mirror of
https://github.com/vlang/v.git
synced 2023-08-10 21:13:21 +03:00
vweb: vweb.csrf re-implementation (#18220)
This commit is contained in:
@ -1,30 +1,377 @@
|
||||
import time
|
||||
import net.http
|
||||
import net.html
|
||||
import vweb
|
||||
import vweb.csrf
|
||||
import os
|
||||
|
||||
const sport = 10801
|
||||
const (
|
||||
sport = 12385
|
||||
localserver = '127.0.0.1:${sport}'
|
||||
exit_after_time = 12000 // milliseconds
|
||||
|
||||
session_id_cookie_name = 'session_id'
|
||||
csrf_config = &csrf.CsrfConfig{
|
||||
secret: 'my-256bit-secret'
|
||||
allowed_hosts: ['*']
|
||||
session_cookie: session_id_cookie_name
|
||||
}
|
||||
|
||||
allowed_origin = 'example.com'
|
||||
csrf_config_origin = &csrf.CsrfConfig{
|
||||
secret: 'my-256bit-secret'
|
||||
allowed_hosts: [allowed_origin]
|
||||
session_cookie: session_id_cookie_name
|
||||
}
|
||||
)
|
||||
|
||||
// Test CSRF functions
|
||||
// =====================================
|
||||
|
||||
fn test_set_token() {
|
||||
mut ctx := vweb.Context{}
|
||||
|
||||
token := csrf.set_token(mut ctx, csrf_config)
|
||||
|
||||
cookie := ctx.header.get(.set_cookie) or { '' }
|
||||
assert cookie.len != 0
|
||||
assert cookie.starts_with('${csrf_config.cookie_name}=')
|
||||
}
|
||||
|
||||
fn test_protect() {
|
||||
mut ctx := vweb.Context{}
|
||||
|
||||
token := csrf.set_token(mut ctx, csrf_config)
|
||||
|
||||
mut cookie := ctx.header.get(.set_cookie) or { '' }
|
||||
// get cookie value from "name=value;"
|
||||
cookie = cookie.split(' ')[0].all_after('=').replace(';', '')
|
||||
|
||||
form := {
|
||||
csrf_config.token_name: token
|
||||
}
|
||||
cookie_map := {
|
||||
csrf_config.cookie_name: cookie
|
||||
}
|
||||
ctx = vweb.Context{
|
||||
form: form
|
||||
req: http.Request{
|
||||
method: .post
|
||||
cookies: cookie_map
|
||||
}
|
||||
}
|
||||
valid := csrf.protect(mut ctx, csrf_config)
|
||||
|
||||
assert valid == true
|
||||
}
|
||||
|
||||
fn test_timeout() {
|
||||
timeout := 1
|
||||
short_time_config := &csrf.CsrfConfig{
|
||||
secret: 'my-256bit-secret'
|
||||
allowed_hosts: ['*']
|
||||
session_cookie: session_id_cookie_name
|
||||
max_age: timeout
|
||||
}
|
||||
|
||||
mut ctx := vweb.Context{}
|
||||
|
||||
token := csrf.set_token(mut ctx, short_time_config)
|
||||
|
||||
// after 2 seconds the cookie should expire (maxage)
|
||||
time.sleep(2 * time.second)
|
||||
mut cookie := ctx.header.get(.set_cookie) or { '' }
|
||||
// get cookie value from "name=value;"
|
||||
cookie = cookie.split(' ')[0].all_after('=').replace(';', '')
|
||||
|
||||
form := {
|
||||
short_time_config.token_name: token
|
||||
}
|
||||
cookie_map := {
|
||||
short_time_config.cookie_name: cookie
|
||||
}
|
||||
ctx = vweb.Context{
|
||||
form: form
|
||||
req: http.Request{
|
||||
method: .post
|
||||
cookies: cookie_map
|
||||
}
|
||||
}
|
||||
|
||||
valid := csrf.protect(mut ctx, short_time_config)
|
||||
|
||||
assert valid == false
|
||||
}
|
||||
|
||||
fn test_valid_origin() {
|
||||
// valid because both Origin and Referer headers are present
|
||||
token, cookie := get_token_cookie('')
|
||||
|
||||
form := {
|
||||
csrf_config.token_name: token
|
||||
}
|
||||
cookie_map := {
|
||||
csrf_config.cookie_name: cookie
|
||||
}
|
||||
|
||||
mut req := http.Request{
|
||||
method: .post
|
||||
cookies: cookie_map
|
||||
}
|
||||
req.add_header(.origin, 'http://${allowed_origin}')
|
||||
req.add_header(.referer, 'http://${allowed_origin}/test')
|
||||
mut ctx := vweb.Context{
|
||||
form: form
|
||||
req: req
|
||||
}
|
||||
|
||||
mut valid := csrf.protect(mut ctx, csrf_config_origin)
|
||||
assert valid == true
|
||||
}
|
||||
|
||||
fn test_invalid_origin() {
|
||||
// invalid because either the Origin, Referer or neither are present
|
||||
token, cookie := get_token_cookie('')
|
||||
|
||||
form := {
|
||||
csrf_config.token_name: token
