feat(common): on-by-default XSRF support in HttpClient (#18108)
Fixes #18100
This commit is contained in:
parent
3d85f72652
commit
dd04f09483
|
@ -11,8 +11,9 @@ export {HttpClient} from './src/client';
|
|||
export {HttpHeaders} from './src/headers';
|
||||
export {HTTP_INTERCEPTORS, HttpInterceptor} from './src/interceptor';
|
||||
export {JsonpClientBackend, JsonpInterceptor} from './src/jsonp';
|
||||
export {HttpClientJsonpModule, HttpClientModule, interceptingHandler as ɵinterceptingHandler} from './src/module';
|
||||
export {HttpClientJsonpModule, HttpClientModule, HttpXsrfModule, interceptingHandler as ɵinterceptingHandler} from './src/module';
|
||||
export {HttpParameterCodec, HttpParams, HttpUrlEncodingCodec} from './src/params';
|
||||
export {HttpRequest} from './src/request';
|
||||
export {HttpDownloadProgressEvent, HttpErrorResponse, HttpEvent, HttpEventType, HttpHeaderResponse, HttpProgressEvent, HttpResponse, HttpResponseBase, HttpSentEvent, HttpUserEvent} from './src/response';
|
||||
export {HttpXhrBackend, XhrFactory} from './src/xhr';
|
||||
export {HttpXsrfTokenExtractor} from './src/xsrf';
|
|
@ -6,7 +6,7 @@
|
|||
* found in the LICENSE file at https://angular.io/license
|
||||
*/
|
||||
|
||||
import {InjectionToken} from '@angular/core';
|
||||
import {Injectable, InjectionToken} from '@angular/core';
|
||||
import {Observable} from 'rxjs/Observable';
|
||||
|
||||
import {HttpHandler} from './backend';
|
||||
|
@ -64,3 +64,10 @@ export class HttpInterceptorHandler implements HttpHandler {
|
|||
* @experimental
|
||||
*/
|
||||
export const HTTP_INTERCEPTORS = new InjectionToken<HttpInterceptor[]>('HTTP_INTERCEPTORS');
|
||||
|
||||
@Injectable()
|
||||
export class NoopInterceptor implements HttpInterceptor {
|
||||
intercept(req: HttpRequest<any>, next: HttpHandler): Observable<HttpEvent<any>> {
|
||||
return next.handle(req);
|
||||
}
|
||||
}
|
||||
|
|
|
@ -6,13 +6,15 @@
|
|||
* found in the LICENSE file at https://angular.io/license
|
||||
*/
|
||||
|
||||
import {Inject, NgModule, Optional} from '@angular/core';
|
||||
import {Inject, ModuleWithProviders, NgModule, Optional, forwardRef} from '@angular/core';
|
||||
|
||||
import {HttpBackend, HttpHandler} from './backend';
|
||||
import {HttpClient} from './client';
|
||||
import {HTTP_INTERCEPTORS, HttpInterceptor, HttpInterceptorHandler} from './interceptor';
|
||||
import {HTTP_INTERCEPTORS, HttpInterceptor, HttpInterceptorHandler, NoopInterceptor} from './interceptor';
|
||||
import {JsonpCallbackContext, JsonpClientBackend, JsonpInterceptor} from './jsonp';
|
||||
import {BrowserXhr, HttpXhrBackend, XhrFactory} from './xhr';
|
||||
import {HttpXsrfCookieExtractor, HttpXsrfInterceptor, HttpXsrfTokenExtractor, XSRF_COOKIE_NAME, XSRF_HEADER_NAME} from './xsrf';
|
||||
|
||||
|
||||
|
||||
/**
|
||||
|
@ -47,6 +49,58 @@ export function jsonpCallbackContext(): Object {
|
|||
return {};
|
||||
}
|
||||
|
||||
/**
|
||||
* `NgModule` which adds XSRF protection support to outgoing requests.
|
||||
*
|
||||
* Provided the server supports a cookie-based XSRF protection system, this
|
||||
* module can be used directly to configure XSRF protection with the correct
|
||||
* cookie and header names.
|
||||
*
|
||||
* If no such names are provided, the default is to use `X-XSRF-TOKEN` for
|
||||
* the header name and `XSRF-TOKEN` for the cookie name.
