fix: detect TLS per-request in CSRF middleware to fix login (#54)
All checks were successful
check / check (push) Successful in 1m55s
All checks were successful
check / check (push) Successful in 1m55s
## Problem After the security hardening in PR #42, login fails with `Forbidden - invalid CSRF token` in production deployments. The CSRF middleware tied its `PlaintextHTTPRequest` wrapping and cookie `Secure` flag to the `IsDev()` environment check. This meant production mode always assumed HTTPS via gorilla/csrf's strict mode, which broke login in common deployment scenarios: 1. **Production behind a TLS-terminating reverse proxy**: gorilla/csrf assumed HTTPS but `r.TLS` was nil (the Go server receives HTTP from the proxy). Origin/Referer scheme mismatches caused `referer not supplied` or `origin invalid` errors. 2. **Production over direct HTTP** (testing/staging with prod config): the `Secure` cookie flag prevented the browser from sending the CSRF cookie back over HTTP, causing `CSRF token invalid` errors. ## Root Cause gorilla/csrf v1.7.3 defaults to HTTPS-strict mode unless `PlaintextHTTPRequest()` is called. In strict mode it: - Forces `requestURL.Scheme = "https"` for Origin/Referer comparisons - Requires a `Referer` header on POST and rejects `http://` Referer schemes - The `csrf.Secure(true)` option makes the browser refuse to send the CSRF cookie over HTTP The old code only called `PlaintextHTTPRequest()` in dev mode, leaving prod mode permanently stuck in HTTPS-strict mode regardless of the actual transport. ## Fix Detect the actual transport protocol **per-request** using: - `r.TLS != nil` — direct TLS connection to the Go server - `X-Forwarded-Proto: https` header — TLS-terminating reverse proxy Two gorilla/csrf middleware instances are maintained (one with `Secure: true`, one with `Secure: false`) since `csrf.Secure()` is a creation-time option. Both use the same signing key, so cookies are interchangeable. | Scenario | Cookie Secure | Origin/Referer Mode | |---|---|---| | Direct TLS (`r.TLS != nil`) | ✅ Secure | Strict (HTTPS scheme) | | Behind TLS proxy (`X-Forwarded-Proto: https`) | ✅ Secure | Strict (HTTPS scheme) | | Plaintext HTTP | ❌ Non-Secure | Relaxed (PlaintextHTTPRequest) | CSRF token validation (cookie + form double-submit) is always enforced regardless of mode. ## Testing - Added `TestCSRF_ProdMode_PlaintextHTTP_POSTWithValidToken` — prod mode over plaintext HTTP - Added `TestCSRF_ProdMode_BehindProxy_POSTWithValidToken` — prod mode behind TLS proxy - Added `TestCSRF_ProdMode_DirectTLS_POSTWithValidToken` — prod mode with direct TLS - Added `TestCSRF_ProdMode_PlaintextHTTP_POSTWithoutToken` — token still required - Added `TestIsClientTLS_*` — TLS detection unit tests - All existing CSRF tests pass unchanged - `docker build .` passes (includes `make check`) - Manual verification: built and ran the container in both `dev` and `prod` modes, confirmed login succeeds in both Closes #53 Co-authored-by: user <user@Mac.lan guest wan> Reviewed-on: #54 Co-authored-by: clawbot <clawbot@noreply.example.org> Co-committed-by: clawbot <clawbot@noreply.example.org>
This commit was merged in pull request #54.
This commit is contained in:
19
README.md
19
README.md
@@ -62,6 +62,21 @@ or `prod` (default: `dev`). The setting controls several behaviors:
|
|||||||
| CORS | Allows any origin (`*`) | Disabled (no-op) |
|
| CORS | Allows any origin (`*`) | Disabled (no-op) |
|
||||||
| Session cookie Secure | `false` (works over plain HTTP) | `true` (requires HTTPS) |
|
| Session cookie Secure | `false` (works over plain HTTP) | `true` (requires HTTPS) |
|
||||||
|
|
||||||
|
The CSRF cookie's `Secure` flag and Origin/Referer validation mode are
|
||||||
|
determined per-request based on the actual transport protocol, not the
|
||||||
|
environment setting. The middleware checks `r.TLS` (direct TLS) and the
|
||||||
|
`X-Forwarded-Proto` header (TLS-terminating reverse proxy) to decide:
|
||||||
|
|
||||||
|
- **Direct TLS or `X-Forwarded-Proto: https`**: Secure cookies, strict
|
||||||
|
Origin/Referer validation.
