From 8122c3c1477bf1e0b47a3146e1575c8fa5208d3b Mon Sep 17 00:00:00 2001 From: Rich Harris Date: Thu, 1 Sep 2022 10:39:01 -0400 Subject: [PATCH 01/10] CSRF protection by default --- documentation/docs/14-configuration.md | 11 +++++++++++ packages/kit/src/core/config/index.spec.js | 3 +++ packages/kit/src/core/config/options.js | 4 ++++ packages/kit/src/exports/vite/build/build_server.js | 3 +++ packages/kit/src/exports/vite/dev/index.js | 3 +++ packages/kit/src/runtime/server/index.js | 10 ++++++++++ .../kit/test/apps/basics/src/routes/csrf/+server.js | 4 ++++ packages/kit/test/apps/basics/test/server.test.js | 12 ++++++++++++ packages/kit/types/index.d.ts | 3 +++ packages/kit/types/internal.d.ts | 3 +++ 10 files changed, 56 insertions(+) create mode 100644 packages/kit/test/apps/basics/src/routes/csrf/+server.js diff --git a/documentation/docs/14-configuration.md b/documentation/docs/14-configuration.md index 1893883bbbd0..55f0f7c97f92 100644 --- a/documentation/docs/14-configuration.md +++ b/documentation/docs/14-configuration.md @@ -25,6 +25,9 @@ const config = { // ... } }, + csrf: { + checkOrigin: true + }, env: { dir: process.cwd(), publicPrefix: 'PUBLIC_' @@ -161,6 +164,14 @@ When pages are prerendered, the CSP header is added via a `` ta > Note that most [Svelte transitions](https://svelte.dev/tutorial/transition) work by creating an inline `