| import { isCsrfOriginAllowed } from './csrf-protection' |
|
|
| describe('isCsrfOriginAllowed', () => { |
| it('should return true when allowedOrigins contains originDomain', () => { |
| expect(isCsrfOriginAllowed('vercel.com', ['vercel.com'])).toBe(true) |
| expect(isCsrfOriginAllowed('www.vercel.com', ['www.vercel.com'])).toBe(true) |
| }) |
|
|
| it('should return true when allowedOrigins contains originDomain with matching pattern', () => { |
| expect(isCsrfOriginAllowed('asdf.vercel.com', ['*.vercel.com'])).toBe(true) |
| expect(isCsrfOriginAllowed('asdf.vercel.com', ['**.vercel.com'])).toBe(true) |
| expect(isCsrfOriginAllowed('asdf.jkl.vercel.com', ['**.vercel.com'])).toBe( |
| true |
| ) |
| }) |
|
|
| it("should correctly handle origins that don't have a TLD (eg for localhost)", () => { |
| |
| expect(isCsrfOriginAllowed('subdomain.localhost', ['*.localhost'])).toBe( |
| true |
| ) |
| expect(isCsrfOriginAllowed('localhost', ['*.localhost'])).toBe(false) |
|
|
| |
| expect(isCsrfOriginAllowed('subdomain.localhost', ['**.localhost'])).toBe( |
| true |
| ) |
| expect(isCsrfOriginAllowed('a.b.localhost', ['**.localhost'])).toBe(true) |
| expect(isCsrfOriginAllowed('localhost', ['**.localhost'])).toBe(false) |
|
|
| |
| expect(isCsrfOriginAllowed('localhost', ['localhost'])).toBe(true) |
| expect(isCsrfOriginAllowed('subdomain.localhost', ['localhost'])).toBe( |
| false |
| ) |
|
|
| |
| expect( |
| isCsrfOriginAllowed('subdomain.localhost', ['localhost', '*.localhost']) |
| ).toBe(true) |
| expect( |
| isCsrfOriginAllowed('a.b.localhost', [ |
| 'localhost', |
| '*.localhost', |
| '**.localhost', |
| ]) |
| ).toBe(true) |
| }) |
|
|
| it('should return false when allowedOrigins contains originDomain with non-matching pattern', () => { |
| expect(isCsrfOriginAllowed('asdf.vercel.com', ['*.vercel.app'])).toBe(false) |
| expect(isCsrfOriginAllowed('asdf.jkl.vercel.com', ['*.vercel.com'])).toBe( |
| false |
| ) |
| expect(isCsrfOriginAllowed('asdf.jkl.vercel.app', ['**.vercel.com'])).toBe( |
| false |
| ) |
| }) |
|
|
| it('should return false when allowedOrigins does not contain originDomain', () => { |
| expect(isCsrfOriginAllowed('vercel.com', ['nextjs.org'])).toBe(false) |
| }) |
|
|
| it('should return false when allowedOrigins is undefined', () => { |
| expect(isCsrfOriginAllowed('vercel.com', undefined)).toBe(false) |
| }) |
|
|
| it('should return false when allowedOrigins is empty', () => { |
| expect(isCsrfOriginAllowed('vercel.com', [])).toBe(false) |
| }) |
|
|
| it('should return false when allowedOrigins is empty string', () => { |
| expect(isCsrfOriginAllowed('vercel.com', [''])).toBe(false) |
| }) |
|
|
| it('wildcards are only supported below the domain level', () => { |
| expect(isCsrfOriginAllowed('vercel.com', ['*'])).toBe(false) |
| expect(isCsrfOriginAllowed('vercel.com', ['**'])).toBe(false) |
| }) |
| }) |
|
|