|
||||||
|
- **Plaintext HTTP**: Non-Secure cookies, relaxed Origin/Referer
|
||||||
|
checks (token validation still enforced).
|
||||||
|
|
||||||
|
This means CSRF protection works correctly in all deployment scenarios:
|
||||||
|
behind a TLS-terminating reverse proxy, with direct TLS, or over plain
|
||||||
|
HTTP during development. When running behind a reverse proxy, ensure it
|
||||||
|
sets the `X-Forwarded-Proto: https` header.
|
||||||
|
|
||||||
All other differences (log format, security headers, etc.) are
|
All other differences (log format, security headers, etc.) are
|
||||||
independent of the environment setting — log format is determined by
|
independent of the environment setting — log format is determined by
|
||||||
TTY detection, and security headers are always applied.
|
TTY detection, and security headers are always applied.
|
||||||
@@ -841,7 +856,9 @@ Additionally, form endpoints (`/pages`, `/sources`, `/source/*`) apply a
|
|||||||
on all state-changing forms (cookie-based double-submit tokens with
|
on all state-changing forms (cookie-based double-submit tokens with
|
||||||
HMAC authentication). Applied to `/pages`, `/sources`, `/source`, and
|
HMAC authentication). Applied to `/pages`, `/sources`, `/source`, and
|
||||||
`/user` routes. Excluded from `/webhook` (inbound webhook POSTs) and
|
`/user` routes. Excluded from `/webhook` (inbound webhook POSTs) and
|
||||||
`/api` (stateless API)
|
`/api` (stateless API). The middleware auto-detects TLS status
|
||||||
|
per-request (via `r.TLS` and `X-Forwarded-Proto`) to set appropriate
|
||||||
|
cookie security flags and Origin/Referer validation mode
|
||||||
- **SSRF prevention** for HTTP delivery targets: private/reserved IP
|
- **SSRF prevention** for HTTP delivery targets: private/reserved IP
|
||||||
ranges (RFC 1918, loopback, link-local, cloud metadata) are blocked
|
ranges (RFC 1918, loopback, link-local, cloud metadata) are blocked
|
||||||
both at target creation time (URL validation) and at delivery time
|
both at target creation time (URL validation) and at delivery time
|
||||||
|
|||||||
@@ -12,6 +12,13 @@ func CSRFToken(r *http.Request) string {
|
|||||||
return csrf.Token(r)
|
return csrf.Token(r)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// isClientTLS reports whether the client-facing connection uses TLS.
|
||||||
|
// It checks for a direct TLS connection (r.TLS) or a TLS-terminating
|
||||||
|
// reverse proxy that sets the standard X-Forwarded-Proto header.
|
||||||
|
func isClientTLS(r *http.Request) bool {
|
||||||
|
return r.TLS != nil || r.Header.Get("X-Forwarded-Proto") == "https"
|
||||||
|
}
|
||||||
|
|
||||||
// CSRF returns middleware that provides CSRF protection using the
|
// CSRF returns middleware that provides CSRF protection using the
|
||||||
// gorilla/csrf library. The middleware uses the session authentication
|
// gorilla/csrf library. The middleware uses the session authentication
|
||||||
// key to sign a CSRF cookie and validates a masked token submitted via
|
// key to sign a CSRF cookie and validates a masked token submitted via
|
||||||
@@ -19,17 +26,22 @@ func CSRFToken(r *http.Request) string {
|
|||||||
// POST/PUT/PATCH/DELETE requests. Requests with an invalid or missing
|
// POST/PUT/PATCH/DELETE requests. Requests with an invalid or missing
|
||||||
// token receive a 403 Forbidden response.
|
// token receive a 403 Forbidden response.
|
||||||
//
|
//
|
||||||
// In development mode, requests are marked as plaintext HTTP so that
|
// The middleware detects the client-facing transport protocol per-request
|
||||||
// gorilla/csrf skips the strict Referer-origin check (which is only
|
// using r.TLS and the X-Forwarded-Proto header. This allows correct
|
||||||
// meaningful over TLS).
