2021-06-26 17:23:15 +02:00
|
|
|
<?php
|
2021-01-02 03:43:50 +01:00
|
|
|
|
2021-06-26 17:23:15 +02:00
|
|
|
namespace Tests;
|
2021-01-02 03:43:50 +01:00
|
|
|
|
2021-09-04 14:57:04 +02:00
|
|
|
use BookStack\Util\CspService;
|
2021-01-02 03:43:50 +01:00
|
|
|
|
|
|
|
class SecurityHeaderTest extends TestCase
|
|
|
|
{
|
|
|
|
public function test_cookies_samesite_lax_by_default()
|
|
|
|
{
|
2021-06-26 17:23:15 +02:00
|
|
|
$resp = $this->get('/');
|
2021-01-02 03:43:50 +01:00
|
|
|
foreach ($resp->headers->getCookies() as $cookie) {
|
2021-06-26 17:23:15 +02:00
|
|
|
$this->assertEquals('lax', $cookie->getSameSite());
|
2021-01-02 03:43:50 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public function test_cookies_samesite_none_when_iframe_hosts_set()
|
|
|
|
{
|
2021-06-26 17:23:15 +02:00
|
|
|
$this->runWithEnv('ALLOWED_IFRAME_HOSTS', 'http://example.com', function () {
|
|
|
|
$resp = $this->get('/');
|
2021-01-02 03:43:50 +01:00
|
|
|
foreach ($resp->headers->getCookies() as $cookie) {
|
2021-06-26 17:23:15 +02:00
|
|
|
$this->assertEquals('none', $cookie->getSameSite());
|
2021-01-02 03:43:50 +01:00
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
public function test_secure_cookies_controlled_by_app_url()
|
|
|
|
{
|
2021-06-26 17:23:15 +02:00
|
|
|
$this->runWithEnv('APP_URL', 'http://example.com', function () {
|
|
|
|
$resp = $this->get('/');
|
2021-01-02 03:43:50 +01:00
|
|
|
foreach ($resp->headers->getCookies() as $cookie) {
|
|
|
|
$this->assertFalse($cookie->isSecure());
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
2021-06-26 17:23:15 +02:00
|
|
|
$this->runWithEnv('APP_URL', 'https://example.com', function () {
|
|
|
|
$resp = $this->get('/');
|
2021-01-02 03:43:50 +01:00
|
|
|
foreach ($resp->headers->getCookies() as $cookie) {
|
|
|
|
$this->assertTrue($cookie->isSecure());
|
|
|
|
}
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
public function test_iframe_csp_self_only_by_default()
|
|
|
|
{
|
2021-06-26 17:23:15 +02:00
|
|
|
$resp = $this->get('/');
|
2021-09-04 14:57:04 +02:00
|
|
|
$frameHeader = $this->getCspHeader($resp, 'frame-ancestors');
|
2021-01-02 03:43:50 +01:00
|
|
|
|
2021-09-04 14:57:04 +02:00
|
|
|
$this->assertEquals('frame-ancestors \'self\'', $frameHeader);
|
2021-01-02 03:43:50 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
public function test_iframe_csp_includes_extra_hosts_if_configured()
|
|
|
|
{
|
2021-06-26 17:23:15 +02:00
|
|
|
$this->runWithEnv('ALLOWED_IFRAME_HOSTS', 'https://a.example.com https://b.example.com', function () {
|
|
|
|
$resp = $this->get('/');
|
2021-09-04 14:57:04 +02:00
|
|
|
$frameHeader = $this->getCspHeader($resp, 'frame-ancestors');
|
2021-01-02 03:43:50 +01:00
|
|
|
|
2021-09-04 14:57:04 +02:00
|
|
|
$this->assertNotEmpty($frameHeader);
|
|
|
|
$this->assertEquals('frame-ancestors \'self\' https://a.example.com https://b.example.com', $frameHeader);
|
2021-01-02 03:43:50 +01:00
