csrf-origin-guard.test.ts 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259
  1. import { afterEach, describe, expect, it } from "vitest";
  2. import { createCsrfOriginGuard } from "@/lib/security/csrf-origin-guard";
  3. function createRequest(headers: Record<string, string>) {
  4. return {
  5. headers: new Headers(headers),
  6. };
  7. }
  8. describe("createCsrfOriginGuard", () => {
  9. const originalNodeEnv = process.env.NODE_ENV;
  10. afterEach(() => {
  11. process.env.NODE_ENV = originalNodeEnv;
  12. });
  13. it("allows same-origin request when allowSameOrigin is enabled", () => {
  14. const guard = createCsrfOriginGuard({
  15. allowedOrigins: [],
  16. allowSameOrigin: true,
  17. enforceInDevelopment: true,
  18. });
  19. const result = guard.check(
  20. createRequest({
  21. "sec-fetch-site": "same-origin",
  22. })
  23. );
  24. expect(result).toEqual({ allowed: true });
  25. });
  26. it("allows request when Origin is in allowlist", () => {
  27. const origin = "https://example.com";
  28. const guard = createCsrfOriginGuard({
  29. allowedOrigins: [origin],
  30. allowSameOrigin: false,
  31. enforceInDevelopment: true,
  32. });
  33. const result = guard.check(
  34. createRequest({
  35. "sec-fetch-site": "cross-site",
  36. origin,
  37. })
  38. );
  39. expect(result).toEqual({ allowed: true });
  40. });
  41. it("blocks request when Origin is not in allowlist", () => {
  42. const guard = createCsrfOriginGuard({
  43. allowedOrigins: ["https://allowed.example.com"],
  44. allowSameOrigin: false,
  45. enforceInDevelopment: true,
  46. });
  47. const result = guard.check(
  48. createRequest({
  49. origin: "https://evil.example.com",
  50. })
  51. );
  52. expect(result.allowed).toBe(false);
  53. expect(result.reason).toBe("Origin https://evil.example.com not in allowlist");
  54. });
  55. it("allows request without Origin header", () => {
  56. const guard = createCsrfOriginGuard({
  57. allowedOrigins: [],
  58. allowSameOrigin: true,
  59. enforceInDevelopment: true,
  60. });
  61. const result = guard.check(createRequest({}));
  62. expect(result).toEqual({ allowed: true });
  63. });
  64. it("blocks cross-site request when Origin header is missing", () => {
  65. const guard = createCsrfOriginGuard({
  66. allowedOrigins: ["https://example.com"],
  67. allowSameOrigin: true,
  68. enforceInDevelopment: true,
  69. });
  70. const result = guard.check(
  71. createRequest({
  72. "sec-fetch-site": "cross-site",
  73. })
  74. );
  75. expect(result.allowed).toBe(false);
  76. expect(result.reason).toBe("Cross-site request blocked: missing Origin header");
  77. });
  78. it("matches allowedOrigins case-insensitively", () => {
  79. const guard = createCsrfOriginGuard({
  80. allowedOrigins: ["https://Example.COM"],
  81. allowSameOrigin: false,
  82. enforceInDevelopment: true,
  83. });
  84. const result = guard.check(
  85. createRequest({
  86. "sec-fetch-site": "cross-site",
  87. origin: "https://example.com",
  88. })
  89. );
  90. expect(result).toEqual({ allowed: true });
  91. });
  92. it("bypasses guard in development when enforceInDevelopment is disabled", () => {
  93. process.env.NODE_ENV = "development";
  94. const guard = createCsrfOriginGuard({
  95. allowedOrigins: ["https://allowed.example.com"],
  96. allowSameOrigin: false,
  97. enforceInDevelopment: false,
  98. });
  99. const result = guard.check(
  100. createRequest({
  101. "sec-fetch-site": "cross-site",
  102. origin: "https://evil.example.com",
  103. })
  104. );
  105. expect(result.allowed).toBe(true);
  106. expect(result.reason).toBe("csrf_guard_bypassed_in_development");
  107. });
  108. describe("origin-vs-host fallback", () => {
  109. it("allows request when origin matches host header (no sec-fetch-site)", () => {
  110. const guard = createCsrfOriginGuard({
  111. allowedOrigins: [],
  112. allowSameOrigin: true,
  113. enforceInDevelopment: true,
  114. });
  115. const result = guard.check(
  116. createRequest({
  117. origin: "http://192.168.1.100:13500",
  118. host: "192.168.1.100:13500",
  119. })
  120. );
  121. expect(result).toEqual({ allowed: true });
  122. });
  123. it("allows request when origin matches x-forwarded-host (reverse proxy)", () => {
  124. const guard = createCsrfOriginGuard({
  125. allowedOrigins: [],
  126. allowSameOrigin: true,
  127. enforceInDevelopment: true,
  128. trustForwardedHost: true,
  129. });
  130. const result = guard.check(
  131. createRequest({
  132. origin: "http://myapp.example.com",
  133. host: "localhost:13500",
  134. "x-forwarded-host": "myapp.example.com",
  135. })
  136. );
  137. expect(result).toEqual({ allowed: true });
  138. });
  139. it("uses first value from comma-separated x-forwarded-host", () => {
  140. const guard = createCsrfOriginGuard({
  141. allowedOrigins: [],
  142. allowSameOrigin: true,
  143. enforceInDevelopment: true,
  144. trustForwardedHost: true,
  145. });
  146. const result = guard.check(
  147. createRequest({
  148. origin: "http://front.example.com",
  149. host: "internal:3000",
  150. "x-forwarded-host": "front.example.com, proxy.internal",
  151. })
  152. );
  153. expect(result).toEqual({ allowed: true });
  154. });
  155. it("ignores x-forwarded-host when trustForwardedHost is false (default)", () => {
  156. const guard = createCsrfOriginGuard({
  157. allowedOrigins: [],
  158. allowSameOrigin: true,
  159. enforceInDevelopment: true,
  160. });
  161. const result = guard.check(
  162. createRequest({
  163. origin: "http://myapp.example.com",
  164. host: "localhost:13500",
  165. "x-forwarded-host": "myapp.example.com",
  166. })
  167. );
  168. expect(result.allowed).toBe(false);
  169. });
  170. it("rejects request when origin does not match host", () => {
  171. const guard = createCsrfOriginGuard({
  172. allowedOrigins: [],
  173. allowSameOrigin: true,
  174. enforceInDevelopment: true,
  175. });
  176. const result = guard.check(
  177. createRequest({
  178. origin: "http://evil.example.com",
  179. host: "myapp.example.com:13500",
  180. })
  181. );
  182. expect(result.allowed).toBe(false);
  183. });
  184. it("skips host fallback when allowSameOrigin is false", () => {
  185. const guard = createCsrfOriginGuard({
  186. allowedOrigins: [],
  187. allowSameOrigin: false,
  188. enforceInDevelopment: true,
  189. });
  190. const result = guard.check(
  191. createRequest({
  192. origin: "http://192.168.1.100:13500",
  193. host: "192.168.1.100:13500",
  194. })
  195. );
  196. expect(result.allowed).toBe(false);
  197. });
  198. it("handles https origin matching host without explicit port", () => {
  199. const guard = createCsrfOriginGuard({
  200. allowedOrigins: [],
  201. allowSameOrigin: true,
  202. enforceInDevelopment: true,
  203. });
  204. const result = guard.check(
  205. createRequest({
  206. origin: "https://example.com",
  207. host: "example.com",
  208. })
  209. );
  210. expect(result).toEqual({ allowed: true });
  211. });
  212. });
  213. });