Skip to content
Snippets Groups Projects
Commit b2b75382 authored by ale's avatar ale
Browse files

Add CORS tests

And move the CORS handler only on the homepage endpoint.
parent 466c1d30
No related branches found
No related tags found
No related merge requests found
......@@ -442,13 +442,20 @@ func (h *Server) Handler() http.Handler {
idph = csrf.Protect(h.csrfSecret)(idph)
}
// Add CORS headers on the main SSO API endpoint.
c := cors.New(cors.Options{
AllowedOrigins: h.allowedOrigins,
AllowCredentials: true,
MaxAge: 86400,
})
// Add the SSO provider endpoints (root path and /exchange),
// which do not need CSRF. We use a HandlerFunc to bypass the
// '/' dispatch semantics of the standard http.ServeMux.
ssoh := h.withAuth(h.handleHomepage, h.redirectToLogin)
ssoh := c.Handler(h.withAuth(h.handleHomepage, h.redirectToLogin))
userh := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
switch {
case r.Method == "GET" && r.URL.Path == h.urlFor("/"):
case r.URL.Path == h.urlFor("/"):
ssoh.ServeHTTP(w, r)
case r.URL.Path == h.urlFor("/exchange"):
h.handleExchange(w, r)
......@@ -457,13 +464,6 @@ func (h *Server) Handler() http.Handler {
}
})
// Add CORS headers around user-facing routes.
c := cors.New(cors.Options{
AllowedOrigins: h.allowedOrigins,
AllowCredentials: true,
MaxAge: 86400,
})
// User-facing routes require cache-busting and CSP headers.
root.PathPrefix(h.urlFor("/")).Handler(withDynamicHeaders(c.Handler(userh)))
......
......@@ -331,3 +331,48 @@ func TestHTTP_LoginWithKeyStore(t *testing.T) {
v.Set("password", "password")
doPostForm(t, httpSrv, c, "/login", v, checkRedirectToTargetService)
}
func TestHTTP_CORS(t *testing.T) {
tmpdir, httpSrv := startTestHTTPServer(t)
defer os.RemoveAll(tmpdir)
defer httpSrv.Close()
c := newTestHTTPClient()
// To test a CORS preflight request we have to login first.
// Simulate an authorization request from a service, expect to
// see the login page.
v := make(url.Values)
v.Set("s", "service.example.com/")
v.Set("d", "https://service.example.com/admin/")
v.Set("n", "averysecretnonce")
doGet(t, httpSrv, c, "/?"+v.Encode(), checkStatusOk, checkLoginPasswordPage)
// Attempt to login by submitting the form. We expect the
// result to be a 302 redirect to the target service.
v = make(url.Values)
v.Set("username", "testuser")
v.Set("password", "password")
doPostForm(t, httpSrv, c, "/login", v, checkRedirectToTargetService)
// Simulate a CORS preflight request.
v = make(url.Values)
v.Set("s", "service.example.com/")
v.Set("d", "https://service.example.com/admin/")
v.Set("n", "averysecretnonce")
req, err := http.NewRequest("OPTIONS", httpSrv.URL+"/?"+v.Encode(), nil)
if err != nil {
t.Fatalf("NewRequest(): %v", err)
}
req.Header.Set("Origin", "https://origin.example.com")
req.Header.Set("Access-Control-Request-Method", "GET")
resp, err := c.Do(req)
if err != nil {
t.Fatalf("http request error: %v", err)
}
defer resp.Body.Close()
checkStatusOk(t, resp)
if s := resp.Header.Get("Access-Control-Allow-Origin"); s != "https://origin.example.com" {
t.Fatalf("Bad Access-Control-Allow-Origin returned to OPTIONS request: %s", s)
}
}
......@@ -38,6 +38,8 @@ public_key_file: %s
domain: example.com
allowed_services:
- "^service\\.example\\.com/$"
allowed_cors_origins:
- "https://origin.example.com"
service_ttls:
- regexp: ".*"
ttl: 60
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment