mirror of
https://github.com/bytedance/deer-flow.git
synced 2026-05-10 02:38:26 +00:00
* fix(security): reject cross-site auth posts * fix(auth): align secure cookie proxy scheme handling --------- Co-authored-by: Willem Jiang <willem.jiang@gmail.com>
220 lines
6.6 KiB
Python
220 lines
6.6 KiB
Python
"""Tests for CSRF middleware."""
|
|
|
|
from fastapi import FastAPI
|
|
from starlette.testclient import TestClient
|
|
|
|
from app.gateway.csrf_middleware import CSRFMiddleware
|
|
|
|
|
|
def _make_app() -> FastAPI:
|
|
app = FastAPI()
|
|
app.add_middleware(CSRFMiddleware)
|
|
|
|
@app.post("/api/v1/auth/login/local")
|
|
async def login_local():
|
|
return {"ok": True}
|
|
|
|
@app.post("/api/v1/auth/register")
|
|
async def register():
|
|
return {"ok": True}
|
|
|
|
@app.post("/api/threads/abc/runs/stream")
|
|
async def protected_mutation():
|
|
return {"ok": True}
|
|
|
|
return app
|
|
|
|
|
|
def test_auth_post_rejects_cross_origin_browser_request():
|
|
"""CSRF-exempt auth routes must not accept hostile browser origins.
|
|
|
|
Login/register endpoints intentionally skip the double-submit token because
|
|
first-time callers do not have a token yet. They still set an auth session,
|
|
so a hostile cross-site form POST must be rejected to avoid login CSRF /
|
|
session fixation.
|
|
"""
|
|
client = TestClient(_make_app(), base_url="https://deerflow.example")
|
|
|
|
response = client.post(
|
|
"/api/v1/auth/login/local",
|
|
headers={"Origin": "https://evil.example"},
|
|
)
|
|
|
|
assert response.status_code == 403
|
|
assert response.json()["detail"] == "Cross-site auth request denied."
|
|
|
|
|
|
def test_auth_post_allows_same_origin_browser_request():
|
|
client = TestClient(_make_app(), base_url="https://deerflow.example")
|
|
|
|
response = client.post(
|
|
"/api/v1/auth/login/local",
|
|
headers={"Origin": "https://deerflow.example"},
|
|
)
|
|
|
|
assert response.status_code == 200
|
|
assert response.cookies.get("csrf_token")
|
|
|
|
|
|
def test_auth_post_rejects_malformed_origin_with_path():
|
|
client = TestClient(_make_app(), base_url="https://deerflow.example")
|
|
|
|
response = client.post(
|
|
"/api/v1/auth/login/local",
|
|
headers={"Origin": "https://deerflow.example/path"},
|
|
)
|
|
|
|
assert response.status_code == 403
|
|
assert response.json()["detail"] == "Cross-site auth request denied."
|
|
assert response.cookies.get("csrf_token") is None
|
|
|
|
|
|
def test_auth_post_rejects_malformed_origin_with_invalid_port():
|
|
client = TestClient(_make_app(), base_url="https://deerflow.example")
|
|
|
|
response = client.post(
|
|
"/api/v1/auth/login/local",
|
|
headers={"Origin": "https://deerflow.example:bad"},
|
|
)
|
|
|
|
assert response.status_code == 403
|
|
assert response.json()["detail"] == "Cross-site auth request denied."