|
||||
}
|
||||
cookie_map := {
|
||||
csrf_config.cookie_name: cookie
|
||||
}
|
||||
|
||||
mut req := http.Request{
|
||||
method: .post
|
||||
cookies: cookie_map
|
||||
}
|
||||
req.add_header(.origin, 'http://${allowed_origin}')
|
||||
mut ctx := vweb.Context{
|
||||
form: form
|
||||
req: req
|
||||
}
|
||||
|
||||
mut valid := csrf.protect(mut ctx, csrf_config_origin)
|
||||
assert valid == false
|
||||
|
||||
req = http.Request{
|
||||
method: .post
|
||||
cookies: cookie_map
|
||||
}
|
||||
req.add_header(.referer, 'http://${allowed_origin}/test')
|
||||
ctx = vweb.Context{
|
||||
form: form
|
||||
req: req
|
||||
}
|
||||
|
||||
valid = csrf.protect(mut ctx, csrf_config_origin)
|
||||
assert valid == false
|
||||
|
||||
req = http.Request{
|
||||
method: .post
|
||||
cookies: cookie_map
|
||||
}
|
||||
ctx = vweb.Context{
|
||||
form: form
|
||||
req: req
|
||||
}
|
||||
|
||||
valid = csrf.protect(mut ctx, csrf_config_origin)
|
||||
assert valid == false
|
||||
}
|
||||
|
||||
// Testing App
|
||||
// ================================
|
||||
|
||||
struct App {
|
||||
csrf.App
|
||||
vweb.Context
|
||||
pub mut:
|
||||
csrf csrf.CsrfApp [vweb_global]
|
||||
middlewares map[string][]vweb.Middleware
|
||||
}
|
||||
|
||||
// index - will handle requests to path '/'
|
||||
fn (mut app App) index() vweb.Result {
|
||||
// Set a Csrf-Cookie(Token will be generated automatically) and set http_only-status. If no argument ist passed, it will be true by default.
|
||||
app.set_csrf_cookie(csrf.HttpOnly{false})
|
||||
// Get the token-value from the csrf-cookie that was just setted
|
||||
token := app.get_csrf_token() or { panic(err) }
|
||||
return app.text("Csrf-Token set! It's value is: ${token}")
|
||||
pub fn (mut app App) index() vweb.Result {
|
||||
app.csrf.set_token(mut app.Context)
|
||||
|
||||
return app.html('<form action="/auth" method="post">
|
||||
<input type="hidden" name="${app.csrf.token_name}" value="${app.csrf.token}"/>
|
||||
<label for="password">Your password:</label>
|
||||
<input type="text" id="password" name="password" placeholder="Your password" />
|
||||
</form>')
|
||||
}
|
||||
|
||||
fn test_send_a_request_to_homepage_expecting_a_csrf_cookie() {
|
||||
spawn vweb.run_at(&App{}, vweb.RunParams{ port: sport })
|
||||
time.sleep(500 * time.millisecond)
|
||||
res := http.get('http://localhost:${sport}/')!
|
||||
if res.header.str().contains('__Host-Csrf-Token') {
|
||||
assert true
|
||||
} else {
|
||||
assert false
|
||||
[post]
|
||||
pub fn (mut app App) auth() vweb.Result {
|
||||
app.csrf.protect(mut app.Context)
|
||||
|
||||
return app.ok('authenticated')
|
||||
}
|
||||
|
||||
pub fn (mut app App) middleware_index() vweb.Result {
|
||||
csrftoken := csrf.set_token(mut app.Context, csrf_config)
|
||||
|
||||
return app.html('<form action="/auth" method="post">
|
||||
<input type="hidden" name="${csrf_config.token_name}" value="${csrftoken}"/>
|
||||
<label for="password">Your password:</label>
|
||||
<input type="text" id="password" name="password" placeholder="Your password" />
|
||||
</form>')
|
||||
}
|
||||
|
||||
[post]
|
||||
pub fn (mut app App) middleware_auth() vweb.Result {
|
||||
return app.ok('middleware authenticated')
|
||||
}
|
||||
|
||||
// App cleanup function
|
||||
// ======================================
|
||||
|
||||
pub fn (mut app App) shutdown() vweb.Result {
|
||||
spawn app.gracefull_exit()
|
||||
return app.ok('good bye')
|
||||
}
|
||||
|
||||
fn (mut app App) gracefull_exit() {
|
||||
eprintln('>> webserver: gracefull_exit')
|
||||
time.sleep(100 * time.millisecond)
|
||||
exit(0)
|
||||
}
|
||||
|
||||
fn exit_after_timeout[T](mut app T, timeout_in_ms int) {
|
||||
time.sleep(timeout_in_ms * time.millisecond)
|
||||
eprintln('>> webserver: pid: ${os.getpid()}, exiting ...')
|
||||
app.shutdown()
|
||||
|
||||
eprintln('App timed out!')
|
||||
assert true == false
|
||||
}
|
||||
|
||||
// Tests for the App
|
||||
// ======================================
|
||||
|
||||
fn test_run_app_in_background() {
|
||||
mut app := &App{
|
||||
csrf: csrf.CsrfApp{
|
||||
secret: 'my-256bit-secret'
|
||||
allowed_hosts: [allowed_origin]
|
||||
session_cookie: session_id_cookie_name
|
||||
}
|
||||
middlewares: {
|
||||
'/middleware_auth': [csrf.middleware(csrf_config)]
|
||||
}
|
||||
}
|
||||
spawn vweb.run_at(app, port: sport, family: .ip)
|
||||
spawn exit_after_timeout(mut app, exit_after_time)
|
||||
|
||||
time.sleep(500 * time.millisecond)
|
||||
}
|
||||
|
||||
fn test_token_with_app() {
|
||||
res := http.get('http://${localserver}/') or { panic(err) }
|
||||
|
||||
mut doc := html.parse(res.body)
|
||||
inputs := doc.get_tag_by_attribute_value('type', 'hidden')
|
||||
assert inputs.len == 1
|
||||
assert csrf_config.token_name == inputs[0].attributes['name']
|
||||
}
|
||||
|
||||
fn test_token_with_middleware() {
|
||||
res := http.get('http://${localserver}/middleware_index') or { panic(err) }
|
||||
|
||||
mut doc := html.parse(res.body)
|
||||
inputs := doc.get_tag_by_attribute_value('type', 'hidden')
|
||||
assert inputs.len == 1
|
||||
assert csrf_config.token_name == inputs[0].attributes['name']
|
||||
}
|
||||
|
||||
// utility function to check whether the route at `path` is protected against csrf
|
||||
fn protect_route_util(path string) {
|
||||
mut req := http.Request{
|
||||
method: .post
|
||||
url: 'http://${localserver}/${path}'
|
||||
}
|
||||
mut res := req.do() or { panic(err) }
|
||||
assert res.status() == .forbidden
|
||||
|
||||
// A valid request with CSRF protection should have a cookie session id,
|
||||
// csrftoken in `app.form` and the hmac of that token in a cookie
|
||||
session_id := 'user_session_id'
|
||||
token, cookie := get_token_cookie(session_id)
|
||||
|
||||
header := http.new_header_from_map({
|
||||
http.CommonHeader.origin: 'http://${allowed_origin}'
|
||||
http.CommonHeader.referer: 'http://${allowed_origin}/route'
|
||||
})
|
||||
|
||||
formdata := http.url_encode_form_data({
|
||||
csrf_config.token_name: token
|
||||
})
|
||||
|
||||
// session id is altered: test if session hijacking is possible
|
||||
// if the session id the csrftoken changes so the cookie can't be validated
|
||||
mut cookies := {
|
||||
csrf_config.cookie_name: cookie
|
||||
session_id_cookie_name: 'altered'
|
||||
}
|
||||
|
||||
req = http.Request{
|
||||
method: .post
|
||||
url: 'http://${localserver}/${path}'
|
||||
data: formdata
|
||||
cookies: cookies
|
||||
header: header
|
||||
}
|
||||
|
||||
res = req.do() or { panic(err) }
|
||||
assert res.status() == .forbidden
|
||||
|
||||
// Everything is valid now and the request should succeed
|
||||
cookies[session_id_cookie_name] = session_id
|
||||
|
||||
req = http.Request{
|
||||
method: .post
|
||||
url: 'http://${localserver}/${path}'
|
||||
data: formdata
|
||||
cookies: cookies
|
||||
header: header
|
||||
}
|
||||
|
||||
res = req.do() or { panic(err) }
|
||||
assert res.status() == .ok
|
||||
}
|
||||
|
||||
fn test_protect_with_app() {
|
||||
protect_route_util('/auth')
|
||||
}
|
||||
|
||||
fn test_protect_with_middleware() {
|
||||
protect_route_util('middleware_auth')
|
||||
}
|
||||
|
||||
fn testsuite_end() {
|
||||
// This test is guaranteed to be called last.
|
||||
// It sends a request to the server to shutdown.
|
||||
x := http.get('http://${localserver}/shutdown') or {
|
||||
assert err.msg() == ''
|
||||
return
|
||||
}
|
||||
assert x.status() == .ok
|
||||
assert x.body == 'good bye'
|
||||
}
|
||||
|
||||
// Utility functions
|
||||
|
||||
fn get_token_cookie(session_id string) (string, string) {
|
||||
mut ctx := vweb.Context{
|
||||
req: http.Request{
|
||||
cookies: {
|
||||
session_id_cookie_name: session_id
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
token := csrf.set_token(mut ctx, csrf_config_origin)
|
||||
|
||||
mut cookie := ctx.header.get(.set_cookie) or { '' }
|
||||
// get cookie value from "name=value;"
|
||||
cookie = cookie.split(' ')[0].all_after('=').replace(';', '')
|
||||
return token, cookie
|
||||
}
|
||||
|
Reference in New Issue
Block a user