Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added endpoint to generate csrf tokens #1281

Merged
merged 10 commits into from
Apr 5, 2025
Merged

Conversation

abhayymishraa
Copy link
Collaborator

Resolves #(put the issue number here)

  • Added endpoint /csrf for the genration of csrf
  • Added utility
  • Fixed testcase

Add the PR description here.

Copy link
Contributor

coderabbitai bot commented Apr 3, 2025

Summary by CodeRabbit

  • New Features
    • Enhanced security with improved protection against cross-site request forgery. Token retrieval is now handled asynchronously, ensuring more secure interactions.
  • Chores
    • Streamlined environment configurations and build processes for greater stability and performance.
  • Documentation
    • Updated guidelines and command instructions for a clearer, more user-friendly experience.

Walkthrough

This pull request implements extensive updates to the CSRF protection mechanism across the codebase. On the backend, CSRF decorators have been switched, and a new endpoint for retrieving CSRF tokens has been added. In the frontend, functions for obtaining the CSRF token now use asynchronous patterns and are supported by a new environment variable and constant. Additionally, numerous test suites have been updated to set a predefined CSRF cookie before page navigation, and various Makefiles, workflow configurations, and proxy settings have been adjusted accordingly.

Changes

File Change Summary
backend/settings/urls.py, backend/apps/core/api/csrf.py Replaced csrf_exempt with csrf_protect for key endpoints, added a new CSRF token route, and introduced the get_csrf_token API function.
backend/Makefile Added a new target (clean-backend) to remove cache, local, and virtual environment directories.
frontend/src/api/fetchAlgoliaData.ts, frontend/src/utils/helpers/apolloClient.ts, frontend/src/utils/utility.ts, frontend/src/api/fetchCsrfToken.ts Updated CSRF token retrieval to be asynchronous (using await), modified getCsrfToken to return a promise, and added the fetchCsrfToken function.
frontend/.env.example, frontend/src/utils/credentials.ts, frontend/vite.config.ts Introduced the new environment variable VITE_CSRF_URL and its corresponding export for frontend configuration.
frontend/__tests__/unit/utils/utility.test.ts Modified unit tests to handle asynchronous CSRF token retrieval with a mocked response returning 'abc123'.
frontend/__tests__/e2e/pages/… Added a cookie setup in the beforeEach hooks of all e2e test suites to inject a csrftoken with the value 'abc123' before navigation.
.github/workflows/run-ci-cd.yaml, .github/workflows/test-schema.yaml, CONTRIBUTING.md, Makefile Revised command prompts from make check-all/make test-all to make check/make test, appended VITE_CSRF_URL in the CI setup, and updated Makefile targets (removed/renamed targets).
frontend/Makefile, schema/Makefile Added new cleaning targets (clean-frontend and clean-schema) to remove build artifacts and virtual environment directories.
proxy/production.conf, proxy/staging.conf Updated regex patterns in location directives to include the csrf endpoint.

📜 Recent review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between b2d3fd1 and bebf4e8.

📒 Files selected for processing (3)
  • backend/Makefile (1 hunks)
  • backend/apps/core/api/csrf.py (1 hunks)
  • frontend/src/utils/utility.ts (2 hunks)
🚧 Files skipped from review as they are similar to previous changes (3)
  • backend/apps/core/api/csrf.py
  • frontend/src/utils/utility.ts
  • backend/Makefile
⏰ Context from checks skipped due to timeout of 90000ms (4)
  • GitHub Check: Run backend tests
  • GitHub Check: Run frontend unit tests
  • GitHub Check: Run frontend e2e tests
  • GitHub Check: CodeQL (javascript-typescript)

🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings to generate docstrings for this PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai plan to trigger planning for file edits and PR creation.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 3

🧹 Nitpick comments (4)
backend/settings/urls.py (1)

28-28: Add trailing slash to the CSRF endpoint for consistency

All other API endpoints in this file include a trailing slash. For consistency in URL patterns, consider adding a trailing slash to the CSRF endpoint as well.

-    path("csrf", get_csrf_token),
+    path("csrf/", get_csrf_token),
frontend/src/api/getCsrfToken.ts (2)

13-15: Enhance cookie security settings and add data validation.

The cookie implementation has several issues:

  1. Missing the Secure flag (prevents sending over HTTP)
  2. Missing the HttpOnly flag (prevents JavaScript access)
  3. No validation that data.csrftoken exists before using it
- const data = await response.json()
- document.cookie = `csrftoken=${data.csrftoken}; path=/; SameSite=Lax`
- return data.csrftoken
+ const data = await response.json()
+ if (!data || !data.csrftoken) {
+   throw new AppError(500, 'Invalid CSRF token response')
+ }
+ const isSecure = window.location.protocol === 'https:';
+ document.cookie = `csrftoken=${data.csrftoken}; path=/; SameSite=Lax${isSecure ? '; Secure' : ''}`
+ return data.csrftoken

16-21: Improve error logging for better debugging.

The current error handling doesn't provide specific information about non-AppError exceptions. Consider adding more detailed error logging for different error types.

  } catch (error) {
    if (error instanceof AppError) {
      throw error
    }
-   throw new AppError(500, 'Internal server error')
+   console.error('Failed to fetch CSRF token:', error)
+   throw new AppError(
+     500,
+     `Error fetching CSRF token: ${error instanceof Error ? error.message : 'Unknown error'}`
+   )
  }
frontend/__tests__/unit/utils/utility.test.ts (1)

16-20: Consider testing the original cookie value's integrity.