|
||||
*
|
||||
* @experimental
|
||||
*/
|
||||
@NgModule({
|
||||
providers: [
|
||||
HttpXsrfInterceptor,
|
||||
{provide: HTTP_INTERCEPTORS, useExisting: HttpXsrfInterceptor, multi: true},
|
||||
{provide: HttpXsrfTokenExtractor, useClass: HttpXsrfCookieExtractor},
|
||||
{provide: XSRF_COOKIE_NAME, useValue: 'XSRF-TOKEN'},
|
||||
{provide: XSRF_HEADER_NAME, useValue: 'X-XSRF-TOKEN'},
|
||||
],
|
||||
})
|
||||
export class HttpXsrfModule {
|
||||
/**
|
||||
* Disable the default XSRF protection.
|
||||
*/
|
||||
static disable(): ModuleWithProviders {
|
||||
return {
|
||||
ngModule: HttpXsrfModule,
|
||||
providers: [
|
||||
{provide: HttpXsrfInterceptor, useClass: NoopInterceptor},
|
||||
],
|
||||
};
|
||||
}
|
||||
|
||||
/**
|
||||
* Configure XSRF protection to use the given cookie name or header name,
|
||||
* or the default names (as described above) if not provided.
|
||||
*/
|
||||
static withOptions(options: {
|
||||
cookieName?: string,
|
||||
headerName?: string,
|
||||
} = {}): ModuleWithProviders {
|
||||
return {
|
||||
ngModule: HttpXsrfModule,
|
||||
providers: [
|
||||
options.cookieName ? {provide: XSRF_COOKIE_NAME, useValue: options.cookieName} : [],
|
||||
options.headerName ? {provide: XSRF_HEADER_NAME, useValue: options.headerName} : [],
|
||||
],
|
||||
};
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* `NgModule` which provides the `HttpClient` and associated services.
|
||||
*
|
||||
|
@ -56,6 +110,12 @@ export function jsonpCallbackContext(): Object {
|
|||
* @experimental
|
||||
*/
|
||||
@NgModule({
|
||||
imports: [
|
||||
HttpXsrfModule.withOptions({
|
||||
cookieName: 'XSRF-TOKEN',
|
||||
headerName: 'X-XSRF-TOKEN',
|
||||
}),
|
||||
],
|
||||
providers: [
|
||||
HttpClient,
|
||||
// HttpHandler is the backend + interceptors and is constructed
|
||||
|
@ -90,4 +150,4 @@ export class HttpClientModule {
|
|||
],
|
||||
})
|
||||
export class HttpClientJsonpModule {
|
||||
}
|
||||
}
|
|
@ -0,0 +1,93 @@
|
|||
/**
|
||||
* @license
|
||||
* Copyright Google Inc. All Rights Reserved.
|
||||
*
|
||||
* Use of this source code is governed by an MIT-style license that can be
|
||||
* found in the LICENSE file at https://angular.io/license
|
||||
*/
|
||||
|
||||
import {DOCUMENT, ɵparseCookieValue as parseCookieValue} from '@angular/common';
|
||||
import {Inject, Injectable, InjectionToken, PLATFORM_ID} from '@angular/core';
|
||||
import {Observable} from 'rxjs/Observable';
|
||||
|
||||
import {HttpHandler} from './backend';
|
||||
import {HttpInterceptor} from './interceptor';
|
||||
import {HttpRequest} from './request';
|
||||
import {HttpEvent} from './response';
|
||||
|
||||
export const XSRF_COOKIE_NAME = new InjectionToken<string>('XSRF_COOKIE_NAME');
|
||||
export const XSRF_HEADER_NAME = new InjectionToken<string>('XSRF_HEADER_NAME');
|
||||
|
||||
/**
|
||||
* Retrieves the current XSRF token to use with the next outgoing request.
|
||||
*
|
||||
* @experimental
|
||||
*/
|
||||
export abstract class HttpXsrfTokenExtractor {
|
||||
/**
|
||||
* Get the XSRF token to use with an outgoing request.
|
||||
*
|
||||
* Will be called for every request, so the token may change between requests.
|
||||
*/
|
||||
abstract getToken(): string|null;
|
||||
}
|
||||
|
||||
/**
|
||||
* `HttpXsrfTokenExtractor` which retrieves the token from a cookie.
