csrf-origin-guard.test.ts 3.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133
  1. import { afterEach, describe, expect, it } from "vitest";
  2. import { createCsrfOriginGuard } from "@/lib/security/csrf-origin-guard";
  3. function createRequest(headers: Record<string, string>) {
  4. return {
  5. headers: new Headers(headers),
  6. };
  7. }
  8. describe("createCsrfOriginGuard", () => {
  9. const originalNodeEnv = process.env.NODE_ENV;
  10. afterEach(() => {
  11. process.env.NODE_ENV = originalNodeEnv;
  12. });
  13. it("allows same-origin request when allowSameOrigin is enabled", () => {
  14. const guard = createCsrfOriginGuard({
  15. allowedOrigins: [],
  16. allowSameOrigin: true,
  17. enforceInDevelopment: true,
  18. });
  19. const result = guard.check(
  20. createRequest({
  21. "sec-fetch-site": "same-origin",
  22. })
  23. );
  24. expect(result).toEqual({ allowed: true });
  25. });
  26. it("allows request when Origin is in allowlist", () => {
  27. const origin = "https://example.com";
  28. const guard = createCsrfOriginGuard({
  29. allowedOrigins: [origin],
  30. allowSameOrigin: false,
  31. enforceInDevelopment: true,
  32. });
  33. const result = guard.check(
  34. createRequest({
  35. "sec-fetch-site": "cross-site",
  36. origin,
  37. })
  38. );
  39. expect(result).toEqual({ allowed: true });
  40. });
  41. it("blocks request when Origin is not in allowlist", () => {
  42. const guard = createCsrfOriginGuard({
  43. allowedOrigins: ["https://allowed.example.com"],
  44. allowSameOrigin: false,
  45. enforceInDevelopment: true,
  46. });
  47. const result = guard.check(
  48. createRequest({
  49. origin: "https://evil.example.com",
  50. })
  51. );
  52. expect(result.allowed).toBe(false);
  53. expect(result.reason).toBe("Origin https://evil.example.com not in allowlist");
  54. });
  55. it("allows request without Origin header", () => {
  56. const guard = createCsrfOriginGuard({
  57. allowedOrigins: [],
  58. allowSameOrigin: true,
  59. enforceInDevelopment: true,
  60. });
  61. const result = guard.check(createRequest({}));
  62. expect(result).toEqual({ allowed: true });
  63. });
  64. it("blocks cross-site request when Origin header is missing", () => {
  65. const guard = createCsrfOriginGuard({
  66. allowedOrigins: ["https://example.com"],
  67. allowSameOrigin: true,
  68. enforceInDevelopment: true,
  69. });
  70. const result = guard.check(
  71. createRequest({
  72. "sec-fetch-site": "cross-site",
  73. })
  74. );
  75. expect(result.allowed).toBe(false);
  76. expect(result.reason).toBe("Cross-site request blocked: missing Origin header");
  77. });
  78. it("matches allowedOrigins case-insensitively", () => {
  79. const guard = createCsrfOriginGuard({
  80. allowedOrigins: ["https://Example.COM"],
  81. allowSameOrigin: false,
  82. enforceInDevelopment: true,
  83. });
  84. const result = guard.check(
  85. createRequest({
  86. "sec-fetch-site": "cross-site",
  87. origin: "https://example.com",
  88. })
  89. );
  90. expect(result).toEqual({ allowed: true });
  91. });
  92. it("bypasses guard in development when enforceInDevelopment is disabled", () => {
  93. process.env.NODE_ENV = "development";
  94. const guard = createCsrfOriginGuard({
  95. allowedOrigins: ["https://allowed.example.com"],
  96. allowSameOrigin: false,
  97. enforceInDevelopment: false,
  98. });
  99. const result = guard.check(
  100. createRequest({
  101. "sec-fetch-site": "cross-site",
  102. origin: "https://evil.example.com",
  103. })
  104. );
  105. expect(result.allowed).toBe(true);
  106. expect(result.reason).toBe("csrf_guard_bypassed_in_development");
  107. });
  108. });