Skip to content

Commit d531ee7

Browse files
authored
Merge pull request #1136 from microsoft/feature/disallow-allowed-hosts-urls-that-includes-protocol
throw an error if allowed hosts url starts with http/https protocol
2 parents f158cae + af5f046 commit d531ee7

File tree

3 files changed

+54
-1
lines changed

3 files changed

+54
-1
lines changed

packages/abstractions/src/authentication/allowedHostsValidator.ts

+13
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ export class AllowedHostsValidator {
66
* @param allowedHosts A list of valid hosts. If the list is empty, all hosts are valid.
77
*/
88
public constructor(allowedHosts: Set<string> = new Set<string>()) {
9+
this.validateHosts(allowedHosts);
910
this.allowedHosts = allowedHosts ?? new Set<string>();
1011
}
1112
/**
@@ -20,6 +21,7 @@ export class AllowedHostsValidator {
2021
* @param allowedHosts A list of valid hosts. If the list is empty, all hosts are valid.
2122
*/
2223
public setAllowedHosts(allowedHosts: Set<string>): void {
24+
this.validateHosts(allowedHosts);
2325
this.allowedHosts = allowedHosts;
2426
}
2527
/**
@@ -59,4 +61,15 @@ export class AllowedHostsValidator {
5961
}
6062
return false;
6163
}
64+
65+
private validateHosts(hostsToValidate: Set<string>) {
66+
if(!hostsToValidate) {
67+
throw new Error("hostsToValidate cannot be null");
68+
}
69+
hostsToValidate.forEach(host => {
70+
if(host.toLowerCase().startsWith("http://") || host.toLowerCase().startsWith("https://")) {
71+
throw new Error("host should not contain http or https prefix");
72+
}
73+
});
74+
}
6275
}

packages/abstractions/src/authentication/validateProtocol.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ function windowUrlStartsWithHttps(): boolean {
1010
return typeof window !== "undefined" && typeof window.location !== "undefined" && (window.location.protocol as string).toLowerCase() !== "https:";
1111
}
1212

13-
export function isLocalhostUrl(urlString: string) {
13+
export function isLocalhostUrl(urlString: string): boolean {
1414
try {
1515
const url = new URL(urlString);
1616
return localhostStrings.has(url.hostname);
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
import { expect } from "chai";
2+
import { AllowedHostsValidator } from "../../../src/authentication";
3+
4+
describe('AllowedHostsValidator', () => {
5+
let validator: AllowedHostsValidator;
6+
7+
beforeEach(() => {
8+
validator = new AllowedHostsValidator(new Set(['example.com', 'test.com']));
9+
});
10+
11+
it('constructor should validate hosts', () => {
12+
expect(() => new AllowedHostsValidator(new Set(['http://invalid.com']))).to.throw('host should not contain http or https prefix');
13+
});
14+
15+
it('getAllowedHosts should return correct hosts', () => {
16+
expect(JSON.stringify(validator.getAllowedHosts())).to.equal(JSON.stringify(['example.com', 'test.com']));
17+
});
18+
19+
it('setAllowedHosts should update allowed hosts', () => {
20+
validator.setAllowedHosts(new Set(['newhost.com']));
21+
expect(JSON.stringify(validator.getAllowedHosts())).to.equal(JSON.stringify(['newhost.com']));
22+
});
23+
24+
it('setAllowedHosts should validate new hosts', () => {
25+
expect(() => validator.setAllowedHosts(new Set(['https://invalid.com']))).to.throw('host should not contain http or https prefix');
26+
});
27+
28+
it('isUrlHostValid should return true for valid hosts', () => {
29+
expect(validator.isUrlHostValid('http://example.com/path')).to.be.true;
30+
expect(validator.isUrlHostValid('http://test.com/path')).to.be.true;
31+
});
32+
33+
it('isUrlHostValid should return false for invalid hosts', () => {
34+
expect(validator.isUrlHostValid('http://invalid.com/path')).to.be.false;
35+
});
36+
37+
it('isUrlHostValid should return false for invalid URLs', () => {
38+
expect(validator.isUrlHostValid('invalid')).to.be.false;
39+
});
40+
});

0 commit comments

Comments
 (0)