feat: Implement CSRF protection and PostgreSQL support

- Added CSRF protection mechanism in the backend with utility functions for token management.
- Introduced a new CSRF route to fetch the active CSRF token for SPA bootstrap flows.
- Updated the auth routes to validate CSRF tokens on sensitive operations.
- Configured PostgreSQL as a database option in the environment settings and Docker Compose.
- Created a new SQLite configuration file for local development.
- Enhanced the API client to automatically attach CSRF tokens to requests.
- Updated various frontend components to utilize the new site origin utility for SEO purposes.
- Modified Nginx configuration to improve redirection and SEO headers.
- Added tests for CSRF token handling in the authentication routes.
This commit is contained in:
Your Name
2026-03-17 23:26:32 +02:00
parent 3f24a7ea3e
commit a2824b2132
24 changed files with 332 additions and 319 deletions

View File

@@ -2,6 +2,13 @@
class TestAuthRoutes:
def test_csrf_bootstrap_returns_token(self, client):
response = client.get('/api/auth/csrf')
assert response.status_code == 200
assert isinstance(response.get_json()['csrf_token'], str)
assert response.get_json()['csrf_token']
def test_register_success(self, client):
response = client.post(
'/api/auth/register',
@@ -77,3 +84,13 @@ class TestAuthRoutes:
assert response.status_code == 200
assert response.get_json() == {'authenticated': False, 'user': None}
def test_register_rejects_invalid_csrf_token(self, client):
response = client.post(
'/api/auth/register',
json={'email': 'csrf@example.com', 'password': 'secretpass123'},
headers={'X-CSRF-Token': 'invalid-token'},
)
assert response.status_code == 403
assert 'csrf' in response.get_json()['error'].lower()