123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733 |
- package lib
- import (
- "encoding/json"
- "fmt"
- "net/http"
- "net/http/httptest"
- "net/url"
- "os"
- "strings"
- "sync"
- "testing"
- "time"
- "github.com/TecharoHQ/anubis"
- "github.com/TecharoHQ/anubis/data"
- "github.com/TecharoHQ/anubis/internal"
- "github.com/TecharoHQ/anubis/internal/thoth/thothmock"
- "github.com/TecharoHQ/anubis/lib/policy"
- "github.com/TecharoHQ/anubis/lib/policy/config"
- )
- func init() {
- internal.InitSlog("debug")
- }
- func loadPolicies(t *testing.T, fname string, difficulty int) *policy.ParsedConfig {
- t.Helper()
- ctx := thothmock.WithMockThoth(t)
- if fname == "" {
- fname = "./testdata/test_config.yaml"
- }
- anubisPolicy, err := LoadPoliciesOrDefault(ctx, fname, difficulty)
- if err != nil {
- t.Fatal(err)
- }
- return anubisPolicy
- }
- func spawnAnubis(t *testing.T, opts Options) *Server {
- t.Helper()
- s, err := New(opts)
- if err != nil {
- t.Fatalf("can't construct libanubis.Server: %v", err)
- }
- return s
- }
- type challengeResp struct {
- Challenge string `json:"challenge"`
- }
- func makeChallenge(t *testing.T, ts *httptest.Server, cli *http.Client) challengeResp {
- t.Helper()
- req, err := http.NewRequest(http.MethodPost, ts.URL+"/.within.website/x/cmd/anubis/api/make-challenge", nil)
- if err != nil {
- t.Fatalf("can't make request: %v", err)
- }
- q := req.URL.Query()
- q.Set("redir", "/")
- req.URL.RawQuery = q.Encode()
- resp, err := cli.Do(req)
- if err != nil {
- t.Fatalf("can't request challenge: %v", err)
- }
- defer resp.Body.Close()
- var chall challengeResp
- if err := json.NewDecoder(resp.Body).Decode(&chall); err != nil {
- t.Fatalf("can't read challenge response body: %v", err)
- }
- return chall
- }
- func handleChallengeZeroDifficulty(t *testing.T, ts *httptest.Server, cli *http.Client, chall challengeResp) *http.Response {
- t.Helper()
- nonce := 0
- elapsedTime := 420
- redir := "/"
- calculated := ""
- calcString := fmt.Sprintf("%s%d", chall.Challenge, nonce)
- calculated = internal.SHA256sum(calcString)
- req, err := http.NewRequest(http.MethodGet, ts.URL+"/.within.website/x/cmd/anubis/api/pass-challenge", nil)
- if err != nil {
- t.Fatalf("can't make request: %v", err)
- }
- q := req.URL.Query()
- q.Set("response", calculated)
- q.Set("nonce", fmt.Sprint(nonce))
- q.Set("redir", redir)
- q.Set("elapsedTime", fmt.Sprint(elapsedTime))
- req.URL.RawQuery = q.Encode()
- resp, err := cli.Do(req)
- if err != nil {
- t.Fatalf("can't do request: %v", err)
- }
- return resp
- }
- type loggingCookieJar struct {
- t *testing.T
- lock sync.Mutex
- cookies map[string][]*http.Cookie
- }
- func (lcj *loggingCookieJar) Cookies(u *url.URL) []*http.Cookie {
- lcj.lock.Lock()
- defer lcj.lock.Unlock()
- // XXX(Xe): This is not RFC compliant in the slightest.
- result, ok := lcj.cookies[u.Host]
- if !ok {
- return nil
- }
- lcj.t.Logf("requested cookies for %s", u)
- for _, ckie := range result {
- lcj.t.Logf("get cookie: <- %s", ckie)
- }
- return result
- }
- func (lcj *loggingCookieJar) SetCookies(u *url.URL, cookies []*http.Cookie) {
- lcj.lock.Lock()
- defer lcj.lock.Unlock()
- for _, ckie := range cookies {
- lcj.t.Logf("set cookie: %s -> %s", u, ckie)
- }
- // XXX(Xe): This is not RFC compliant in the slightest.
- lcj.cookies[u.Host] = append(lcj.cookies[u.Host], cookies...)