|
|
|
});
|
|
|
|
}
|
2021-09-04 14:57:04 +02:00
|
|
|
|
|
|
|
public function test_script_csp_set_on_responses()
|
|
|
|
{
|
|
|
|
$resp = $this->get('/');
|
|
|
|
$scriptHeader = $this->getCspHeader($resp, 'script-src');
|
|
|
|
$this->assertStringContainsString('\'strict-dynamic\'', $scriptHeader);
|
|
|
|
$this->assertStringContainsString('\'nonce-', $scriptHeader);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function test_script_csp_nonce_matches_nonce_used_in_custom_head()
|
|
|
|
{
|
|
|
|
$this->setSettings(['app-custom-head' => '<script>console.log("cat");</script>']);
|
|
|
|
$resp = $this->get('/login');
|
|
|
|
$scriptHeader = $this->getCspHeader($resp, 'script-src');
|
|
|
|
|
|
|
|
$nonce = app()->make(CspService::class)->getNonce();
|
|
|
|
$this->assertStringContainsString('nonce-' . $nonce, $scriptHeader);
|
|
|
|
$resp->assertSee('<script nonce="' . $nonce . '">console.log("cat");</script>');
|
|
|
|
}
|
|
|
|
|
|
|
|
public function test_script_csp_nonce_changes_per_request()
|
|
|
|
{
|
|
|
|
$resp = $this->get('/');
|
|
|
|
$firstHeader = $this->getCspHeader($resp, 'script-src');
|
|
|
|
|
|
|
|
$this->refreshApplication();
|
|
|
|
|
|
|
|
$resp = $this->get('/');
|
|
|
|
$secondHeader = $this->getCspHeader($resp, 'script-src');
|
|
|
|
|
|
|
|
$this->assertNotEquals($firstHeader, $secondHeader);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function test_allow_content_scripts_settings_controls_csp_script_headers()
|
|
|
|
{
|
|
|
|
config()->set('app.allow_content_scripts', true);
|
|
|
|
$resp = $this->get('/');
|
|
|
|
$scriptHeader = $this->getCspHeader($resp, 'script-src');
|
|
|
|
$this->assertEmpty($scriptHeader);
|
|
|
|
|
|
|
|
config()->set('app.allow_content_scripts', false);
|
|
|
|
$resp = $this->get('/');
|
|
|
|
$scriptHeader = $this->getCspHeader($resp, 'script-src');
|
|
|
|
$this->assertNotEmpty($scriptHeader);
|
|
|
|
}
|
|
|
|
|
2021-09-04 15:34:43 +02:00
|
|
|
public function test_object_src_csp_header_set()
|
|
|
|
{
|
|
|
|
$resp = $this->get('/');
|
|
|
|
$scriptHeader = $this->getCspHeader($resp, 'object-src');
|
|
|
|
$this->assertEquals('object-src \'self\'', $scriptHeader);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function test_base_uri_csp_header_set()
|
|
|
|
{
|
|
|
|
$resp = $this->get('/');
|
|
|
|
$scriptHeader = $this->getCspHeader($resp, 'base-uri');
|
|
|
|
$this->assertEquals('base-uri \'self\'', $scriptHeader);
|
|
|
|
}
|
|
|
|
|
2021-09-04 14:57:04 +02:00
|
|
|
/**
|
|
|
|
* Get the value of the first CSP header of the given type.
|
|
|
|
*/
|
|
|
|
protected function getCspHeader(TestResponse $resp, string $type): string
|
|
|
|
{
|
|
|
|
$cspHeaders = collect($resp->headers->all('Content-Security-Policy'));
|
|
|
|
return $cspHeaders->filter(function ($val) use ($type) {
|
|
|
|
return strpos($val, $type) === 0;
|
|
|
|
})->first() ?? '';
|
|
|
|
}
|
2021-06-26 17:23:15 +02:00
|
|
|
}
|