While the test verifies that the correct cookie value is returned, it doesn't explicitly verify that the function doesn't modify or access the cookie unnecessarily. This could be important for security.

  test('returns CSRF token when it exists in cookies', async () => {
    document.cookie = 'csrftoken=abc123; otherkey=xyz789'
    const result = await getCsrfToken()
    expect(result).toBe('abc123')
+   // Verify getInitialCsrfToken was not called when cookie exists
+   const { getInitialCsrfToken } = require('api/getCsrfToken')
+   expect(getInitialCsrfToken).not.toHaveBeenCalled()
  })
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 2a60606 and 4f971ac.

📒 Files selected for processing (7)
  • backend/apps/core/api/csrf_token.py (1 hunks)
  • backend/settings/urls.py (2 hunks)
  • frontend/__tests__/unit/utils/utility.test.ts (2 hunks)
  • frontend/src/api/fetchAlgoliaData.ts (1 hunks)
  • frontend/src/api/getCsrfToken.ts (1 hunks)
  • frontend/src/utils/helpers/apolloClient.ts (1 hunks)
  • frontend/src/utils/utility.ts (2 hunks)
🧰 Additional context used
🧬 Code Definitions (5)
frontend/src/api/fetchAlgoliaData.ts (1)
frontend/src/utils/utility.ts (1)
  • getCsrfToken (69-82)
backend/settings/urls.py (2)
backend/apps/core/api/algolia.py (1)
  • algolia_search (57-111)
backend/apps/core/api/csrf_token.py (1)
  • get_csrf_token (4-6)
frontend/src/utils/helpers/apolloClient.ts (1)
frontend/src/utils/utility.ts (1)
  • getCsrfToken (69-82)
frontend/src/utils/utility.ts (1)
frontend/src/api/getCsrfToken.ts (1)
  • getInitialCsrfToken (3-22)
frontend/__tests__/unit/utils/utility.test.ts (1)
frontend/src/utils/utility.ts (1)
  • getCsrfToken (69-82)
🪛 Ruff (0.8.2)
backend/apps/core/api/csrf_token.py

1-1: Missing docstring in public module

(D100)


5-5: First line of docstring should be in imperative mood: "Returns a response with the CSRF token to set it in cookies."

(D401)


7-7: Blank line contains whitespace

Remove whitespace from blank line

(W293)


7-7: No newline at end of file

Add trailing newline

(W292)

🪛 GitHub Actions: Run CI/CD
backend/apps/core/api/csrf_token.py

[error] 1-1: D100 Missing docstring in public module


[error] 6-6: D401 First line of docstring should be in imperative mood: 'Returns a response with the CSRF token to set it in cookies.'

⏰ Context from checks skipped due to timeout of 90000ms (1)
  • GitHub Check: CodeQL (javascript-typescript)
🔇 Additional comments (8)
backend/settings/urls.py (3)

11-11: LGTM: Importing CSRF protection decorator

The import of the csrf_protect decorator is appropriate for enhancing security by enforcing CSRF protection.


16-16: LGTM: Importing the CSRF token function

Importing the newly created function from the CSRF token module is the correct approach.


26-27: Security improvement: Enforcing CSRF protection on endpoints

Applying the csrf_protect decorator to these endpoints enhances security by ensuring that CSRF protection is enforced, which is a good security practice especially for endpoints that modify data.

frontend/src/api/fetchAlgoliaData.ts (1)

23-23: LGTM: Properly handling the asynchronous CSRF token retrieval

The code correctly awaits the CSRF token before including it in the request headers, which is necessary due to the updated asynchronous implementation of getCsrfToken.

frontend/src/utils/utility.ts (1)

1-1: LGTM: Importing the initial CSRF token function

The import statement correctly brings in the getInitialCsrfToken function that will be used to fetch the CSRF token when it's not available in cookies.

frontend/src/utils/helpers/apolloClient.ts (1)

19-26: LGTM - Appropriate use of async/await with CSRF token retrieval.

The conversion to async/await is correctly implemented, ensuring that the CSRF token is properly retrieved before adding it to the headers.

frontend/__tests__/unit/utils/utility.test.ts (2)

3-5: LGTM - Good mocking approach for isolated testing.

The mock for getInitialCsrfToken is well-structured and consistent with test best practices.


16-50: LGTM - Tests appropriately updated for asynchronous behavior.

The test cases have been correctly updated to be asynchronous and properly test the new behavior of the getCsrfToken function. Test descriptions are clear and expectations are accurate.

Comment on lines 69 to 82
export const getCsrfToken = async () => {
const csrfToken = document.cookie
.split(';')
.map((cookie) => cookie.split('='))
.find(([key]) => key.trim() === 'csrftoken')?.[1]
?.trim()

if (csrfToken) {
return csrfToken
}

const res = await getInitialCsrfToken()
return res
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Verification agent

🧩 Analysis chain

Verify the hardcoded URL used in getInitialCsrfToken

While the asynchronous implementation is sound, the function ultimately calls getInitialCsrfToken() which uses a hardcoded URL (http://localhost:8000/csrf). This won't work in production environments.

Please check the implementation of getInitialCsrfToken to ensure it's using a configurable base URL rather than hardcoding localhost:


🏁 Script executed:

#!/bin/bash
# Check if the URL is hardcoded in getInitialCsrfToken
cat frontend/src/api/getCsrfToken.ts

Length of output: 621


Attention: Refactor URL Configuration in getInitialCsrfToken

The implementation in frontend/src/api/getCsrfToken.ts still uses a hardcoded URL (http://localhost:8000/csrf). This approach will fail in production. Please update the function so that it retrieves the base URL from an environment variable or a configuration file rather than being fixed.