- }
- func httpClient(t *testing.T) *http.Client {
- t.Helper()
- cli := &http.Client{
- Jar: &loggingCookieJar{t: t, cookies: map[string][]*http.Cookie{}},
- CheckRedirect: func(req *http.Request, via []*http.Request) error {
- return http.ErrUseLastResponse
- },
- }
- return cli
- }
- func TestLoadPolicies(t *testing.T) {
- for _, fname := range []string{"botPolicies.json", "botPolicies.yaml"} {
- t.Run(fname, func(t *testing.T) {
- fin, err := data.BotPolicies.Open(fname)
- if err != nil {
- t.Fatal(err)
- }
- defer fin.Close()
- if _, err := policy.ParseConfig(t.Context(), fin, fname, 4); err != nil {
- t.Fatal(err)
- }
- })
- }
- }
- // Regression test for CVE-2025-24369
- func TestCVE2025_24369(t *testing.T) {
- pol := loadPolicies(t, "", anubis.DefaultDifficulty)
- srv := spawnAnubis(t, Options{
- Next: http.NewServeMux(),
- Policy: pol,
- CookieName: t.Name(),
- })
- ts := httptest.NewServer(internal.RemoteXRealIP(true, "tcp", srv))
- defer ts.Close()
- cli := httpClient(t)
- chall := makeChallenge(t, ts, cli)
- resp := handleChallengeZeroDifficulty(t, ts, cli, chall)
- if resp.StatusCode == http.StatusFound {
- t.Log("Regression on CVE-2025-24369")
- t.Errorf("wanted HTTP status %d, got: %d", http.StatusForbidden, resp.StatusCode)
- }
- }
- func TestCookieCustomExpiration(t *testing.T) {
- pol := loadPolicies(t, "", 0)
- ckieExpiration := 10 * time.Minute
- srv := spawnAnubis(t, Options{
- Next: http.NewServeMux(),
- Policy: pol,
- CookieExpiration: ckieExpiration,
- })
- ts := httptest.NewServer(internal.RemoteXRealIP(true, "tcp", srv))
- defer ts.Close()
- cli := httpClient(t)
- chall := makeChallenge(t, ts, cli)
- requestReceiveLowerBound := time.Now().Add(-1 * time.Minute)
- resp := handleChallengeZeroDifficulty(t, ts, cli, chall)
- requestReceiveUpperBound := time.Now()
- if resp.StatusCode != http.StatusFound {
- resp.Write(os.Stderr)
- t.Errorf("wanted %d, got: %d", http.StatusFound, resp.StatusCode)
- }
- var ckie *http.Cookie
- for _, cookie := range resp.Cookies() {
- t.Logf("%#v", cookie)
- if cookie.Name == srv.cookieName {
- ckie = cookie
- break
- }
- }
- if ckie == nil {
- t.Errorf("Cookie %q not found", srv.cookieName)
- return
- }
- expirationLowerBound := requestReceiveLowerBound.Add(ckieExpiration)
- expirationUpperBound := requestReceiveUpperBound.Add(ckieExpiration)
- // Since the cookie expiration precision is only to the second due to the Unix() call, we can
- // lower the level of expected precision.
- if ckie.Expires.Unix() < expirationLowerBound.Unix() || ckie.Expires.Unix() > expirationUpperBound.Unix() {
- t.Errorf("cookie expiration is not within the expected range. expected between: %v and %v. got: %v", expirationLowerBound, expirationUpperBound, ckie.Expires)
- return
- }
- }
- func TestCookieSettings(t *testing.T) {
- pol := loadPolicies(t, "", 0)
- srv := spawnAnubis(t, Options{
- Next: http.NewServeMux(),
- Policy: pol,
- CookieDomain: "127.0.0.1",
- CookiePartitioned: true,
- CookieName: t.Name(),
- CookieExpiration: anubis.CookieDefaultExpirationTime,
- })
- requestReceiveLowerBound := time.Now()
- ts := httptest.NewServer(internal.RemoteXRealIP(true, "tcp", srv))
- defer ts.Close()
- cli := httpClient(t)
- chall := makeChallenge(t, ts, cli)
- resp := handleChallengeZeroDifficulty(t, ts, cli, chall)
- requestReceiveUpperBound := time.Now()
- if resp.StatusCode != http.StatusFound {
- resp.Write(os.Stderr)
- t.Errorf("wanted %d, got: %d", http.StatusFound, resp.StatusCode)
- }
- var ckie *http.Cookie
- for _, cookie := range resp.Cookies() {
- t.Logf("%#v", cookie)
- if cookie.Name == srv.cookieName {
- ckie = cookie
- break
- }
- }
- if ckie == nil {
- t.Errorf("Cookie %q not found", srv.cookieName)
- return
- }
- if ckie.Domain != "127.0.0.1" {
- t.Errorf("cookie domain is wrong, wanted 127.0.0.1, got: %s", ckie.Domain)
- }
- expirationLowerBound := requestReceiveLowerBound.Add(anubis.CookieDefaultExpirationTime)
- expirationUpperBound := requestReceiveUpperBound.Add(anubis.CookieDefaultExpirationTime)
- // Since the cookie expiration precision is only to the second due to the Unix() call, we can
- // lower the level of expected precision.