|
||||
*/
|
||||
@Injectable()
|
||||
export class HttpXsrfCookieExtractor implements HttpXsrfTokenExtractor {
|
||||
private lastCookieString: string = '';
|
||||
private lastToken: string|null = null;
|
||||
|
||||
/**
|
||||
* @internal for testing
|
||||
*/
|
||||
parseCount: number = 0;
|
||||
|
||||
constructor(
|
||||
@Inject(DOCUMENT) private doc: any, @Inject(PLATFORM_ID) private platform: string,
|
||||
@Inject(XSRF_COOKIE_NAME) private cookieName: string) {}
|
||||
|
||||
getToken(): string|null {
|
||||
if (this.platform === 'server') {
|
||||
return null;
|
||||
}
|
||||
const cookieString = this.doc.cookie || '';
|
||||
if (cookieString !== this.lastCookieString) {
|
||||
this.parseCount++;
|
||||
this.lastToken = parseCookieValue(cookieString, this.cookieName);
|
||||
this.lastCookieString = cookieString;
|
||||
}
|
||||
return this.lastToken;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* `HttpInterceptor` which adds an XSRF token to eligible outgoing requests.
|
||||
*/
|
||||
@Injectable()
|
||||
export class HttpXsrfInterceptor implements HttpInterceptor {
|
||||
constructor(
|
||||
private tokenService: HttpXsrfTokenExtractor,
|
||||
@Inject(XSRF_HEADER_NAME) private headerName: string) {}
|
||||
|
||||
intercept(req: HttpRequest<any>, next: HttpHandler): Observable<HttpEvent<any>> {
|
||||
const lcUrl = req.url.toLowerCase();
|
||||
// Skip both non-mutating requests and absolute URLs.
|
||||
// Non-mutating requests don't require a token, and absolute URLs require special handling
|
||||
// anyway as the cookie set
|
||||
// on our origin is not the same as the token expected by another origin.
|
||||
if (req.method === 'GET' || req.method === 'HEAD' || lcUrl.startsWith('http://') ||
|
||||
lcUrl.startsWith('https://')) {
|
||||
return next.handle(req);
|
||||
}
|
||||
const token = this.tokenService.getToken();
|
||||
|
||||
// Be careful not to overwrite an existing header of the same name.
|
||||
if (token !== null && !req.headers.has(this.headerName)) {
|
||||
req = req.clone({headers: req.headers.set(this.headerName, token)});
|
||||
}
|
||||
return next.handle(req);
|
||||
}
|
||||
}
|
|
@ -0,0 +1,88 @@
|
|||
/**
|
||||
* @license
|
||||
* Copyright Google Inc. All Rights Reserved.
|
||||
*
|
||||
* Use of this source code is governed by an MIT-style license that can be
|
||||
* found in the LICENSE file at https://angular.io/license
|
||||
*/
|
||||
|
||||
import {HttpHandler} from '../src/backend';
|
||||
import {HttpHeaders} from '../src/headers';
|
||||
import {HttpRequest} from '../src/request';
|
||||
import {HttpXsrfCookieExtractor, HttpXsrfInterceptor} from '../src/xsrf';
|
||||
|
||||
import {HttpClientTestingBackend} from '../testing/src/backend';
|
||||
|
||||
class SampleTokenExtractor {
|
||||
constructor(private token: string|null) {}
|
||||
|
||||
getToken(): string|null { return this.token; }
|
||||
}
|
||||
|
||||
export function main() {
|
||||
describe('HttpXsrfInterceptor', () => {
|
||||
let backend: HttpClientTestingBackend;
|
||||
const interceptor = new HttpXsrfInterceptor(new SampleTokenExtractor('test'), 'X-XSRF-TOKEN');
|
||||
beforeEach(() => { backend = new HttpClientTestingBackend(); });
|
||||
it('applies XSRF protection to outgoing requests', () => {
|
||||
interceptor.intercept(new HttpRequest('POST', '/test', {}), backend).subscribe();
|
||||
const req = backend.expectOne('/test');
|
||||
expect(req.request.headers.get('X-XSRF-TOKEN')).toEqual('test');
|
||||
req.flush({});
|
||||
});
|
||||
it('does not apply XSRF protection when request is a GET', () => {
|
||||
interceptor.intercept(new HttpRequest('GET', '/test'), backend).subscribe();
|
||||
const req = backend.expectOne('/test');
|
||||
expect(req.request.headers.has('X-XSRF-TOKEN')).toEqual(false);
|
||||
req.flush({});
|
||||