  • File: frontend/src/api/getCsrfToken.ts
  • Issue: Hardcoded URL in the fetch call.
  • Recommendation: Use a dynamic, configurable URL to ensure proper endpoint configuration across environments.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (1)
frontend/src/api/getCsrfToken.ts (1)

1-23: CSRF token retrieval function looks good, but could use some enhancements.

The implementation correctly fetches the CSRF token from the server and sets it as a cookie. However, there are a few improvements that could make the function more robust:

Consider these enhancements:

  1. Add cookie security options for production environments
- document.cookie = `csrftoken=${data.csrftoken}; path=/; SameSite=Lax`
+ document.cookie = `csrftoken=${data.csrftoken}; path=/; SameSite=Lax${
+   window.location.protocol === 'https:' ? '; Secure' : ''
+ }`
  1. Add validation for the response data structure
    const data = await response.json()
+   if (!data.csrftoken) {
+     throw new AppError(500, 'Invalid response: Missing CSRF token')
+   }
    document.cookie = `csrftoken=${data.csrftoken}; path=/; SameSite=Lax`
  1. Consider adding an expiration time for the cookie if needed, otherwise it will be a session cookie by default.
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 4f971ac and 091bdf5.

📒 Files selected for processing (6)
  • backend/apps/core/api/csrf_token.py (1 hunks)
  • backend/settings/urls.py (2 hunks)
  • frontend/.env.example (1 hunks)
  • frontend/src/api/getCsrfToken.ts (1 hunks)
  • frontend/src/utils/credentials.ts (1 hunks)
  • frontend/vite.config.ts (1 hunks)
🚧 Files skipped from review as they are similar to previous changes (2)
  • backend/apps/core/api/csrf_token.py
  • backend/settings/urls.py
🧰 Additional context used
🧬 Code Definitions (1)
frontend/src/api/getCsrfToken.ts (1)
frontend/src/utils/credentials.ts (1)
  • CSRF_URL (2-2)
⏰ Context from checks skipped due to timeout of 90000ms (4)
  • GitHub Check: Run backend tests
  • GitHub Check: Run frontend e2e tests
  • GitHub Check: Run frontend unit tests
  • GitHub Check: CodeQL (javascript-typescript)
🔇 Additional comments (4)
frontend/.env.example (1)

2-2: LGTM: New CSRF URL environment variable is properly defined.

The new environment variable follows the established pattern of the file and provides a clear endpoint for CSRF token generation.

frontend/src/utils/credentials.ts (1)

2-2: LGTM: New CSRF URL constant exports the environment variable correctly.

The constant is properly defined and matches the pattern of other credential exports.

frontend/vite.config.ts (1)

18-18: LGTM: Environment variable properly added to Vite configuration.

The CSRF URL is correctly included in the EnvironmentPlugin configuration, making it accessible to the application.

frontend/src/api/getCsrfToken.ts (1)

6-6: LGTM: Using the environment variable instead of hardcoded URL.

The function correctly uses the CSRF_URL constant from environment variables, addressing a previous comment about hardcoded URLs.

@abhayymishraa
Copy link
Collaborator Author

@coderabbitai could you review this pr for any improvements and vulnurability! Thank you

Copy link
Contributor

coderabbitai bot commented Apr 3, 2025

Tip

For best results, initiate chat on the files or code changes.

🧩 Analysis chain

🏁 Script executed:

#!/bin/bash
# Get the list of files changed in this PR
git diff --name-only HEAD~1 HEAD

# Look at the specific files mentioned in the summary
echo "==== Examining backend/apps/core/api/csrf_token.py ===="
cat backend/apps/core/api/csrf_token.py || echo "File not found"

echo "==== Examining backend/settings/urls.py ===="
cat backend/settings/urls.py || echo "File not found"

echo "==== Examining frontend/src/api/getCsrfToken.ts ===="
cat frontend/src/api/getCsrfToken.ts || echo "File not found"

echo "==== Examining frontend/src/utils/utility.ts (getCsrfToken function) ===="
cat frontend/src/utils/utility.ts || echo "File not found"

# Look for the security hotspot mentioned by SonarQube
echo "==== Searching for potential security issues in the code ===="
rg -n "csrf" --type py backend/
rg -n "csrf" --type ts frontend/

# Check for duplicate code (mentioned in SonarQube report)
echo "==== Checking for potential duplicate code ===="
rg -n "getInitialCsrfToken" --type ts frontend/

Length of output: 8381


@abhayymishraa Thanks for asking me to review your PR! I've examined the code and have several observations about potential improvements and security considerations:

Security Considerations

  1. Cookie Security Settings: In frontend/src/api/getCsrfToken.ts, you're setting the CSRF token cookie with SameSite=Lax, which is good. However, I recommend adding the Secure flag in production environments to prevent the token from being transmitted over non-HTTPS connections:
// Add conditional for production environment
document.cookie = `csrftoken=${data.csrftoken}; path=/; SameSite=Lax${window.location.protocol === 'https:' ? '; Secure' : ''}`
  1. Token Expiry: Consider adding an expiration time to the CSRF token cookie to limit the window of possible attacks:
// Add max-age or expires attribute
const expiryMinutes = 60; // 1 hour
document.cookie = `csrftoken=${data.csrftoken}; path=/; SameSite=Lax; max-age=${expiryMinutes * 60}`
  1. Error Handling: The error handling in getInitialCsrfToken() is good, but could be more specific about network failures versus server errors:
try {
  // ...existing code
} catch (error) {
  if (error instanceof AppError) {
    throw error;
  }
  if (error instanceof TypeError && error.message.includes('fetch')) {
    throw new AppError(503, 'Network error - unable to connect to server');
  }
  throw new AppError(500, 'Internal server error');
}

Other Improvements

  1. Cookie Parsing Robustness: The cookie parsing in getCsrfToken() could be more robust:
export const getCsrfToken = async () => {
  const cookieValue = document.cookie
    .split(';')
    .map(cookie => cookie.trim().split('='))
    .find(([key]) => key === 'csrftoken');
  
  if (cookieValue && cookieValue[1] && cookieValue[1].trim()) {
    return cookieValue[1].trim();
  }
  
  return await getInitialCsrfToken();
}
  1. Code Duplication: SonarQube reports 23.7% duplication. While I don't see obvious duplication in the core CSRF functionality, consider reviewing your implementation to identify repeated patterns in API calls or error handling.