- if ckie.Expires.Unix() < expirationLowerBound.Unix() || ckie.Expires.Unix() > expirationUpperBound.Unix() {
- t.Errorf("cookie expiration is not within the expected range. expected between: %v and %v. got: %v", expirationLowerBound, expirationUpperBound, ckie.Expires)
- return
- }
- if ckie.Partitioned != srv.opts.CookiePartitioned {
- t.Errorf("wanted partitioned flag %v, got: %v", srv.opts.CookiePartitioned, ckie.Partitioned)
- }
- }
- func TestCheckDefaultDifficultyMatchesPolicy(t *testing.T) {
- h := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
- fmt.Fprintln(w, "OK")
- })
- for i := 1; i < 10; i++ {
- t.Run(fmt.Sprint(i), func(t *testing.T) {
- anubisPolicy := loadPolicies(t, "", i)
- s, err := New(Options{
- Next: h,
- Policy: anubisPolicy,
- ServeRobotsTXT: true,
- })
- if err != nil {
- t.Fatalf("can't construct libanubis.Server: %v", err)
- }
- req, err := http.NewRequest(http.MethodGet, "/", nil)
- if err != nil {
- t.Fatal(err)
- }
- req.Header.Add("X-Real-Ip", "127.0.0.1")
- cr, bot, err := s.check(req)
- if err != nil {
- t.Fatal(err)
- }
- t.Log(cr.Name)
- if bot.Challenge.Difficulty != i {
- t.Errorf("Challenge.Difficulty is wrong, wanted %d, got: %d", i, bot.Challenge.Difficulty)
- }
- if bot.Challenge.ReportAs != i {
- t.Errorf("Challenge.ReportAs is wrong, wanted %d, got: %d", i, bot.Challenge.ReportAs)
- }
- })
- }
- }
- func TestBasePrefix(t *testing.T) {
- h := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
- fmt.Fprintln(w, "OK")
- })
- testCases := []struct {
- name string
- basePrefix string
- path string
- expected string
- }{
- {
- name: "no prefix",
- basePrefix: "/",
- path: "/.within.website/x/cmd/anubis/api/make-challenge",
- expected: "/.within.website/x/cmd/anubis/api/make-challenge",
- },
- {
- name: "with prefix",
- basePrefix: "/myapp",
- path: "/myapp/.within.website/x/cmd/anubis/api/make-challenge",
- expected: "/myapp/.within.website/x/cmd/anubis/api/make-challenge",
- },
- {
- name: "with prefix and trailing slash",
- basePrefix: "/myapp/",
- path: "/myapp/.within.website/x/cmd/anubis/api/make-challenge",
- expected: "/myapp/.within.website/x/cmd/anubis/api/make-challenge",
- },
- }
- for _, tc := range testCases {
- t.Run(tc.name, func(t *testing.T) {
- // Reset the global BasePrefix before each test
- anubis.BasePrefix = ""
- pol := loadPolicies(t, "", 4)
- srv := spawnAnubis(t, Options{
- Next: h,
- Policy: pol,
- BasePrefix: tc.basePrefix,
- })
- ts := httptest.NewServer(internal.RemoteXRealIP(true, "tcp", srv))
- defer ts.Close()
- cli := httpClient(t)
- req, err := http.NewRequest(http.MethodPost, ts.URL+tc.path, nil)
- if err != nil {
- t.Fatal(err)
- }
- q := req.URL.Query()
- q.Set("redir", tc.basePrefix)
- req.URL.RawQuery = q.Encode()
- // Test API endpoint with prefix
- resp, err := cli.Do(req)
- if err != nil {
- t.Fatalf("can't request challenge: %v", err)
- }
- defer resp.Body.Close()
- if resp.StatusCode != http.StatusOK {
- t.Errorf("expected status code %d, got: %d", http.StatusOK, resp.StatusCode)
- }
- var chall challengeResp
- if err := json.NewDecoder(resp.Body).Decode(&chall); err != nil {
- t.Fatalf("can't read challenge response body: %v", err)
- }
- if chall.Challenge == "" {
- t.Errorf("expected non-empty challenge")
- }
- // Test cookie path when passing challenge
- // Find a nonce that produces a hash with the required number of leading zeros
- nonce := 0
- var calculated string
- for {
