mirror of
https://github.com/google-gemini/gemini-cli.git
synced 2026-03-11 14:40:52 -07:00
286 lines
7.5 KiB
TypeScript
286 lines
7.5 KiB
TypeScript
/**
|
|
* @license
|
|
* Copyright 2025 Google LLC
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*/
|
|
|
|
import { getErrorMessage, isNodeError } from './errors.js';
|
|
import { URL } from 'node:url';
|
|
import * as dns from 'node:dns';
|
|
import { lookup } from 'node:dns/promises';
|
|
import { Agent, ProxyAgent, setGlobalDispatcher } from 'undici';
|
|
|
|
const DEFAULT_HEADERS_TIMEOUT = 300000; // 5 minutes
|
|
const DEFAULT_BODY_TIMEOUT = 300000; // 5 minutes
|
|
|
|
// Configure default global dispatcher with higher timeouts
|
|
setGlobalDispatcher(
|
|
new Agent({
|
|
headersTimeout: DEFAULT_HEADERS_TIMEOUT,
|
|
bodyTimeout: DEFAULT_BODY_TIMEOUT,
|
|
}),
|
|
);
|
|
|
|
const PRIVATE_IP_RANGES = [
|
|
/^10\./,
|
|
/^127\./,
|
|
/^0\./,
|
|
/^100\.(6[4-9]|[7-9][0-9]|1[0-1][0-9]|12[0-7])\./,
|
|
/^169\.254\./,
|
|
/^172\.(1[6-9]|2[0-9]|3[0-1])\./,
|
|
/^192\.0\.(0|2)\./,
|
|
/^192\.88\.99\./,
|
|
/^192\.168\./,
|
|
/^198\.(1[8-9]|51\.100)\./,
|
|
/^203\.0\.113\./,
|
|
/^2(2[4-9]|3[0-9]|[4-5][0-9])\./,
|
|
/^::1$/,
|
|
/^::$/,
|
|
/^f[cd]00:/i, // fc00::/7 (ULA)
|
|
/^fe[89ab][0-9a-f]:/i, // fe80::/10 (Link-local)
|
|
/^::ffff:(10\.|127\.|0\.|100\.(6[4-9]|[7-9][0-9]|1[0-1][0-9]|12[0-7])\.|169\.254\.|172\.(1[6-9]|2[0-9]|3[0-1])\.|192\.0\.(0|2)\.|192\.88\.99\.|192\.168\.|198\.(1[8-9]|51\.100)\.|203\.0\.113\.|2(2[4-9]|3[0-9]|[4-5][0-9])\.|a9fe:|ac1[0-9a-f]:|c0a8:|0+:)/i, // IPv4-mapped IPv6
|
|
];
|
|
|
|
// Local extension of RequestInit to support Node.js/undici dispatcher
|
|
interface NodeFetchInit extends RequestInit {
|
|
dispatcher?: Agent | ProxyAgent;
|
|
}
|
|
|
|
export class FetchError extends Error {
|
|
constructor(
|
|
message: string,
|
|
public code?: string,
|
|
options?: ErrorOptions,
|
|
) {
|
|
super(message, options);
|
|
this.name = 'FetchError';
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Sanitizes a hostname by stripping IPv6 brackets if present.
|
|
*/
|
|
export function sanitizeHostname(hostname: string): string {
|
|
return hostname.startsWith('[') && hostname.endsWith(']')
|
|
? hostname.slice(1, -1)
|
|
: hostname;
|
|
}
|
|
|
|
/**
|
|
* Checks if a hostname is a local loopback address allowed for development/testing.
|
|
*/
|
|
export function isLoopbackHost(hostname: string): boolean {
|
|
const sanitized = sanitizeHostname(hostname);
|
|
return (
|
|
sanitized === 'localhost' ||
|
|
sanitized === '127.0.0.1' ||
|
|
sanitized === '::1'
|
|
);
|
|
}
|
|
|
|
/**
|
|
* A custom DNS lookup implementation for undici agents that prevents
|
|
* connection to private IP ranges (SSRF protection).
|
|
*/
|
|
export function safeLookup(
|
|
hostname: string,
|
|
options: dns.LookupOptions | number | null | undefined,
|
|
callback: (
|
|
err: Error | null,
|
|
addresses: Array<{ address: string; family: number }>,
|
|
) => void,
|
|
): void {
|
|
// Use the callback-based dns.lookup to match undici's expected signature.
|
|
// We explicitly handle the 'all' option to ensure we get an array of addresses.
|
|
const lookupOptions =
|
|
typeof options === 'number' ? { family: options } : { ...options };
|
|
const finalOptions = { ...lookupOptions, all: true };
|
|
|
|
dns.lookup(hostname, finalOptions, (err, addresses) => {
|
|
if (err) {
|
|
callback(err, []);
|
|
return;
|
|
}
|
|
|
|
const addressArray = Array.isArray(addresses) ? addresses : [];
|
|
const filtered = addressArray.filter(
|
|
(addr) => !isAddressPrivate(addr.address) || isLoopbackHost(hostname),
|
|
);
|
|
|
|
if (filtered.length === 0 && addressArray.length > 0) {
|
|
callback(new Error(`Refusing to connect to private IP address`), []);
|
|
return;
|
|
}
|
|
|
|
callback(null, filtered);
|
|
});
|
|
}
|
|
|
|
// Dedicated dispatcher with connection-level SSRF protection (safeLookup)
|
|
const safeDispatcher = new Agent({
|
|
headersTimeout: DEFAULT_HEADERS_TIMEOUT,
|
|
bodyTimeout: DEFAULT_BODY_TIMEOUT,
|
|
connect: {
|
|
lookup: safeLookup,
|
|
},
|
|
});
|
|
|
|
export function isPrivateIp(url: string): boolean {
|
|
try {
|
|
const hostname = new URL(url).hostname;
|
|
return isAddressPrivate(hostname);
|
|
} catch (_e) {
|
|
return false;
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Checks if a URL resolves to a private IP address.