Positive Aspects

  • Good use of Django's built-in CSRF protection mechanisms
  • Proper implementation of the asynchronous token fetching
  • Well-structured error handling with custom error classes
  • Correctly protecting routes with the csrf_protect decorator

I hope these suggestions help improve your implementation. Let me know if you need any clarification!

( __/)
(•ᴗ•)
/ >📝

Code Analysis Tools

Tool Analysis Results

CodeRabbit ran static analysis tools on your files and found the following:

No specific issues were found in your files. You can proceed with your changes.

@abhayymishraa
Copy link
Collaborator Author

i think
2. Token Expiry: Consider adding an expiration time to the CSRF token cookie to limit the window of possible attacks:

// Add max-age or expires attribute
const expiryMinutes = 60; // 1 hour
document.cookie = `csrftoken=${data.csrftoken}; path=/; SameSite=Lax; max-age=${expiryMinutes * 60}`

We can do that but if we not specify expiry minutes then it will be treated as session key by default. So it depends on weather we want to specify expiry time or use it as a default session key

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Nitpick comments (3)
frontend/src/utils/utility.ts (3)

70-74: Improve cookie parsing robustness

The current cookie parsing logic could be more robust to handle edge cases. If cookies are malformed or if there's an empty cookie string, this approach might not handle it gracefully.

-  const csrfToken = document.cookie
-    .split(';')
-    .map((cookie) => cookie.split('='))
-    .find(([key]) => key.trim() === 'csrftoken')?.[1]
-    ?.trim()
+  // Get CSRF token from cookies using regex for more robust parsing
+  const cookieValue = document.cookie.replace(/(?:(?:^|.*;\s*)csrftoken\s*=\s*([^;]*).*$)|^.*$/, "$1")
+  const csrfToken = cookieValue || undefined

69-69: Add explicit return type

The function currently has an implicit return type. Adding an explicit return type would improve type safety and make it clearer to consumers what they can expect.

-export const getCsrfToken = async () => {
+export const getCsrfToken = async (): Promise<string> => {

69-81: Add token expiration handling

The function does not check if the CSRF token in the cookie has expired. If the token expires, the application might continue trying to use an invalid token until the page is refreshed.

Consider adding token expiration validation and refreshing expired tokens:

export const getCsrfToken = async (): Promise<string> => {
+  // Check if token exists and is not expired
+  const tokenExpirationKey = 'csrfTokenExpiration'
  const csrfToken = document.cookie
    .split(';')
    .map((cookie) => cookie.split('='))
    .find(([key]) => key.trim() === 'csrftoken')?.[1]
    ?.trim()
+  const expirationTime = localStorage.getItem(tokenExpirationKey)
+  const isExpired = expirationTime && parseInt(expirationTime, 10) < Date.now()

-  if (csrfToken) {
+  if (csrfToken && !isExpired) {
    return csrfToken
  }

+  // If token is expired, clear it from storage
+  if (isExpired) {
+    document.cookie = 'csrftoken=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT'
+  }

  try {
    const token = await getInitialCsrfToken()
+    // Store expiration time (e.g., 1 hour from now)
+    localStorage.setItem(tokenExpirationKey, (Date.now() + 3600000).toString())
    return token
  } catch (error) {
    console.error('Failed to retrieve CSRF token:', error)
    throw error
  }
}
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 091bdf5 and 5cd461c.

📒 Files selected for processing (2)
  • frontend/src/api/getCsrfToken.ts (1 hunks)
  • frontend/src/utils/utility.ts (2 hunks)
🚧 Files skipped from review as they are similar to previous changes (1)
  • frontend/src/api/getCsrfToken.ts
🧰 Additional context used
🧬 Code Definitions (1)
frontend/src/utils/utility.ts (1)
frontend/src/api/getCsrfToken.ts (1)
  • getInitialCsrfToken (4-23)
⏰ Context from checks skipped due to timeout of 90000ms (5)
  • GitHub Check: Run frontend unit tests
  • GitHub Check: Run backend tests
  • GitHub Check: Run frontend e2e tests
  • GitHub Check: CodeQL (python)
  • GitHub Check: CodeQL (javascript-typescript)
🔇 Additional comments (1)
frontend/src/utils/utility.ts (1)

1-1: Verify URL configuration in dependent function

This function now depends on getInitialCsrfToken, which from past reviews appears to use a hardcoded URL. Ensure that the URL configuration in getInitialCsrfToken is properly configured for different environments.

