| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259 |
- import { afterEach, describe, expect, it } from "vitest";
- import { createCsrfOriginGuard } from "@/lib/security/csrf-origin-guard";
- function createRequest(headers: Record<string, string>) {
- return {
- headers: new Headers(headers),
- };
- }
- describe("createCsrfOriginGuard", () => {
- const originalNodeEnv = process.env.NODE_ENV;
- afterEach(() => {
- process.env.NODE_ENV = originalNodeEnv;
- });
- it("allows same-origin request when allowSameOrigin is enabled", () => {
- const guard = createCsrfOriginGuard({
- allowedOrigins: [],
- allowSameOrigin: true,
- enforceInDevelopment: true,
- });
- const result = guard.check(
- createRequest({
- "sec-fetch-site": "same-origin",
- })
- );
- expect(result).toEqual({ allowed: true });
- });
- it("allows request when Origin is in allowlist", () => {
- const origin = "https://example.com";
- const guard = createCsrfOriginGuard({
- allowedOrigins: [origin],
- allowSameOrigin: false,
- enforceInDevelopment: true,
- });
- const result = guard.check(
- createRequest({
- "sec-fetch-site": "cross-site",
- origin,
- })
- );
- expect(result).toEqual({ allowed: true });
- });
- it("blocks request when Origin is not in allowlist", () => {
- const guard = createCsrfOriginGuard({
- allowedOrigins: ["https://allowed.example.com"],
- allowSameOrigin: false,
- enforceInDevelopment: true,
- });
- const result = guard.check(
- createRequest({
- origin: "https://evil.example.com",
- })
- );
- expect(result.allowed).toBe(false);
- expect(result.reason).toBe("Origin https://evil.example.com not in allowlist");
- });
- it("allows request without Origin header", () => {
- const guard = createCsrfOriginGuard({
- allowedOrigins: [],
- allowSameOrigin: true,
- enforceInDevelopment: true,
- });
- const result = guard.check(createRequest({}));
- expect(result).toEqual({ allowed: true });
- });
- it("blocks cross-site request when Origin header is missing", () => {
- const guard = createCsrfOriginGuard({
- allowedOrigins: ["https://example.com"],
- allowSameOrigin: true,
- enforceInDevelopment: true,
- });
- const result = guard.check(
- createRequest({
- "sec-fetch-site": "cross-site",
- })
- );
- expect(result.allowed).toBe(false);
- expect(result.reason).toBe("Cross-site request blocked: missing Origin header");
- });
- it("matches allowedOrigins case-insensitively", () => {
- const guard = createCsrfOriginGuard({
- allowedOrigins: ["https://Example.COM"],
- allowSameOrigin: false,
- enforceInDevelopment: true,
- });
- const result = guard.check(
- createRequest({
- "sec-fetch-site": "cross-site",
- origin: "https://example.com",
- })
- );
- expect(result).toEqual({ allowed: true });
- });
- it("bypasses guard in development when enforceInDevelopment is disabled", () => {
- process.env.NODE_ENV = "development";
- const guard = createCsrfOriginGuard({
- allowedOrigins: ["https://allowed.example.com"],
- allowSameOrigin: false,
- enforceInDevelopment: false,
- });
- const result = guard.check(
- createRequest({
- "sec-fetch-site": "cross-site",
- origin: "https://evil.example.com",
- })
- );
- expect(result.allowed).toBe(true);
- expect(result.reason).toBe("csrf_guard_bypassed_in_development");
- });
- describe("origin-vs-host fallback", () => {
- it("allows request when origin matches host header (no sec-fetch-site)", () => {
- const guard = createCsrfOriginGuard({
- allowedOrigins: [],
- allowSameOrigin: true,
- enforceInDevelopment: true,
- });
- const result = guard.check(
- createRequest({
- origin: "http://192.168.1.100:13500",
- host: "192.168.1.100:13500",
- })
- );
- expect(result).toEqual({ allowed: true });
- });
- it("allows request when origin matches x-forwarded-host (reverse proxy)", () => {
- const guard = createCsrfOriginGuard({
- allowedOrigins: [],
- allowSameOrigin: true,
- enforceInDevelopment: true,
- trustForwardedHost: true,
- });
- const result = guard.check(
- createRequest({
- origin: "http://myapp.example.com",
- host: "localhost:13500",
- "x-forwarded-host": "myapp.example.com",
- })
- );
- expect(result).toEqual({ allowed: true });
- });
- it("uses first value from comma-separated x-forwarded-host", () => {
- const guard = createCsrfOriginGuard({
- allowedOrigins: [],
- allowSameOrigin: true,
- enforceInDevelopment: true,
- trustForwardedHost: true,
- });
- const result = guard.check(
- createRequest({
- origin: "http://front.example.com",
- host: "internal:3000",
- "x-forwarded-host": "front.example.com, proxy.internal",
- })
- );
- expect(result).toEqual({ allowed: true });
- });
- it("ignores x-forwarded-host when trustForwardedHost is false (default)", () => {
- const guard = createCsrfOriginGuard({
- allowedOrigins: [],
- allowSameOrigin: true,
- enforceInDevelopment: true,
- });
- const result = guard.check(
- createRequest({
- origin: "http://myapp.example.com",
- host: "localhost:13500",
- "x-forwarded-host": "myapp.example.com",
- })
- );
- expect(result.allowed).toBe(false);
- });
- it("rejects request when origin does not match host", () => {
- const guard = createCsrfOriginGuard({
- allowedOrigins: [],
- allowSameOrigin: true,
- enforceInDevelopment: true,
- });
- const result = guard.check(
- createRequest({
- origin: "http://evil.example.com",
- host: "myapp.example.com:13500",
- })
- );
- expect(result.allowed).toBe(false);
- });
- it("skips host fallback when allowSameOrigin is false", () => {
- const guard = createCsrfOriginGuard({
- allowedOrigins: [],
- allowSameOrigin: false,
- enforceInDevelopment: true,
- });
- const result = guard.check(
- createRequest({
- origin: "http://192.168.1.100:13500",
- host: "192.168.1.100:13500",
- })
- );
- expect(result.allowed).toBe(false);
- });
- it("handles https origin matching host without explicit port", () => {
- const guard = createCsrfOriginGuard({
- allowedOrigins: [],
- allowSameOrigin: true,
- enforceInDevelopment: true,
- });
- const result = guard.check(
- createRequest({
- origin: "https://example.com",
- host: "example.com",
- })
- );
- expect(result).toEqual({ allowed: true });
- });
- });
- });
|