Fork of Pleroma with site-specific changes and feature branches https://git.pleroma.social/pleroma/pleroma
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

93 lines
3.3KB

  1. # Pleroma: A lightweight social networking server
  2. # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
  3. # SPDX-License-Identifier: AGPL-3.0-only
  4. defmodule Pleroma.Web.Plugs.HTTPSecurityPlugTest do
  5. use Pleroma.Web.ConnCase
  6. alias Pleroma.Config
  7. alias Plug.Conn
  8. setup do: clear_config([:http_securiy, :enabled])
  9. setup do: clear_config([:http_security, :sts])
  10. setup do: clear_config([:http_security, :referrer_policy])
  11. describe "http security enabled" do
  12. setup do
  13. Config.put([:http_security, :enabled], true)
  14. end
  15. test "it sends CSP headers when enabled", %{conn: conn} do
  16. conn = get(conn, "/api/v1/instance")
  17. refute Conn.get_resp_header(conn, "x-xss-protection") == []
  18. refute Conn.get_resp_header(conn, "x-permitted-cross-domain-policies") == []
  19. refute Conn.get_resp_header(conn, "x-frame-options") == []
  20. refute Conn.get_resp_header(conn, "x-content-type-options") == []
  21. refute Conn.get_resp_header(conn, "x-download-options") == []
  22. refute Conn.get_resp_header(conn, "referrer-policy") == []
  23. refute Conn.get_resp_header(conn, "content-security-policy") == []
  24. end
  25. test "it sends STS headers when enabled", %{conn: conn} do
  26. Config.put([:http_security, :sts], true)
  27. conn = get(conn, "/api/v1/instance")
  28. refute Conn.get_resp_header(conn, "strict-transport-security") == []
  29. refute Conn.get_resp_header(conn, "expect-ct") == []
  30. end
  31. test "it does not send STS headers when disabled", %{conn: conn} do
  32. Config.put([:http_security, :sts], false)
  33. conn = get(conn, "/api/v1/instance")
  34. assert Conn.get_resp_header(conn, "strict-transport-security") == []
  35. assert Conn.get_resp_header(conn, "expect-ct") == []
  36. end
  37. test "referrer-policy header reflects configured value", %{conn: conn} do
  38. conn = get(conn, "/api/v1/instance")
  39. assert Conn.get_resp_header(conn, "referrer-policy") == ["same-origin"]
  40. Config.put([:http_security, :referrer_policy], "no-referrer")
  41. conn =
  42. build_conn()
  43. |> get("/api/v1/instance")
  44. assert Conn.get_resp_header(conn, "referrer-policy") == ["no-referrer"]
  45. end
  46. test "it sends `report-to` & `report-uri` CSP response headers" do
  47. conn =
  48. build_conn()
  49. |> get("/api/v1/instance")
  50. [csp] = Conn.get_resp_header(conn, "content-security-policy")
  51. assert csp =~ ~r|report-uri https://endpoint.com; report-to csp-endpoint;|
  52. [reply_to] = Conn.get_resp_header(conn, "reply-to")
  53. assert reply_to ==
  54. "{\"endpoints\":[{\"url\":\"https://endpoint.com\"}],\"group\":\"csp-endpoint\",\"max-age\":10886400}"
  55. end
  56. end
  57. test "it does not send CSP headers when disabled", %{conn: conn} do
  58. Config.put([:http_security, :enabled], false)
  59. conn = get(conn, "/api/v1/instance")
  60. assert Conn.get_resp_header(conn, "x-xss-protection") == []
  61. assert Conn.get_resp_header(conn, "x-permitted-cross-domain-policies") == []
  62. assert Conn.get_resp_header(conn, "x-frame-options") == []
  63. assert Conn.get_resp_header(conn, "x-content-type-options") == []
  64. assert Conn.get_resp_header(conn, "x-download-options") == []
  65. assert Conn.get_resp_header(conn, "referrer-policy") == []
  66. assert Conn.get_resp_header(conn, "content-security-policy") == []
  67. end
  68. end