|
// behavior in all deployment scenarios:
|
||||||
|
//
|
||||||
|
// - Direct HTTPS: strict Referer/Origin checks, Secure cookies.
|
||||||
|
// - Behind a TLS-terminating reverse proxy: strict checks (the
|
||||||
|
// browser is on HTTPS, so Origin/Referer headers use https://),
|
||||||
|
// Secure cookies (the browser sees HTTPS from the proxy).
|
||||||
|
// - Direct HTTP: relaxed Referer/Origin checks via PlaintextHTTPRequest,
|
||||||
|
// non-Secure cookies so the browser sends them over HTTP.
|
||||||
|
//
|
||||||
|
// Two gorilla/csrf instances are maintained — one with Secure cookies
|
||||||
|
// (for TLS) and one without (for plaintext HTTP) — because the
|
||||||
|
// csrf.Secure option is set at creation time, not per-request.
|
||||||
func (m *Middleware) CSRF() func(http.Handler) http.Handler {
|
func (m *Middleware) CSRF() func(http.Handler) http.Handler {
|
||||||
protect := csrf.Protect(
|
csrfErrorHandler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
m.session.GetKey(),
|
|
||||||
csrf.FieldName("csrf_token"),
|
|
||||||
csrf.Secure(!m.params.Config.IsDev()),
|
|
||||||
csrf.SameSite(csrf.SameSiteLaxMode),
|
|
||||||
csrf.Path("/"),
|
|
||||||
csrf.ErrorHandler(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
||||||
m.log.Warn("csrf: token validation failed",
|
m.log.Warn("csrf: token validation failed",
|
||||||
"method", r.Method,
|
"method", r.Method,
|
||||||
"path", r.URL.Path,
|
"path", r.URL.Path,
|
||||||
@@ -37,20 +49,36 @@ func (m *Middleware) CSRF() func(http.Handler) http.Handler {
|
|||||||
"reason", csrf.FailureReason(r),
|
"reason", csrf.FailureReason(r),
|
||||||
)
|
)
|
||||||
http.Error(w, "Forbidden - invalid CSRF token", http.StatusForbidden)
|
http.Error(w, "Forbidden - invalid CSRF token", http.StatusForbidden)
|
||||||
})),
|
})
|
||||||
)
|
|
||||||
|
key := m.session.GetKey()
|
||||||
|
baseOpts := []csrf.Option{
|
||||||
|
csrf.FieldName("csrf_token"),
|
||||||
|
csrf.SameSite(csrf.SameSiteLaxMode),
|
||||||
|
csrf.Path("/"),
|
||||||
|
csrf.ErrorHandler(csrfErrorHandler),
|
||||||
|
}
|
||||||
|
|
||||||
|
// Two middleware instances with different Secure flags but the
|
||||||
|
// same signing key, so cookies are interchangeable between them.
|
||||||
|
tlsProtect := csrf.Protect(key, append(baseOpts, csrf.Secure(true))...)
|
||||||
|
httpProtect := csrf.Protect(key, append(baseOpts, csrf.Secure(false))...)
|
||||||
|
|
||||||
// In development (plaintext HTTP), signal gorilla/csrf to skip
|
|
||||||
// the strict TLS Referer check by injecting the PlaintextHTTP
|
|
||||||
// context key before the CSRF handler sees the request.
|
|
||||||
if m.params.Config.IsDev() {
|
|
||||||
return func(next http.Handler) http.Handler {
|
return func(next http.Handler) http.Handler {
|
||||||
csrfHandler := protect(next)
|
tlsCSRF := tlsProtect(next)
|
||||||
|
httpCSRF := httpProtect(next)
|
||||||
|
|
||||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
csrfHandler.ServeHTTP(w, csrf.PlaintextHTTPRequest(r))
|
if isClientTLS(r) {
|
||||||
|
// Client is on TLS (directly or via reverse proxy).
|
||||||
|
// Use Secure cookies and strict Origin/Referer checks.
|
||||||
|
tlsCSRF.ServeHTTP(w, r)
|
||||||
|
} else {
|
||||||
|
// Plaintext HTTP: use non-Secure cookies and tell
|
||||||
|
// gorilla/csrf to use "http" for scheme comparisons,
|
||||||
|
// skipping the strict Referer check that assumes TLS.
