mirror of
https://gitea.invidious.io/iv-org/shard-kemal.git
synced 2024-08-15 00:53:36 +00:00
commit
c718b02dbc
2 changed files with 119 additions and 0 deletions
73
spec/middleware/csrf_spec.cr
Normal file
73
spec/middleware/csrf_spec.cr
Normal file
|
@ -0,0 +1,73 @@
|
|||
require "../spec_helper"
|
||||
|
||||
describe "Kemal::Middleware::CSRF" do
|
||||
|
||||
it "sends GETs to next handler" do
|
||||
handler = Kemal::Middleware::CSRF.new
|
||||
request = HTTP::Request.new("GET", "/")
|
||||
io_with_context = create_request_and_return_io(handler, request)
|
||||
client_response = HTTP::Client::Response.from_io(io_with_context, decompress: false)
|
||||
client_response.status_code.should eq 404
|
||||
end
|
||||
|
||||
it "blocks POSTs without the token" do
|
||||
handler = Kemal::Middleware::CSRF.new
|
||||
request = HTTP::Request.new("POST", "/")
|
||||
io_with_context = create_request_and_return_io(handler, request)
|
||||
client_response = HTTP::Client::Response.from_io(io_with_context, decompress: false)
|
||||
client_response.status_code.should eq 403
|
||||
end
|
||||
|
||||
it "allows POSTs with the correct token in FORM submit" do
|
||||
handler = Kemal::Middleware::CSRF.new
|
||||
request = HTTP::Request.new("POST", "/",
|
||||
body: "authenticity_token=cemal&hasan=lamec",
|
||||
headers: HTTP::Headers{"Content-Type" => "application/x-www-form-urlencoded"})
|
||||
io, context = process_request(handler, request)
|
||||
client_response = HTTP::Client::Response.from_io(io, decompress: false)
|
||||
client_response.status_code.should eq 403
|
||||
|
||||
current_token = context.session["csrf"]
|
||||
|
||||
handler = Kemal::Middleware::CSRF.new
|
||||
request = HTTP::Request.new("POST", "/",
|
||||
body: "authenticity_token=#{current_token}&hasan=lamec",
|
||||
headers: HTTP::Headers{"Content-Type" => "application/x-www-form-urlencoded",
|
||||
"Set-Cookie" => client_response.headers["Set-Cookie"]})
|
||||
io, context = process_request(handler, request)
|
||||
client_response = HTTP::Client::Response.from_io(io, decompress: false)
|
||||
client_response.status_code.should eq 404
|
||||
end
|
||||
|
||||
it "allows POSTs with the correct token in HTTP header" do
|
||||
handler = Kemal::Middleware::CSRF.new
|
||||
request = HTTP::Request.new("POST", "/",
|
||||
body: "hasan=lamec",
|
||||
headers: HTTP::Headers{"Content-Type" => "application/x-www-form-urlencoded"})
|
||||
io, context = process_request(handler, request)
|
||||
client_response = HTTP::Client::Response.from_io(io, decompress: false)
|
||||
client_response.status_code.should eq 403
|
||||
|
||||
current_token = context.session["csrf"]
|
||||
|
||||
handler = Kemal::Middleware::CSRF.new
|
||||
request = HTTP::Request.new("POST", "/",
|
||||
body: "hasan=lamec",
|
||||
headers: HTTP::Headers{"Content-Type" => "application/x-www-form-urlencoded",
|
||||
"Set-Cookie" => client_response.headers["Set-Cookie"],
|
||||
"x-csrf-token" => current_token })
|
||||
io, context = process_request(handler, request)
|
||||
client_response = HTTP::Client::Response.from_io(io, decompress: false)
|
||||
client_response.status_code.should eq 404
|
||||
end
|
||||
end
|
||||
|
||||
def process_request(handler, request)
|
||||
io = MemoryIO.new
|
||||
response = HTTP::Server::Response.new(io)
|
||||
context = HTTP::Server::Context.new(request, response)
|
||||
handler.call(context)
|
||||
response.close
|
||||
io.rewind
|
||||
{io, context}
|
||||
end
|
46
src/kemal/middleware/csrf.cr
Normal file
46
src/kemal/middleware/csrf.cr
Normal file
|
@ -0,0 +1,46 @@
|
|||
require "secure_random"
|
||||
require "http"
|
||||
|
||||
module Kemal::Middleware
|
||||
# This middleware adds CSRF protection to your application.
|
||||
#
|
||||
# Returns 403 "Forbidden" unless the current CSRF token is submitted
|
||||
# with any non-GET/HEAD request.
|
||||
#
|
||||
# Without CSRF protection, your app is vulnerable to replay attacks
|
||||
# where an attacker can re-submit a form.
|
||||
#
|
||||
class CSRF < HTTP::Handler
|
||||
HEADER = "X_CSRF_TOKEN"
|
||||
ALLOWED_METHODS = %w[GET HEAD OPTIONS TRACE]
|
||||
PARAMETER_NAME = "authenticity_token"
|
||||
|
||||
def call(context)
|
||||
unless context.session["csrf"]?
|
||||
context.session["csrf"] = SecureRandom.hex(16)
|
||||
end
|
||||
|
||||
return call_next(context) if ALLOWED_METHODS.includes?(context.request.method)
|
||||
|
||||
req = context.request
|
||||
submitted = if req.headers[HEADER]?
|
||||
req.headers[HEADER]
|
||||
elsif context.params.body[PARAMETER_NAME]?
|
||||
context.params.body[PARAMETER_NAME]
|
||||
else
|
||||
"nothing"
|
||||
end
|
||||
current_token = context.session["csrf"]
|
||||
|
||||
if current_token == submitted
|
||||
# reset the token so it can't be used again
|
||||
context.session["csrf"] = SecureRandom.hex(16)
|
||||
return call_next(context)
|
||||
else
|
||||
context.response.status_code = 403
|
||||
context.response.print "Forbidden"
|
||||
end
|
||||
end
|
||||
|
||||
end
|
||||
end
|
Loading…
Reference in a new issue