#!/bin/bash
# Check if there's any configuration for the CSRF URL
grep -r "CSRF_URL" --include="*.ts" --include="*.js" frontend/src/

Comment on lines 69 to 81
export const getCsrfToken = async () => {
const csrfToken = document.cookie
.split(';')
.map((cookie) => cookie.split('='))
.find(([key]) => key.trim() === 'csrftoken')?.[1]
?.trim()

if (csrfToken) {
return csrfToken
}

return await getInitialCsrfToken()
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Add error handling for token retrieval

While converting the function to async is a good improvement for handling token retrieval, there's no error handling around the getInitialCsrfToken() call. If the token fetching fails, the error will propagate to the caller without any context or handling.

export const getCsrfToken = async () => {
  const csrfToken = document.cookie
    .split(';')
    .map((cookie) => cookie.split('='))
    .find(([key]) => key.trim() === 'csrftoken')?.[1]
    ?.trim()

  if (csrfToken) {
    return csrfToken
  }

-  return await getInitialCsrfToken()
+  try {
+    return await getInitialCsrfToken()
+  } catch (error) {
+    console.error('Failed to retrieve CSRF token:', error)
+    throw error
+  }
}
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
export const getCsrfToken = async () => {
const csrfToken = document.cookie
.split(';')
.map((cookie) => cookie.split('='))
.find(([key]) => key.trim() === 'csrftoken')?.[1]
?.trim()
if (csrfToken) {
return csrfToken
}
return await getInitialCsrfToken()
}
export const getCsrfToken = async () => {
const csrfToken = document.cookie
.split(';')
.map((cookie) => cookie.split('='))
.find(([key]) => key.trim() === 'csrftoken')?.[1]
?.trim()
if (csrfToken) {
return csrfToken
}
try {
return await getInitialCsrfToken()
} catch (error) {
console.error('Failed to retrieve CSRF token:', error)
throw error
}
}

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (4)
frontend/__tests__/e2e/pages/Projects.spec.ts (1)

15-22: CSRF token setup looks good.

The addition of the CSRF token cookie in the beforeEach hook is appropriate for ensuring tests run correctly with the new CSRF protection mechanisms. The implementation correctly uses Playwright's API to set up the necessary test state.

Consider adding a helper function across test files to avoid duplicating this cookie setup code, which would improve maintainability if token requirements change in the future.

// Could be extracted to a shared helper function in a utils file
+ // import { setupCsrfToken } from '@e2e/utils/testHelpers'
  test.beforeEach(async ({ page }) => {
    await page.route('**/idx/', async (route) => {
      await route.fulfill({
        status: 200,
        body: JSON.stringify({
          hits: mockProjectData.projects,
          nbPages: 2,
        }),
      })
    })
-   await page.context().addCookies([
-     {
-       name: 'csrftoken',
-       value: 'abc123',
-       domain: 'localhost',
-       path: '/',
-     },
-   ])
+   // await setupCsrfToken(page)
    await page.goto('/projects')
  })
frontend/__tests__/e2e/pages/UserDetails.spec.ts (1)

12-19: CSRF token implementation maintains consistency across test files.

This implementation follows the same pattern as other test files, ensuring that all pages have the necessary CSRF token available for testing. The test will now correctly simulate the environment where CSRF protection is enabled.

While the current implementation works well for testing, consider enhancing it in the future by:

  1. Creating a shared helper function to reduce duplication across test files
  2. Potentially using a more realistic token value (though 'abc123' is adequate for testing)
frontend/__tests__/e2e/pages/Contribute.spec.ts (2)

15-22: Consider adding security attributes to match production environment.

While this works for testing, consider adding security attributes like Secure and SameSite to the test cookie to better mimic the production environment:

await page.context().addCookies([
  {
    name: 'csrftoken',
    value: 'abc123',
    domain: 'localhost',
    path: '/',
+   secure: true,
+   sameSite: 'Lax',
  },
])

15-22: Consider adding an expiration time to the CSRF token cookie.

As mentioned in the PR comments, it might be beneficial to add an expiration time to the cookie, even in tests, to fully simulate the intended production behavior:

await page.context().addCookies([
  {
    name: 'csrftoken',
    value: 'abc123',
    domain: 'localhost',
    path: '/',
+   expires: Math.floor(Date.now() / 1000) + 3600, // 1 hour from now
  },
])
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 5cd461c and 4148616.

📒 Files selected for processing (13)
  • frontend/__tests__/e2e/pages/About.spec.ts (1 hunks)
  • frontend/__tests__/e2e/pages/ChapterDetails.spec.ts (1 hunks)
  • frontend/__tests__/e2e/pages/Chapters.spec.tsx (1 hunks)
  • frontend/__tests__/e2e/pages/CommitteeDetails.spec.ts (1 hunks)
  • frontend/__tests__/e2e/pages/Committees.spec.ts (1 hunks)
  • frontend/__tests__/e2e/pages/Contribute.spec.ts (1 hunks)
  • frontend/__tests__/e2e/pages/Home.spec.ts (1 hunks)
  • frontend/__tests__/e2e/pages/ProjectDetails.spec.ts (1 hunks)
  • frontend/__tests__/e2e/pages/Projects.spec.ts (1 hunks)
  • frontend/__tests__/e2e/pages/RepositoryDetails.spec.ts (1 hunks)
  • frontend/__tests__/e2e/pages/UserDetails.spec.ts (1 hunks)
  • frontend/__tests__/e2e/pages/Users.spec.tsx (1 hunks)
  • frontend/__tests__/e2e/pages/footerIcons.spec.ts (1 hunks)
⏰ Context from checks skipped due to timeout of 90000ms (4)
  • GitHub Check: Run frontend e2e tests
  • GitHub Check: Run backend tests
  • GitHub Check: Run frontend unit tests
  • GitHub Check: CodeQL (javascript-typescript)
🔇 Additional comments (11)
frontend/__tests__/e2e/pages/Home.spec.ts (1)

12-19: CSRF token setup is consistent.

The implementation matches the pattern used in other test files, ensuring all pages have the necessary CSRF token cookie available. This is essential for the new asynchronous CSRF token mechanism introduced in this PR.

frontend/__tests__/e2e/pages/RepositoryDetails.spec.ts (1)

12-19: CSRF token setup is properly implemented.