});
|
||||
it('does not apply XSRF protection when request is a HEAD', () => {
|
||||
interceptor.intercept(new HttpRequest('HEAD', '/test'), backend).subscribe();
|
||||
const req = backend.expectOne('/test');
|
||||
expect(req.request.headers.has('X-XSRF-TOKEN')).toEqual(false);
|
||||
req.flush({});
|
||||
});
|
||||
it('does not overwrite existing header', () => {
|
||||
interceptor
|
||||
.intercept(
|
||||
new HttpRequest(
|
||||
'POST', '/test', {}, {headers: new HttpHeaders().set('X-XSRF-TOKEN', 'blah')}),
|
||||
backend)
|
||||
.subscribe();
|
||||
const req = backend.expectOne('/test');
|
||||
expect(req.request.headers.get('X-XSRF-TOKEN')).toEqual('blah');
|
||||
req.flush({});
|
||||
});
|
||||
it('does not set the header for a null token', () => {
|
||||
const interceptor = new HttpXsrfInterceptor(new SampleTokenExtractor(null), 'X-XSRF-TOKEN');
|
||||
interceptor.intercept(new HttpRequest('POST', '/test', {}), backend).subscribe();
|
||||
const req = backend.expectOne('/test');
|
||||
expect(req.request.headers.has('X-XSRF-TOKEN')).toEqual(false);
|
||||
req.flush({});
|
||||
});
|
||||
afterEach(() => { backend.verify(); });
|
||||
});
|
||||
describe('HttpXsrfCookieExtractor', () => {
|
||||
let document: {[key: string]: string};
|
||||
let extractor: HttpXsrfCookieExtractor
|
||||
beforeEach(() => {
|
||||
document = {
|
||||
cookie: 'XSRF-TOKEN=test',
|
||||
};
|
||||
extractor = new HttpXsrfCookieExtractor(document, 'browser', 'XSRF-TOKEN');
|
||||
});
|
||||
it('parses the cookie from document.cookie',
|
||||
() => { expect(extractor.getToken()).toEqual('test'); });
|
||||
it('does not re-parse if document.cookie has not changed', () => {
|
||||
expect(extractor.getToken()).toEqual('test');
|
||||
expect(extractor.getToken()).toEqual('test');
|
||||
expect(extractor.parseCount).toEqual(1);
|
||||
});
|
||||
it('re-parses if document.cookie changes', () => {
|
||||
expect(extractor.getToken()).toEqual('test');
|
||||
document['cookie'] = 'XSRF-TOKEN=blah';
|
||||
expect(extractor.getToken()).toEqual('blah');
|
||||
expect(extractor.parseCount).toEqual(2);
|
||||
});
|
||||
});
|
||||
}
|
|
@ -13,6 +13,7 @@
|
|||
*/
|
||||
export * from './location/index';
|
||||
export {NgLocaleLocalization, NgLocalization} from './localization';
|
||||
export {parseCookieValue as ɵparseCookieValue} from './cookie';
|
||||
export {CommonModule} from './common_module';
|
||||
export {NgClass, NgFor, NgForOf, NgForOfContext, NgIf, NgIfContext, NgPlural, NgPluralCase, NgStyle, NgSwitch, NgSwitchCase, NgSwitchDefault, NgTemplateOutlet, NgComponentOutlet} from './directives/index';
|
||||
export {DOCUMENT} from './dom_tokens';
|
||||
|
|
|
@ -0,0 +1,20 @@
|
|||
/**
|
||||
* @license
|
||||
* Copyright Google Inc. All Rights Reserved.
|
||||
*
|
||||
* Use of this source code is governed by an MIT-style license that can be
|
||||
* found in the LICENSE file at https://angular.io/license
|
||||
*/
|
||||
|
||||
export function parseCookieValue(cookieStr: string, name: string): string|null {
|
||||
name = encodeURIComponent(name);
|
||||
for (const cookie of cookieStr.split(';')) {
|
||||
const eqIndex = cookie.indexOf('=');
|
||||
const [cookieName, cookieValue]: string[] =
|
||||
eqIndex == -1 ? [cookie, ''] : [cookie.slice(0, eqIndex), cookie.slice(eqIndex + 1)];
|
||||
if (cookieName.trim() === name) {
|
||||
return decodeURIComponent(cookieValue);
|
||||
}
|
||||
}
|
||||
return null;
|
||||
}
|
|
@ -0,0 +1,37 @@
|
|||
/**
|
||||
* @license
|
||||
* Copyright Google Inc. All Rights Reserved.
|
||||
*
|
||||
* Use of this source code is governed by an MIT-style license that can be
|
||||
* found in the LICENSE file at https://angular.io/license
|
||||
*/
|
||||
|
||||
|
||||
|
||||
/**
|
||||
* @license
|
||||
* Copyright Google Inc. All Rights Reserved.