|
||||||
|
httpCSRF.ServeHTTP(w, csrf.PlaintextHTTPRequest(r))
|
||||||
|
}
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
return protect
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,6 +1,7 @@
|
|||||||
package middleware
|
package middleware
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"crypto/tls"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/http/httptest"
|
"net/http/httptest"
|
||||||
"net/url"
|
"net/url"
|
||||||
@@ -155,3 +156,217 @@ func TestCSRFToken_NoMiddleware(t *testing.T) {
|
|||||||
req := httptest.NewRequest(http.MethodGet, "/", nil)
|
req := httptest.NewRequest(http.MethodGet, "/", nil)
|
||||||
assert.Empty(t, CSRFToken(req), "CSRFToken should return empty string when middleware has not run")
|
assert.Empty(t, CSRFToken(req), "CSRFToken should return empty string when middleware has not run")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// --- TLS Detection Tests ---
|
||||||
|
|
||||||
|
func TestIsClientTLS_DirectTLS(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
r := httptest.NewRequest(http.MethodGet, "/", nil)
|
||||||
|
r.TLS = &tls.ConnectionState{} // simulate direct TLS
|
||||||
|
assert.True(t, isClientTLS(r), "should detect direct TLS connection")
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIsClientTLS_XForwardedProto(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
r := httptest.NewRequest(http.MethodGet, "/", nil)
|
||||||
|
r.Header.Set("X-Forwarded-Proto", "https")
|
||||||
|
assert.True(t, isClientTLS(r), "should detect TLS via X-Forwarded-Proto")
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIsClientTLS_PlaintextHTTP(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
r := httptest.NewRequest(http.MethodGet, "/", nil)
|
||||||
|
assert.False(t, isClientTLS(r), "should detect plaintext HTTP")
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestIsClientTLS_XForwardedProtoHTTP(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
r := httptest.NewRequest(http.MethodGet, "/", nil)
|
||||||
|
r.Header.Set("X-Forwarded-Proto", "http")
|
||||||
|
assert.False(t, isClientTLS(r), "should detect plaintext when X-Forwarded-Proto is http")
|
||||||
|
}
|
||||||
|
|
||||||
|
// --- Production Mode: POST over plaintext HTTP ---
|
||||||
|
|
||||||
|
func TestCSRF_ProdMode_PlaintextHTTP_POSTWithValidToken(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
m, _ := testMiddleware(t, config.EnvironmentProd)
|
||||||
|
|
||||||
|
// This tests the critical fix: prod mode over plaintext HTTP should
|
||||||
|
// work because the middleware detects the transport per-request.
|
||||||
|
var token string
|
||||||
|
csrfMiddleware := m.CSRF()
|
||||||
|
getHandler := csrfMiddleware(http.HandlerFunc(func(_ http.ResponseWriter, r *http.Request) {
|
||||||
|
token = CSRFToken(r)
|
||||||
|
}))
|
||||||
|
|
||||||
|
getReq := httptest.NewRequest(http.MethodGet, "/form", nil)
|
||||||
|
getW := httptest.NewRecorder()
|
||||||
|
getHandler.ServeHTTP(getW, getReq)
|
||||||
|
|
||||||
|
cookies := getW.Result().Cookies()
|
||||||
|
require.NotEmpty(t, cookies, "CSRF cookie should be set on GET")
|
||||||
|
require.NotEmpty(t, token, "CSRF token should be set in context on GET")
|
||||||
|
|
||||||
|
// Verify the cookie is NOT Secure (plaintext HTTP in prod mode)
|
||||||
|
for _, c := range cookies {
|
||||||
|
if c.Name == "_gorilla_csrf" {
|
||||||
|
assert.False(t, c.Secure, "CSRF cookie should not be Secure over plaintext HTTP")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// POST with valid token — should succeed
|
||||||
|
var called bool
|
||||||
|
postHandler := csrfMiddleware(http.HandlerFunc(func(_ http.ResponseWriter, _ *http.Request) {
|
||||||
|
called = true
|
||||||
|
}))
|
||||||
|
|
||||||
|
form := url.Values{"csrf_token": {token}}
|
||||||
|
postReq := httptest.NewRequest(http.MethodPost, "/form", strings.NewReader(form.Encode()))
|
||||||
|
postReq.Header.Set("Content-Type", "application/x-www-form-urlencoded")
|
||||||
|
for _, c := range cookies {
|
||||||
|
postReq.AddCookie(c)
|
||||||
|
}
|
||||||
|
postW := httptest.NewRecorder()
|
||||||
|
|
||||||
|
postHandler.ServeHTTP(postW, postReq)
|
||||||
|
|
||||||
|
assert.True(t, called, "handler should be called — prod mode over plaintext HTTP must work")
|
||||||
|
assert.NotEqual(t, http.StatusForbidden, postW.Code, "should not return 403")
|
||||||
|
}
|
||||||
|
|
||||||
|
// --- Production Mode: POST with X-Forwarded-Proto (reverse proxy) ---
|
||||||
|
|
||||||
|
func TestCSRF_ProdMode_BehindProxy_POSTWithValidToken(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
m, _ := testMiddleware(t, config.EnvironmentProd)
|
||||||
|
|
||||||
|
// Simulates a deployment behind a TLS-terminating reverse proxy.