The cookie setup follows the same pattern as other test files, maintaining consistency across the test suite. The static value 'abc123' is sufficient for testing purposes.

frontend/__tests__/e2e/pages/Users.spec.tsx (1)

15-22: CSRF token cookie setup is appropriate

The addition of the CSRF token cookie in the test setup is consistent with the PR's objective of enhancing CSRF protection. This ensures the tests will work correctly with the new CSRF token validation mechanisms.

frontend/__tests__/e2e/pages/ProjectDetails.spec.ts (1)

12-19: CSRF token cookie setup looks good

The addition of the CSRF token cookie in the test setup aligns with the new CSRF protection mechanisms implemented in this PR. The cookie configuration is properly set with the appropriate domain and path.

frontend/__tests__/e2e/pages/Committees.spec.ts (1)

15-22: CSRF token cookie setup is correctly implemented

The addition of the CSRF token cookie before page navigation ensures that the tests will function correctly with the new CSRF protection. The implementation is consistent with other test files in this PR.

frontend/__tests__/e2e/pages/About.spec.ts (1)

19-26: CSRF token cookie setup is well integrated

The addition of the CSRF token cookie in the test setup is consistent with the rest of the changes in this PR. This ensures that tests will continue to work with the new CSRF protection mechanisms.

frontend/__tests__/e2e/pages/CommitteeDetails.spec.ts (1)

12-19: CSRF token setup looks good.

The addition of a CSRF token cookie to the test setup is appropriate and follows best practices for E2E testing with protected routes. Setting this up in the beforeEach block ensures all tests have the necessary security context.

frontend/__tests__/e2e/pages/Chapters.spec.tsx (1)

15-22: CSRF token implementation is consistent.

The CSRF token setup matches the pattern implemented across other test files, establishing good consistency in your testing approach. This ensures that tests can interact with endpoints that may enforce CSRF protection.

frontend/__tests__/e2e/pages/ChapterDetails.spec.ts (1)

12-19: CSRF token cookie setup properly implemented.

The addition of the CSRF token cookie before navigating to the chapter details page ensures that your tests will continue to function correctly with the new CSRF protection in place. This implementation is consistent with other test files.

frontend/__tests__/e2e/pages/footerIcons.spec.ts (1)

5-12: CSRF token setup for site-wide protection.

Adding the CSRF token cookie setup for the homepage tests suggests that CSRF protection is being implemented application-wide. This is a good security practice that ensures all forms and state-changing operations across the site are protected.

frontend/__tests__/e2e/pages/Contribute.spec.ts (1)

15-22: LGTM! Good addition of CSRF token cookie for test environment.

The implementation correctly adds a CSRF token cookie before navigating to the page, which is essential for testing the new CSRF protection mechanism introduced in this PR.

@abhayymishraa abhayymishraa marked this pull request as ready for review April 3, 2025 22:52
Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (3)
frontend/src/api/getCsrfToken.ts (3)

15-16: Consider adding token format validation.

The function assumes the response will contain a valid csrftoken property but doesn't validate its format or presence.

    const data = await response.json()
+   if (!data.csrftoken || typeof data.csrftoken !== 'string') {
+     throw new AppError(500, 'Invalid CSRF token received')
+   }
    return data.csrftoken

17-22: Error handling could be more specific.

The error handling is good at differentiating between AppError instances and other errors, but using a generic 500 error for all other error types might hide useful debugging information.

  } catch (error) {
    if (error instanceof AppError) {
      throw error
    }
-   throw new AppError(500, 'Internal server error')
+   // Provide more context about the error type
+   const errorMessage = error instanceof Error ? error.message : 'Unknown error'
+   throw new AppError(500, `Failed to fetch CSRF token: ${errorMessage}`)
  }

6-9: Consider adding timeout handling for the fetch request.

Network requests without timeouts can hang indefinitely in certain scenarios, potentially affecting user experience.

-   const response = await fetch(CSRF_URL, {
+   // Add timeout handling with AbortController
+   const controller = new AbortController();
+   const timeoutId = setTimeout(() => controller.abort(), 10000); // 10 second timeout
+   
+   try {
+     const response = await fetch(CSRF_URL, {
      method: 'GET',
      credentials: 'include',
+     signal: controller.signal,
    })
+   clearTimeout(timeoutId);
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 4148616 and f5f596c.

📒 Files selected for processing (1)
  • frontend/src/api/getCsrfToken.ts (1 hunks)
🧰 Additional context used
🧬 Code Definitions (1)
frontend/src/api/getCsrfToken.ts (1)
frontend/src/utils/credentials.ts (1)
  • CSRF_URL (2-2)
⏰ Context from checks skipped due to timeout of 90000ms (4)
  • GitHub Check: Run frontend unit tests
  • GitHub Check: Run frontend e2e tests
  • GitHub Check: Run backend tests
  • GitHub Check: CodeQL (javascript-typescript)
🔇 Additional comments (3)
frontend/src/api/getCsrfToken.ts (3)

1-3: Good use of environment variables for the CSRF URL.

The imports are clean and appropriate, using environment configuration via CSRF_URL from credentials rather than hardcoding the endpoint URL. This ensures the code can work across different environments.


4-9: CSRF token fetch implementation looks good.

The function is correctly implemented as async and uses the fetch API with appropriate parameters. Including credentials: 'include' is essential for cookie-based CSRF protection to work properly.


11-13: Good response validation with specific error handling.

The response status check is implemented correctly, throwing an appropriate error with the status code when the request fails.