- calcString := fmt.Sprintf("%s%d", chall.Challenge, nonce)
- calculated = internal.SHA256sum(calcString)
- if strings.HasPrefix(calculated, strings.Repeat("0", pol.DefaultDifficulty)) {
- break
- }
- nonce++
- }
- elapsedTime := 420
- redir := "/"
- cli.CheckRedirect = func(req *http.Request, via []*http.Request) error {
- return http.ErrUseLastResponse
- }
- // Construct the correct path for pass-challenge
- passChallengePath := tc.path
- passChallengePath = passChallengePath[:strings.LastIndex(passChallengePath, "/")+1] + "pass-challenge"
- req, err = http.NewRequest(http.MethodGet, ts.URL+passChallengePath, nil)
- if err != nil {
- t.Fatalf("can't make request: %v", err)
- }
- for _, ckie := range resp.Cookies() {
- req.AddCookie(ckie)
- }
- q = req.URL.Query()
- q.Set("response", calculated)
- q.Set("nonce", fmt.Sprint(nonce))
- q.Set("redir", redir)
- q.Set("elapsedTime", fmt.Sprint(elapsedTime))
- req.URL.RawQuery = q.Encode()
- resp, err = cli.Do(req)
- if err != nil {
- t.Fatalf("can't do challenge passing: %v", err)
- }
- if resp.StatusCode != http.StatusFound {
- t.Errorf("wanted %d, got: %d", http.StatusFound, resp.StatusCode)
- }
- // Check cookie path
- var ckie *http.Cookie
- for _, cookie := range resp.Cookies() {
- if cookie.Name == anubis.CookieName {
- ckie = cookie
- break
- }
- }
- if ckie == nil {
- t.Errorf("Cookie %q not found", anubis.CookieName)
- return
- }
- expectedPath := "/"
- if tc.basePrefix != "" {
- expectedPath = strings.TrimSuffix(tc.basePrefix, "/") + "/"
- }
- if ckie.Path != expectedPath {
- t.Errorf("cookie path is wrong, wanted %s, got: %s", expectedPath, ckie.Path)
- }
- })
- }
- }
- func TestCustomStatusCodes(t *testing.T) {
- h := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
- t.Log(r.UserAgent())
- w.WriteHeader(http.StatusOK)
- fmt.Fprintln(w, "OK")
- })
- statusMap := map[string]int{
- "ALLOW": 200,
- "CHALLENGE": 401,
- "DENY": 403,
- }
- pol := loadPolicies(t, "./testdata/aggressive_403.yaml", 4)
- srv := spawnAnubis(t, Options{
- Next: h,
- Policy: pol,
- })
- ts := httptest.NewServer(internal.RemoteXRealIP(true, "tcp", srv))
- defer ts.Close()
- for userAgent, statusCode := range statusMap {
- t.Run(userAgent, func(t *testing.T) {
- req, err := http.NewRequestWithContext(t.Context(), http.MethodGet, ts.URL, nil)
- if err != nil {
- t.Fatal(err)
- }
- req.Header.Set("User-Agent", userAgent)
- resp, err := ts.Client().Do(req)
- if err != nil {
- t.Fatal(err)
- }
- if resp.StatusCode != statusCode {
- t.Errorf("wanted status code %d but got: %d", statusCode, resp.StatusCode)
- }
- })
- }
- }
- func TestCloudflareWorkersRule(t *testing.T) {
- for _, variant := range []string{"cel", "header"} {
- t.Run(variant, func(t *testing.T) {
- pol := loadPolicies(t, "./testdata/cloudflare-workers-"+variant+".yaml", 0)
- h := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
- fmt.Fprintln(w, "OK")
- })
- s, err := New(Options{
- Next: h,
- Policy: pol,
- ServeRobotsTXT: true,
- })
- if err != nil {
- t.Fatalf("can't construct libanubis.Server: %v", err)
- }
- t.Run("with-cf-worker-header", func(t *testing.T) {
- req, err := http.NewRequest(http.MethodGet, "/", nil)
- if err != nil {
- t.Fatal(err)
- }
- req.Header.Add("X-Real-Ip", "127.0.0.1")
- req.Header.Add("Cf-Worker", "true")
- cr, _, err := s.check(req)
- if err != nil {
- t.Fatal(err)
- }
- if cr.Rule != config.RuleDeny {
- t.Errorf("rule is wrong, wanted %s, got: %s", config.RuleDeny, cr.Rule)
