (blocked_path, resp.status_code) resp = client.post("/public/", data="x=1", content_type="application/x-www-form-urlencoded", HTTP_HOST=base_host) assert resp.status_code == 403 resp = client.get(f"/snapshot/{snapshot_id}/{dangerous_rel}", HTTP_HOST=base_host) assert resp.status_code == 200 assert resp.headers.get("Content-Security-Policy") is None assert resp.headers.get("X-Content-Type-Options") == "nosniff" print("OK") """, mode="unsafe-onedomain-noadmin", ) def test_danger_onedomain_fullreplay_keeps_control_plane_and_raw_replay(self) -> None: self._run( """ ensure_admin_user() snapshot = get_snapshot() dangerous_rel, _, _ = write_replay_fixtures(snapshot) snapshot_id = str(snapshot.id) client = Client() base_host = SERVER_CONFIG.LISTEN_HOST assert SERVER_CONFIG.SERVER_SECURITY_MODE == "danger-onedomain-fullreplay" assert SERVER_CONFIG.CONTROL_PLANE_ENABLED is True assert get_web_host() == base_host assert get_admin_host() == base_host assert get_api_host() == base_host assert build_snapshot_url(snapshot_id, dangerous_rel) == f"http://{base_host}/snapshot/{snapshot_id}/{dangerous_rel}" resp = client.get("/admin/login/", HTTP_HOST=base_host) assert resp.status_code == 200 resp = client.get("/api/v1/docs", HTTP_HOST=base_host) assert resp.status_code == 200 payload = '{"username": "testadmin", "password": "testpassword"}' resp = client.post( "/api/v1/auth/get_api_token", data=payload, content_type="application/json", HTTP_HOST=base_host, ) assert resp.status_code == 200 assert resp.json().get("token") resp = client.get(f"/snapshot/{snapshot_id}/{dangerous_rel}", HTTP_HOST=base_host) assert resp.status_code == 200 assert resp.headers.get("Content-Security-Policy") is None assert resp.headers.get("X-Content-Type-Options") == "nosniff" print("OK") """, mode="danger-onedomain-fullreplay", ) def test_template_and_admin_links(self) -> None: self._run( """ ensure_admin_user() snapshot = get_snapshot() snapshot.write_html_details() snapshot_id = str(snapshot.id) snapshot_host = get_snapshot_host(snapshot_id) admin_host = get_admin_host() web_host = get_web_host() client = Client() resp = client.get("/public/", HTTP_HOST=web_host) assert resp.status_code == 200 public_html = response_body(resp).decode("utf-8", "ignore") assert "http://web.archivebox.localhost:8000" in public_html resp = client.get(f"/{snapshot.url_path}/index.html", HTTP_HOST=web_host) assert resp.status_code == 200 live_html = response_body(resp).decode("utf-8", "ignore") assert f"http://{snapshot_host}/" in live_html assert "http://web.archivebox.localhost:8000" in live_html static_html = Path(snapshot.output_dir, "index.html").read_text(encoding="utf-8", errors="ignore") assert f"http://{snapshot_host}/" in static_html client.login(username="testadmin", password="testpassword") resp = client.get(f"/admin/core/snapshot/{snapshot_id}/change/", HTTP_HOST=admin_host) assert resp.status_code == 200 admin_html = response_body(resp).decode("utf-8", "ignore") assert f"http://web.archivebox.localhost:8000/{snapshot.archive_path}" in admin_html assert f"http://{snapshot_host}/" in admin_html result = ArchiveResult.objects.filter(snapshot=snapshot).first() assert result is not None resp = client.get(f"/admin/core/archiveresult/{result.id}/change/", HTTP_HOST=admin_host) assert resp.status_code == 200 ar_html = response_body(resp).decode("utf-8", "ignore") assert f"http://{snapshot_host}/" in ar_html print("OK") """ ) def test_api_available_on_admin_and_api_hosts(self) -> None: self._run( """ client = Client() admin_host = get_admin_host() api_host = get_api_host() resp = client.get("/api/v1/docs", HTTP_HOST=admin_host) assert resp.status_code == 200 resp = client.get("/api/v1/docs", HTTP_HOST=api_host) assert resp.status_code == 200 print("OK") """ ) def test_api_auth_token_endpoint_available_on_admin_and_api_hosts(self) -> None: self._run( """ ensure_admin_user() client = Client() admin_host = get_admin_host() api_host = get_api_host() payload = '{"username": "testadmin", "password": "testpassword"}' resp = client.post( "/api/v1/auth/get_api_token", data=payload, content_type="application/json", HTTP_HOST=admin_host, ) assert resp.status_code == 200 data = resp.json() assert data.get("token") resp = client.post( "/api/v1/auth/get_api_token", data=payload, content_type="application/json", HTTP_HOST=api_host, ) assert resp.status_code == 200 data = resp.json() assert data.get("token") print("OK") """ ) def test_api_post_with_token_on_admin_and_api_hosts(self) -> None: self._run( """ ensure_admin_user() from archivebox.api.auth import get_or_create_api_token token = get_or_create_api_token(get_user_model().objects.get(username="testadmin")) assert token is not None client = Client() admin_host = get_admin_host() api_host = get_api_host() payload = '{"name": "apitest-tag"}' headers = {"HTTP_X_ARCHIVEBOX_API_KEY": token.token} resp = client.post( "/api/v1/core/tags/create/", data=payload, content_type="application/json", HTTP_HOST=admin_host, **headers, ) assert resp.status_code == 200 data = resp.json() assert data.get("success") is True assert data.get("tag_name") == "apitest-tag" resp = client.post( "/api/v1/core/tags/create/", data=payload, content_type="application/json", HTTP_HOST=api_host, **headers, ) assert resp.status_code == 200 data = resp.json() assert data.get("success") is True assert data.get("tag_name") == "apitest-tag" print("OK") """ )