@github-actions github-actions bot added docs Improvements or additions to documentation makefile ci schema labels Apr 4, 2025
@arkid15r arkid15r enabled auto-merge April 4, 2025 23:36
Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (7)
backend/apps/core/api/csrf.py (2)

7-9: Implement recommended security enhancements

The basic implementation looks good, but consider enhancing it with:

  1. Add the Secure flag to CSRF cookies in production environments to prevent transmission over non-HTTPS connections
  2. Consider adding an expiration time to the CSRF token cookie
  3. Restrict this endpoint to GET requests only using Django's method decorators
+from django.views.decorators.http import require_GET
+from django.conf import settings

+@require_GET
 def get_csrf_token(request):
     """Return a response with the CSRF token."""
-    return JsonResponse({"csrftoken": get_token(request)})
+    response = JsonResponse({"csrftoken": get_token(request)})
+    # In production, ensure CSRF cookie is only sent over HTTPS
+    if settings.CSRF_COOKIE_SECURE:
+        response.cookies[settings.CSRF_COOKIE_NAME]['secure'] = True
+    return response

1-9: Consider adding error handling

While Django's get_token function is generally reliable, it would be good practice to add error handling for robustness.

 def get_csrf_token(request):
     """Return a response with the CSRF token."""
-    return JsonResponse({"csrftoken": get_token(request)})
+    try:
+        token = get_token(request)
+        return JsonResponse({"csrftoken": token})
+    except Exception as e:
+        return JsonResponse({"error": "Failed to generate CSRF token"}, status=500)
backend/Makefile (1)

1-4: Rename target to reflect its actual purpose

The clean-backend target is removing directories from the frontend/ path, which is counterintuitive. Consider renaming this target to clean-frontend or clarify its purpose in a comment to avoid developer confusion.

-clean-backend:
+clean-frontend:  # Cleans frontend cache and environment directories
 	@rm -rf frontend/.cache
 	@rm -rf frontend/.local
 	@rm -rf frontend/.venv
frontend/src/utils/utility.ts (1)

69-74: Consider making cookie parsing more robust

The current implementation for parsing cookies could be made more robust by handling edge cases such as empty cookies or malformed cookie strings.

export const getCsrfToken = async (): Promise<string> => {
-  const csrfToken = document.cookie
-    .split(';')
-    .map((cookie) => cookie.split('='))
-    .find(([key]) => key.trim() === 'csrftoken')?.[1]
-    ?.trim()
+  const csrfToken = document.cookie
+    ? document.cookie
+        .split(';')
+        .map((cookie) => cookie.trim().split('='))
+        .find(([key]) => key.trim() === 'csrftoken')?.[1]
+        ?.trim()
+    : undefined
frontend/src/api/fetchCsrfToken.ts (3)

4-14: Error handling could be more specific.

The error handling for the fetch operation is good, but could be improved by differentiating between network failures and server errors for better clarity in error reporting.

  if (!response.ok) {
-   const message = `Failed to fetch CSRF token: ${response.status} ${response.statusText}`
+   let message = `Failed to fetch CSRF token: ${response.status} ${response.statusText}`
+   if (response.status >= 500) {
+     message = `Server error while fetching CSRF token: ${response.status} ${response.statusText}`
+   } else if (response.status >= 400) {
+     message = `Client error while fetching CSRF token: ${response.status} ${response.statusText}`
+   } else if (response.status === 0) {
+     message = 'Network error: Could not connect to the server to fetch CSRF token'
+   }
    throw new AppError(response.status, message)
  }

1-31: Consider adding token caching mechanism.

The current implementation fetches a new CSRF token each time the function is called, which might lead to unnecessary API calls. Consider adding a simple caching mechanism to reuse tokens when appropriate.

+ let cachedToken: string | null = null;
+ let tokenExpiryTime: number | null = null;
+ const TOKEN_CACHE_DURATION = 5 * 60 * 1000; // 5 minutes in milliseconds

export const fetchCsrfToken = async (): Promise<string> => {
+  // Return cached token if it's still valid
+  if (cachedToken && tokenExpiryTime && Date.now() < tokenExpiryTime) {
+    return cachedToken;
+  }

  try {
    const response = await fetch(CSRF_URL, {
      credentials: 'include',
      method: 'GET',
    })

    if (!response.ok) {
      const message = `Failed to fetch CSRF token: ${response.status} ${response.statusText}`
      throw new AppError(response.status, message)
    }

    const data = await response.json()

    if (!data?.csrftoken) {
      throw new AppError(500, 'CSRF token missing in response')
    }

+    // Cache the token and set expiry time
+    cachedToken = data.csrftoken;
+    tokenExpiryTime = Date.now() + TOKEN_CACHE_DURATION;
+
    return data.csrftoken
  } catch (error) {
    if (error instanceof AppError) {
      throw error
    }

    const message = error?.message || 'Unexpected error while fetching CSRF token'
    throw new AppError(500, message)
  }
}

+ // Add a function to clear the token cache when needed (e.g., after logout)
+ export const clearCsrfTokenCache = (): void => {
+   cachedToken = null;
+   tokenExpiryTime = null;
+ }

6-8: Consider adding security headers for the CSRF request.

For enhanced security, consider adding appropriate headers to the CSRF token request.

  const response = await fetch(CSRF_URL, {
    credentials: 'include',
    method: 'GET',
+   headers: {
+     'X-Requested-With': 'XMLHttpRequest',
+     'Accept': 'application/json',
+   },
  })
📜 Review details

Configuration used: .coderabbit.yaml
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 89c6674 and b2d3fd1.