- }
- })
- t.Run("no-cf-worker-header", func(t *testing.T) {
- req, err := http.NewRequest(http.MethodGet, "/", nil)
- if err != nil {
- t.Fatal(err)
- }
- req.Header.Add("X-Real-Ip", "127.0.0.1")
- cr, _, err := s.check(req)
- if err != nil {
- t.Fatal(err)
- }
- if cr.Rule != config.RuleAllow {
- t.Errorf("rule is wrong, wanted %s, got: %s", config.RuleAllow, cr.Rule)
- }
- })
- })
- }
- }
- func TestRuleChange(t *testing.T) {
- pol := loadPolicies(t, "testdata/rule_change.yaml", 0)
- ckieExpiration := 10 * time.Minute
- srv := spawnAnubis(t, Options{
- Next: http.NewServeMux(),
- Policy: pol,
- CookieDomain: "127.0.0.1",
- CookieName: t.Name(),
- CookieExpiration: ckieExpiration,
- })
- ts := httptest.NewServer(internal.RemoteXRealIP(true, "tcp", srv))
- defer ts.Close()
- cli := httpClient(t)
- chall := makeChallenge(t, ts, cli)
- resp := handleChallengeZeroDifficulty(t, ts, cli, chall)
- if resp.StatusCode != http.StatusFound {
- resp.Write(os.Stderr)
- t.Errorf("wanted %d, got: %d", http.StatusFound, resp.StatusCode)
- }
- }
- func TestStripBasePrefixFromRequest(t *testing.T) {
- testCases := []struct {
- name string
- basePrefix string
- stripBasePrefix bool
- requestPath string
- expectedPath string
- }{
- {
- name: "strip disabled - no change",
- basePrefix: "/foo",
- stripBasePrefix: false,
- requestPath: "/foo/bar",
- expectedPath: "/foo/bar",
- },
- {
- name: "strip enabled - removes prefix",
- basePrefix: "/foo",
- stripBasePrefix: true,
- requestPath: "/foo/bar",
- expectedPath: "/bar",
- },
- {
- name: "strip enabled - root becomes slash",
- basePrefix: "/foo",
- stripBasePrefix: true,
- requestPath: "/foo",
- expectedPath: "/",
- },
- {
- name: "strip enabled - trailing slash on base prefix",
- basePrefix: "/foo/",
- stripBasePrefix: true,
- requestPath: "/foo/bar",
- expectedPath: "/bar",
- },
- {
- name: "strip enabled - no prefix match",
- basePrefix: "/foo",
- stripBasePrefix: true,
- requestPath: "/other/bar",
- expectedPath: "/other/bar",
- },
- {
- name: "strip enabled - empty base prefix",
- basePrefix: "",
- stripBasePrefix: true,
- requestPath: "/foo/bar",
- expectedPath: "/foo/bar",
- },
- {
- name: "strip enabled - nested path",
- basePrefix: "/app",
- stripBasePrefix: true,
- requestPath: "/app/api/v1/users",
- expectedPath: "/api/v1/users",
- },
- {
- name: "strip enabled - exact match becomes root",
- basePrefix: "/myapp",
- stripBasePrefix: true,
- requestPath: "/myapp/",
- expectedPath: "/",
- },
- }
- for _, tc := range testCases {
- t.Run(tc.name, func(t *testing.T) {
- srv := &Server{
- opts: Options{
- BasePrefix: tc.basePrefix,
- StripBasePrefix: tc.stripBasePrefix,
- },
- }
- req := httptest.NewRequest(http.MethodGet, tc.requestPath, nil)
- originalPath := req.URL.Path
- result := srv.stripBasePrefixFromRequest(req)
- if result.URL.Path != tc.expectedPath {
- t.Errorf("expected path %q, got %q", tc.expectedPath, result.URL.Path)
- }
- // Ensure original request is not modified when no stripping should occur
- if !tc.stripBasePrefix || tc.basePrefix == "" || !strings.HasPrefix(tc.requestPath, strings.TrimSuffix(tc.basePrefix, "/")) {
- if result != req {
- t.Error("expected same request object when no modification needed")
- }
- } else {
- // Ensure original request is not modified when stripping occurs
- if req.URL.Path != originalPath {
- t.Error("original request was modified")
- }
- }
- })
- }
- }
|