|
||||
*
|
||||
* Use of this source code is governed by an MIT-style license that can be
|
||||
* found in the LICENSE file at https://angular.io/license
|
||||
*/
|
||||
|
||||
import {parseCookieValue} from '@angular/common/src/cookie';
|
||||
import {describe, expect, it} from '@angular/core/testing/src/testing_internal';
|
||||
|
||||
export function main() {
|
||||
describe('cookies', () => {
|
||||
it('parses cookies', () => {
|
||||
const cookie = 'other-cookie=false; xsrf-token=token-value; is_awesome=true; ffo=true;';
|
||||
expect(parseCookieValue(cookie, 'xsrf-token')).toBe('token-value');
|
||||
});
|
||||
it('handles encoded keys', () => {
|
||||
expect(parseCookieValue('whitespace%20token=token-value', 'whitespace token'))
|
||||
.toBe('token-value');
|
||||
});
|
||||
it('handles encoded values', () => {
|
||||
expect(parseCookieValue('token=whitespace%20', 'token')).toBe('whitespace ');
|
||||
expect(parseCookieValue('token=whitespace%0A', 'token')).toBe('whitespace\n');
|
||||
});
|
||||
});
|
||||
}
|
|
@ -6,7 +6,9 @@
|
|||
* found in the LICENSE file at https://angular.io/license
|
||||
*/
|
||||
|
||||
import {ɵparseCookieValue as parseCookieValue} from '@angular/common';
|
||||
import {ɵglobal as global} from '@angular/core';
|
||||
|
||||
import {setRootDomAdapter} from '../dom/dom_adapter';
|
||||
|
||||
import {GenericBrowserDomAdapter} from './generic_browser_adapter';
|
||||
|
@ -405,16 +407,3 @@ function relativePath(url: any): string {
|
|||
return (urlParsingNode.pathname.charAt(0) === '/') ? urlParsingNode.pathname :
|
||||
'/' + urlParsingNode.pathname;
|
||||
}
|
||||
|
||||
export function parseCookieValue(cookieStr: string, name: string): string|null {
|
||||
name = encodeURIComponent(name);
|
||||
for (const cookie of cookieStr.split(';')) {
|
||||
const eqIndex = cookie.indexOf('=');
|
||||
const [cookieName, cookieValue]: string[] =
|
||||
eqIndex == -1 ? [cookie, ''] : [cookie.slice(0, eqIndex), cookie.slice(eqIndex + 1)];
|
||||
if (cookieName.trim() === name) {
|
||||
return decodeURIComponent(cookieValue);
|
||||
}
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
|
|
@ -9,22 +9,9 @@
|
|||
import {describe, expect, it} from '@angular/core/testing/src/testing_internal';
|
||||
import {getDOM} from '@angular/platform-browser/src/dom/dom_adapter';
|
||||
|
||||
import {parseCookieValue} from '../../src/browser/browser_adapter';
|
||||
|
||||
export function main() {
|
||||
describe('cookies', () => {
|
||||
it('parses cookies', () => {
|
||||
const cookie = 'other-cookie=false; xsrf-token=token-value; is_awesome=true; ffo=true;';
|
||||
expect(parseCookieValue(cookie, 'xsrf-token')).toBe('token-value');
|
||||
});
|
||||
it('handles encoded keys', () => {
|
||||
expect(parseCookieValue('whitespace%20token=token-value', 'whitespace token'))
|
||||
.toBe('token-value');
|
||||
});
|
||||
it('handles encoded values', () => {
|
||||
expect(parseCookieValue('token=whitespace%20', 'token')).toBe('whitespace ');
|
||||
expect(parseCookieValue('token=whitespace%0A', 'token')).toBe('whitespace\n');
|
||||
});
|
||||
it('sets cookie values', () => {
|
||||
getDOM().setCookie('my test cookie', 'my test value');
|
||||
getDOM().setCookie('my other cookie', 'my test value 2');
|
||||
|
|
|
@ -1246,6 +1246,20 @@ export declare class HttpXhrBackend implements HttpBackend {
|
|||
handle(req: HttpRequest<any>): Observable<HttpEvent<any>>;
|
||||
}
|
||||
|
||||
/** @experimental */
|
||||
export declare class HttpXsrfModule {
|
||||
static disable(): ModuleWithProviders;
|
||||
static withOptions(options?: {
|
||||
cookieName?: string;
|
||||
headerName?: string;
|
||||
}): ModuleWithProviders;
|
||||
}
|
||||
|
||||
/** @experimental */
|
||||
export declare abstract class HttpXsrfTokenExtractor {
|
||||
abstract getToken(): string | null;
|
||||
}
|
||||
|
||||
/** @experimental */
|
||||
export declare class JsonpClientBackend implements HttpBackend {
|
||||
constructor(callbackMap: JsonpCallbackContext, document: any);
|
||||
|
|
Loading…
Reference in New Issue