📒 Files selected for processing (14)
  • .github/workflows/run-ci-cd.yaml (3 hunks)
  • .github/workflows/test-schema.yaml (1 hunks)
  • CONTRIBUTING.md (3 hunks)
  • Makefile (2 hunks)
  • backend/Makefile (1 hunks)
  • backend/apps/core/api/csrf.py (1 hunks)
  • backend/settings/urls.py (2 hunks)
  • frontend/Makefile (2 hunks)
  • frontend/__tests__/unit/utils/utility.test.ts (2 hunks)
  • frontend/src/api/fetchCsrfToken.ts (1 hunks)
  • frontend/src/utils/utility.ts (2 hunks)
  • proxy/production.conf (1 hunks)
  • proxy/staging.conf (1 hunks)
  • schema/Makefile (1 hunks)
🚧 Files skipped from review as they are similar to previous changes (2)
  • backend/settings/urls.py
  • frontend/tests/unit/utils/utility.test.ts
🧰 Additional context used
🧬 Code Definitions (1)
frontend/src/utils/utility.ts (1)
frontend/src/api/fetchCsrfToken.ts (1)
  • fetchCsrfToken (4-31)
⏰ Context from checks skipped due to timeout of 90000ms (1)
  • GitHub Check: Run frontend e2e tests
🔇 Additional comments (20)
schema/Makefile (1)

1-2: LGTM: Good addition to the build system

Adding a clean-schema target is a helpful maintenance utility that makes it easier to reset the virtual environment for testing and development.

.github/workflows/test-schema.yaml (1)

52-52: LGTM: Consistent command reference

Good update to maintain consistency with other files in the project that now use make check instead of make check-all.

frontend/Makefile (2)

6-8: LGTM: Clean target is well implemented

The new clean-frontend target provides a useful utility for removing package manager-related directories, which is essential for clean builds and troubleshooting dependency issues.


25-27: LGTM: Logical reordering of test targets

Reordering to run unit tests before e2e tests is a good practice as unit tests are typically faster and can catch issues before running the more time-consuming e2e tests.

proxy/staging.conf (1)

28-28: LGTM: Appropriate routing for the new CSRF endpoint

Adding the csrf path to the proxy routing pattern correctly ensures that CSRF token requests are properly forwarded to the backend service.

proxy/production.conf (1)

28-28: LGTM: Consistent routing configuration for production

The production configuration is correctly updated to match the staging configuration, ensuring that CSRF token requests are properly handled in the production environment.

frontend/src/utils/utility.ts (2)

1-1: LGTM: Appropriate import of the fetchCsrfToken function

The import statement correctly references the new fetchCsrfToken function that will be used for CSRF token retrieval.


69-81: Add error handling for token retrieval

While converting the function to async is a good improvement for handling token retrieval, there's no error handling around the fetchCsrfToken() call. If the token fetching fails, the error will propagate to the caller without any context or handling.

export const getCsrfToken = async (): Promise<string> => {
  const csrfToken = document.cookie
    .split(';')
    .map((cookie) => cookie.split('='))
    .find(([key]) => key.trim() === 'csrftoken')?.[1]
    ?.trim()

  if (csrfToken) {
    return csrfToken
  }

-  return await fetchCsrfToken()
+  try {
+    return await fetchCsrfToken()
+  } catch (error) {
+    console.error('Failed to retrieve CSRF token:', error)
+    throw error
+  }
}
CONTRIBUTING.md (3)

237-237: Command update looks good.

The change from make check-all to make check aligns with the updated target names in the Makefile, providing a more concise command for contributors.


248-248: Command update looks good.

The change from make test-all to make test aligns with the updated target names in the Makefile, providing a more concise command for contributors.


289-289: Command update looks good.

The change from make check-test-all to make check-test aligns with the updated target names in the Makefile, providing a more concise command for contributors.

Makefile (4)

10-13: Clean target implementation looks good.

The new clean target that depends on other clean operations provides a convenient way to clean all project components at once.


15-18: Check target implementation looks good.

The new check target replaces the previous check-all target with a more concise name while maintaining the same functionality of checking both backend and frontend code.


23-25: Check-test target update looks good.

The updated check-test target now depends on the new check target and the test target, maintaining the same functionality with a simpler naming convention.


41-43: Test target update looks good.

The renamed test target (previously test-all) maintains the same dependencies while using a more concise name.

.github/workflows/run-ci-cd.yaml (2)

81-81: CI/CD message update looks good.

The error message correctly instructs users to run make check instead of make check-all, aligning with the updated Makefile target names.


244-244: CSRF URL environment variable addition looks good.

Adding the VITE_CSRF_URL environment variable to both staging and production frontend environments is necessary to support the new CSRF token fetching functionality.

Also applies to: 408-408

frontend/src/api/fetchCsrfToken.ts (3)

1-3: Imports look good.

The imports for CSRF_URL and AppError are appropriate for the functionality being implemented.


15-22: Token extraction looks good.

The function correctly extracts the CSRF token from the response and validates its presence before returning it.


23-31: Comprehensive error handling.

The catch block properly handles different error types, preserving AppError instances and providing a helpful default message for unexpected errors.

Copy link

sonarqubecloud bot commented Apr 4, 2025

Quality Gate Failed Quality Gate failed

Failed conditions
46.9% Duplication on New Code (required ≤ 3%)

See analysis details on SonarQube Cloud

Copy link
Collaborator

@arkid15r arkid15r left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM 👍

@arkid15r arkid15r added this pull request to the merge queue Apr 5, 2025
@arkid15r arkid15r removed this pull request from the merge queue due to a manual request Apr 5, 2025
@arkid15r arkid15r merged commit 4a9fa22 into OWASP:main Apr 5, 2025
25 of 26 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.

2 participants