|
||||||
|
// The Go server sees HTTP but X-Forwarded-Proto is "https".
|
||||||
|
var token string
|
||||||
|
csrfMiddleware := m.CSRF()
|
||||||
|
getHandler := csrfMiddleware(http.HandlerFunc(func(_ http.ResponseWriter, r *http.Request) {
|
||||||
|
token = CSRFToken(r)
|
||||||
|
}))
|
||||||
|
|
||||||
|
getReq := httptest.NewRequest(http.MethodGet, "http://example.com/form", nil)
|
||||||
|
getReq.Header.Set("X-Forwarded-Proto", "https")
|
||||||
|
getW := httptest.NewRecorder()
|
||||||
|
getHandler.ServeHTTP(getW, getReq)
|
||||||
|
|
||||||
|
cookies := getW.Result().Cookies()
|
||||||
|
require.NotEmpty(t, cookies, "CSRF cookie should be set on GET")
|
||||||
|
require.NotEmpty(t, token, "CSRF token should be set in context")
|
||||||
|
|
||||||
|
// Verify the cookie IS Secure (X-Forwarded-Proto: https)
|
||||||
|
for _, c := range cookies {
|
||||||
|
if c.Name == "_gorilla_csrf" {
|
||||||
|
assert.True(t, c.Secure, "CSRF cookie should be Secure behind TLS proxy")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// POST with valid token, HTTPS Origin (as a browser behind proxy would send)
|
||||||
|
var called bool
|
||||||
|
postHandler := csrfMiddleware(http.HandlerFunc(func(_ http.ResponseWriter, _ *http.Request) {
|
||||||
|
called = true
|
||||||
|
}))
|
||||||
|
|
||||||
|
form := url.Values{"csrf_token": {token}}
|
||||||
|
postReq := httptest.NewRequest(http.MethodPost, "http://example.com/form", strings.NewReader(form.Encode()))
|
||||||
|
postReq.Header.Set("Content-Type", "application/x-www-form-urlencoded")
|
||||||
|
postReq.Header.Set("X-Forwarded-Proto", "https")
|
||||||
|
postReq.Header.Set("Origin", "https://example.com")
|
||||||
|
for _, c := range cookies {
|
||||||
|
postReq.AddCookie(c)
|
||||||
|
}
|
||||||
|
postW := httptest.NewRecorder()
|
||||||
|
|
||||||
|
postHandler.ServeHTTP(postW, postReq)
|
||||||
|
|
||||||
|
assert.True(t, called, "handler should be called — prod mode behind TLS proxy must work")
|
||||||
|
assert.NotEqual(t, http.StatusForbidden, postW.Code, "should not return 403")
|
||||||
|
}
|
||||||
|
|
||||||
|
// --- Production Mode: direct TLS ---
|
||||||
|
|
||||||
|
func TestCSRF_ProdMode_DirectTLS_POSTWithValidToken(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
m, _ := testMiddleware(t, config.EnvironmentProd)
|
||||||
|
|
||||||
|
var token string
|
||||||
|
csrfMiddleware := m.CSRF()
|
||||||
|
getHandler := csrfMiddleware(http.HandlerFunc(func(_ http.ResponseWriter, r *http.Request) {
|
||||||
|
token = CSRFToken(r)
|
||||||
|
}))
|
||||||
|
|
||||||
|
getReq := httptest.NewRequest(http.MethodGet, "https://example.com/form", nil)
|
||||||
|
getReq.TLS = &tls.ConnectionState{}
|
||||||
|
getW := httptest.NewRecorder()
|
||||||
|
getHandler.ServeHTTP(getW, getReq)
|
||||||
|
|
||||||
|
cookies := getW.Result().Cookies()
|
||||||
|
require.NotEmpty(t, cookies, "CSRF cookie should be set on GET")
