2025-12-13 02:34:34 +00:00
|
|
|
package middleware
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"net/http"
|
|
|
|
|
"net/http/httptest"
|
2025-12-24 11:24:54 +00:00
|
|
|
"os"
|
2025-12-13 02:34:34 +00:00
|
|
|
"testing"
|
|
|
|
|
|
|
|
|
|
"github.com/gin-gonic/gin"
|
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
// TestSecurityHeaders vérifie que les headers de sécurité sont ajoutés
|
2025-12-24 11:24:54 +00:00
|
|
|
// BE-SEC-011: Test pour valider que les headers sécurité sont présents
|
2025-12-13 02:34:34 +00:00
|
|
|
func TestSecurityHeaders(t *testing.T) {
|
|
|
|
|
gin.SetMode(gin.TestMode)
|
|
|
|
|
router := gin.New()
|
|
|
|
|
router.Use(SecurityHeaders())
|
|
|
|
|
router.GET("/test", func(c *gin.Context) {
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"message": "test"})
|
|
|
|
|
})
|
|
|
|
|
|
|
|
|
|
req, _ := http.NewRequest("GET", "/test", nil)
|
|
|
|
|
w := httptest.NewRecorder()
|
|
|
|
|
router.ServeHTTP(w, req)
|
|
|
|
|
|
2025-12-24 11:24:54 +00:00
|
|
|
// BE-SEC-011: Vérifier que tous les headers de sécurité sont présents
|
|
|
|
|
// HSTS est seulement en production, donc on vérifie conditionnellement
|
|
|
|
|
if os.Getenv("APP_ENV") == "production" || os.Getenv("APP_ENV") == "prod" {
|
|
|
|
|
assert.Equal(t, "max-age=31536000; includeSubDomains; preload", w.Header().Get("Strict-Transport-Security"))
|
|
|
|
|
} else {
|
|
|
|
|
// En développement, HSTS ne doit pas être présent
|
|
|
|
|
assert.Empty(t, w.Header().Get("Strict-Transport-Security"))
|
|
|
|
|
}
|
|
|
|
|
|
2025-12-13 02:34:34 +00:00
|
|
|
assert.Equal(t, "nosniff", w.Header().Get("X-Content-Type-Options"))
|
|
|
|
|
assert.Equal(t, "DENY", w.Header().Get("X-Frame-Options"))
|
|
|
|
|
assert.Equal(t, "1; mode=block", w.Header().Get("X-XSS-Protection"))
|
|
|
|
|
assert.Equal(t, "strict-origin-when-cross-origin", w.Header().Get("Referrer-Policy"))
|
2025-12-24 11:24:54 +00:00
|
|
|
assert.Contains(t, w.Header().Get("Permissions-Policy"), "geolocation=()")
|
2025-12-13 02:34:34 +00:00
|
|
|
assert.Contains(t, w.Header().Get("Content-Security-Policy"), "default-src 'none'")
|
2025-12-24 11:24:54 +00:00
|
|
|
assert.Contains(t, w.Header().Get("Content-Security-Policy"), "frame-ancestors 'none'")
|
2025-12-24 11:35:38 +00:00
|
|
|
|
2025-12-24 11:24:54 +00:00
|
|
|
// BE-SEC-011: Nouveaux headers ajoutés
|
|
|
|
|
assert.Equal(t, "none", w.Header().Get("X-Permitted-Cross-Domain-Policies"))
|
|
|
|
|
assert.Equal(t, "require-corp", w.Header().Get("Cross-Origin-Embedder-Policy"))
|
|
|
|
|
assert.Equal(t, "same-origin", w.Header().Get("Cross-Origin-Opener-Policy"))
|
|
|
|
|
assert.Equal(t, "same-origin", w.Header().Get("Cross-Origin-Resource-Policy"))
|
2025-12-13 02:34:34 +00:00
|
|
|
}
|