|
|
assert response.cookies.get("csrf_token") is None
|
|
|
|
|
|
def test_auth_post_allows_same_origin_default_port_equivalence():
|
|
client = TestClient(_make_app(), base_url="https://deerflow.example")
|
|
|
|
response = client.post(
|
|
"/api/v1/auth/login/local",
|
|
headers={"Origin": "https://deerflow.example:443"},
|
|
)
|
|
|
|
assert response.status_code == 200
|
|
assert response.cookies.get("csrf_token")
|
|
|
|
|
|
def test_auth_post_allows_forwarded_same_origin():
|
|
client = TestClient(_make_app(), base_url="http://internal:8000")
|
|
|
|
response = client.post(
|
|
"/api/v1/auth/login/local",
|
|
headers={
|
|
"Origin": "https://deerflow.example",
|
|
"X-Forwarded-Proto": "https",
|
|
"X-Forwarded-Host": "deerflow.example, internal:8000",
|
|
},
|
|
)
|
|
|
|
assert response.status_code == 200
|
|
assert response.cookies.get("csrf_token")
|
|
|
|
|
|
def test_auth_post_allows_rfc_forwarded_same_origin():
|
|
client = TestClient(_make_app(), base_url="http://internal:8000")
|
|
|
|
response = client.post(
|
|
"/api/v1/auth/login/local",
|
|
headers={
|
|
"Origin": "https://deerflow.example",
|
|
"Forwarded": "proto=https;host=deerflow.example",
|
|
},
|
|
)
|
|
|
|
assert response.status_code == 200
|
|
assert response.cookies.get("csrf_token")
|
|
assert "secure" in response.headers["set-cookie"].lower()
|
|
|
|
|
|
def test_auth_post_allows_explicit_configured_origin(monkeypatch):
|
|
monkeypatch.setenv("GATEWAY_CORS_ORIGINS", "https://app.example")
|
|
client = TestClient(_make_app(), base_url="https://api.example")
|
|
|
|
response = client.post(
|
|
"/api/v1/auth/register",
|
|
headers={"Origin": "https://app.example"},
|
|
)
|
|
|
|
assert response.status_code == 200
|
|
assert response.cookies.get("csrf_token")
|
|
|
|
|
|
def test_auth_post_does_not_treat_wildcard_cors_as_allowed_origin(monkeypatch):
|
|
monkeypatch.setenv("GATEWAY_CORS_ORIGINS", "*")
|
|
client = TestClient(_make_app(), base_url="https://api.example")
|
|
|
|
response = client.post(
|
|
"/api/v1/auth/login/local",
|
|
headers={"Origin": "https://evil.example"},
|
|
)
|
|
|
|
assert response.status_code == 403
|
|
assert response.json()["detail"] == "Cross-site auth request denied."
|
|
|
|
|
|
def test_auth_post_sets_strict_samesite_csrf_cookie():
|
|
client = TestClient(_make_app(), base_url="https://deerflow.example")
|
|
|
|
response = client.post(
|
|
"/api/v1/auth/login/local",
|
|
headers={"Origin": "https://deerflow.example"},
|
|
)
|
|
|
|
assert response.status_code == 200
|
|
set_cookie = response.headers["set-cookie"].lower()
|
|
assert "csrf_token=" in set_cookie
|
|
assert "samesite=strict" in set_cookie
|
|
assert "secure" in set_cookie
|
|
|
|
|
|
def test_auth_post_without_origin_still_allows_non_browser_clients():
|
|
client = TestClient(_make_app(), base_url="https://deerflow.example")
|
|
|
|
response = client.post("/api/v1/auth/login/local")
|
|
|
|
assert response.status_code == 200
|
|
assert response.cookies.get("csrf_token")
|
|
|
|
|
|
def test_non_auth_mutation_still_requires_double_submit_token():
|
|
client = TestClient(_make_app(), base_url="https://deerflow.example")
|
|
|
|
response = client.post(
|
|
"/api/threads/abc/runs/stream",
|
|
headers={"Origin": "https://deerflow.example"},
|
|
)
|
|
|
|
assert response.status_code == 403
|
|
assert response.json()["detail"] == "CSRF token missing. Include X-CSRF-Token header."
|
|
|
|
|
|
def test_non_auth_mutation_allows_valid_double_submit_token():
|
|
client = TestClient(_make_app(), base_url="https://deerflow.example")
|
|
client.cookies.set("csrf_token", "known-token")
|
|
|
|
response = client.post(
|
|
"/api/threads/abc/runs/stream",
|
|
headers={
|
|
"Origin": "https://deerflow.example",
|
|
"X-CSRF-Token": "known-token",
|
|
},
|
|
)
|
|
|
|
assert response.status_code == 200
|
|
|
|
|
|
def test_non_auth_mutation_rejects_mismatched_double_submit_token():
|
|
client = TestClient(_make_app(), base_url="https://deerflow.example")
|
|
client.cookies.set("csrf_token", "cookie-token")
|
|
|
|
response = client.post(
|
|
"/api/threads/abc/runs/stream",
|
|
headers={
|
|
"Origin": "https://deerflow.example",
|
|
"X-CSRF-Token": "header-token",
|
|
},
|
|
)
|
|
|
|
assert response.status_code == 403
|
|
assert response.json()["detail"] == "CSRF token mismatch."
|