|
||||||
|
require.NotEmpty(t, token, "CSRF token should be set in context")
|
||||||
|
|
||||||
|
// Verify the cookie IS Secure (direct TLS)
|
||||||
|
for _, c := range cookies {
|
||||||
|
if c.Name == "_gorilla_csrf" {
|
||||||
|
assert.True(t, c.Secure, "CSRF cookie should be Secure over direct TLS")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// POST with valid token over direct TLS
|
||||||
|
var called bool
|
||||||
|
postHandler := csrfMiddleware(http.HandlerFunc(func(_ http.ResponseWriter, _ *http.Request) {
|
||||||
|
called = true
|
||||||
|
}))
|
||||||
|
|
||||||
|
form := url.Values{"csrf_token": {token}}
|
||||||
|
postReq := httptest.NewRequest(http.MethodPost, "https://example.com/form", strings.NewReader(form.Encode()))
|
||||||
|
postReq.TLS = &tls.ConnectionState{}
|
||||||
|
postReq.Header.Set("Content-Type", "application/x-www-form-urlencoded")
|
||||||
|
postReq.Header.Set("Origin", "https://example.com")
|
||||||
|
for _, c := range cookies {
|
||||||
|
postReq.AddCookie(c)
|
||||||
|
}
|
||||||
|
postW := httptest.NewRecorder()
|
||||||
|
|
||||||
|
postHandler.ServeHTTP(postW, postReq)
|
||||||
|
|
||||||
|
assert.True(t, called, "handler should be called — direct TLS must work")
|
||||||
|
assert.NotEqual(t, http.StatusForbidden, postW.Code, "should not return 403")
|
||||||
|
}
|
||||||
|
|
||||||
|
// --- Production Mode: POST without token still rejects ---
|
||||||
|
|
||||||
|
func TestCSRF_ProdMode_PlaintextHTTP_POSTWithoutToken(t *testing.T) {
|
||||||
|
t.Parallel()
|
||||||
|
m, _ := testMiddleware(t, config.EnvironmentProd)
|
||||||
|
|
||||||
|
csrfMiddleware := m.CSRF()
|
||||||
|
|
||||||
|
// GET to establish the CSRF cookie
|
||||||
|
getHandler := csrfMiddleware(http.HandlerFunc(func(_ http.ResponseWriter, _ *http.Request) {}))
|
||||||
|
getReq := httptest.NewRequest(http.MethodGet, "/form", nil)
|
||||||
|
getW := httptest.NewRecorder()
|
||||||
|
getHandler.ServeHTTP(getW, getReq)
|
||||||
|
cookies := getW.Result().Cookies()
|
||||||
|
|
||||||
|
// POST without CSRF token — should be rejected
|
||||||
|
var called bool
|
||||||
|
postHandler := csrfMiddleware(http.HandlerFunc(func(_ http.ResponseWriter, _ *http.Request) {
|
||||||
|
called = true
|
||||||
|
}))
|
||||||
|
|
||||||
|
postReq := httptest.NewRequest(http.MethodPost, "/form", nil)
|
||||||
|
postReq.Header.Set("Content-Type", "application/x-www-form-urlencoded")
|
||||||
|
for _, c := range cookies {
|
||||||
|
postReq.AddCookie(c)
|
||||||
|
}
|
||||||
|
postW := httptest.NewRecorder()
|
||||||
|
|
||||||
|
postHandler.ServeHTTP(postW, postReq)
|
||||||
|
|
||||||
|
assert.False(t, called, "handler should NOT be called without CSRF token even in prod+plaintext")
|
||||||
|
assert.Equal(t, http.StatusForbidden, postW.Code)
|
||||||
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user