|
|
* Performs DNS resolution to prevent DNS rebinding/SSRF bypasses.
|
|
*/
|
|
export async function isPrivateIpAsync(url: string): Promise<boolean> {
|
|
try {
|
|
const parsed = new URL(url);
|
|
const hostname = parsed.hostname;
|
|
|
|
// Fast check for literal IPs or localhost
|
|
if (isAddressPrivate(hostname)) {
|
|
return true;
|
|
}
|
|
|
|
// Resolve DNS to check the actual target IP
|
|
const addresses = await lookup(hostname, { all: true });
|
|
return addresses.some((addr) => isAddressPrivate(addr.address));
|
|
} catch (e) {
|
|
if (
|
|
e instanceof Error &&
|
|
e.name === 'TypeError' &&
|
|
e.message.includes('Invalid URL')
|
|
) {
|
|
return false;
|
|
}
|
|
throw new Error(`Failed to verify if URL resolves to private IP: ${url}`, {
|
|
cause: e,
|
|
});
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Internal helper to check if an IP address string is in a private range.
|
|
*/
|
|
export function isAddressPrivate(address: string): boolean {
|
|
const sanitized = sanitizeHostname(address);
|
|
|
|
return (
|
|
sanitized === 'localhost' ||
|
|
PRIVATE_IP_RANGES.some((range) => range.test(sanitized))
|
|
);
|
|
}
|
|
|
|
/**
|
|
* Enhanced fetch with SSRF protection.
|
|
* Prevents access to private/internal networks at the connection level.
|
|
*/
|
|
export async function safeFetch(
|
|
url: string | URL,
|
|
init?: RequestInit,
|
|
): Promise<Response> {
|
|
const nodeInit: NodeFetchInit = {
|
|
...init,
|
|
dispatcher: safeDispatcher,
|
|
};
|
|
|
|
try {
|
|
return await fetch(url, nodeInit);
|
|
} catch (error) {
|
|
if (error instanceof Error) {
|
|
// Re-map refusing to connect errors to standard FetchError
|
|
if (error.message.includes('Refusing to connect to private IP address')) {
|
|
throw new FetchError(
|
|
`Access to private network is blocked: ${url.toString()}`,
|
|
'ERR_PRIVATE_NETWORK',
|
|
{ cause: error },
|
|
);
|
|
}
|
|
throw new FetchError(
|
|
getErrorMessage(error),
|
|
isNodeError(error) ? error.code : undefined,
|
|
{ cause: error },
|
|
);
|
|
}
|
|
throw new FetchError(String(error));
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Creates an undici ProxyAgent that incorporates safe DNS lookup.
|
|
*/
|
|
export function createSafeProxyAgent(proxyUrl: string): ProxyAgent {
|
|
return new ProxyAgent({
|
|
uri: proxyUrl,
|
|
connect: {
|
|
lookup: safeLookup,
|
|
},
|
|
});
|
|
}
|
|
|
|
/**
|
|
* Performs a fetch with a specified timeout and connection-level SSRF protection.
|
|
*/
|
|
export async function fetchWithTimeout(
|
|
url: string,
|
|
timeout: number,
|
|
options?: RequestInit,
|
|
): Promise<Response> {
|
|
const controller = new AbortController();
|
|
const timeoutId = setTimeout(() => controller.abort(), timeout);
|
|
|
|
if (options?.signal) {
|
|
if (options.signal.aborted) {
|
|
controller.abort();
|
|
} else {
|
|
options.signal.addEventListener('abort', () => controller.abort(), {
|
|
once: true,
|
|
});
|
|
}
|
|
}
|
|
|
|
const nodeInit: NodeFetchInit = {
|
|
...options,
|
|
signal: controller.signal,
|
|
dispatcher: safeDispatcher,
|
|
};
|
|
|
|
try {
|
|
const response = await fetch(url, nodeInit);
|
|
return response;
|
|
} catch (error) {
|
|
if (isNodeError(error) && error.code === 'ABORT_ERR') {
|
|
throw new FetchError(`Request timed out after ${timeout}ms`, 'ETIMEDOUT');
|
|
}
|
|
if (
|
|
error instanceof Error &&
|
|
error.message.includes('Refusing to connect to private IP address')
|
|
) {
|
|
throw new FetchError(
|
|
`Access to private network is blocked: ${url}`,
|
|
'ERR_PRIVATE_NETWORK',
|
|
{ cause: error },
|
|
);
|
|
}
|
|
throw new FetchError(getErrorMessage(error), undefined, { cause: error });
|
|
} finally {
|
|
clearTimeout(timeoutId);
|
|
}
|
|
}
|
|
|
|
export function setGlobalProxy(proxy: string) {
|
|
setGlobalDispatcher(
|
|
new ProxyAgent({
|
|
uri: proxy,
|
|
headersTimeout: DEFAULT_HEADERS_TIMEOUT,
|
|
bodyTimeout: DEFAULT_BODY_TIMEOUT,
|
|
}),
|
|
);
|
|
}
|