Edge-CSRF
Edge-CSRF is a CSRF protection library that runs on the edge runtime.
This library helps you to implement the signed double submit cookie pattern except it only uses edge runtime dependencies so it can be used in both node environments and in edge functions (e.g. Vercel Edge Functions, Cloudflare Page Functions). The recommended way to use this library is via its drop-in integrations for Next.js and SvelteKit though it also has a lower-level API for more custom implementations.
We hope you enjoy using this software. Contributions and suggestions are welcome!
Features
- Runs on both node and edge runtimes
- Includes a Next.js integration (see here)
- Includes a SvelteKit integration (see here)
- Includes a low-level API for custom integrations (see below)
- Gets token from HTTP request header (
X-CSRF-Token
) or from request body field (csrf_token
) - Handles form-urlencoded, multipart/form-data or json-encoded HTTP request bodies
- Supports Server Actions via form and non-form submission
- Customizable cookie options
Install
To use Edge-CSRF, just add it as a dependency to your app:
npm install edge-csrf
# or
pnpm add edge-csrf
# or
yarn add edge-csrf
Quickstart (Next.js)
To use Edge-CSRF with your Next.js app, first create a middleware file (middleware.ts
) for your project and add the Edge-CSRF middleware:
import { createMiddleware } from 'edge-csrf/nextjs';
const csrfMiddleware = createMiddleware({
cookie: {
secure: process.env.NODE_ENV === 'production',
},
});
export const middleware = csrfMiddleware;
Now, all HTTP submission requests (e.g. POST, PUT, DELETE, PATCH) will be rejected if they do not include a valid CSRF token. To add the CSRF token to your forms, you can fetch it from the X-CSRF-Token
HTTP response header server-side or client-side. For example:
import { headers } from 'next/headers';
export default function Page() {
const csrfToken = headers().get('X-CSRF-Token') || 'missing';
return (
<form action="/api/form-handler" method="post">
<input type="hidden" value={csrfToken}>
<input type="text" name="my-input">
<input type="submit">
</form>
);
}
import { NextResponse } from 'next/server';
export async function POST() {
return NextResponse.json({ status: 'success' });
}
Quickstart (SvelteKit)
To use Edge-CSRF with your SvelteKit app, first create a server-side hooks file (hooks.server.ts
) for your project and add the Edge-CSRF handle:
import { createHandle } from 'edge-csrf/sveltekit';
const csrfHandle = createHandle({
cookie: {
secure: process.env.NODE_ENV === 'production',
},
});
export const handle = csrfHandle;
Now, all HTTP submission requests (e.g. POST, PUT, DELETE, PATCH) will be rejected if they do not include a valid CSRF token. To add the CSRF token to your forms, you can fetch it from the event's locals
data object server-side. For example:
export async function load({ locals }) {
return {
csrfToken: locals.csrfToken,
};
}
export const actions = {
default: async () => {
return { success: true };
},
};
<!-- src/routes/+page.svelte -->
<script lang="ts">
export let data;
export let form;
</script>
{#if form?.success}
<span>success</span>
{:else}
<form method="post">
<input type="hidden" value={data.csrfToken}>
<input type="text" name="my-input">
<input type="submit">
</form>
{/if}
Finally, to make typescript aware of the new locals
attributes you can add Edge-CSRF types to your app's types:
import type { EdgeCsrfLocals } from 'edge-csrf/sveltekit';
declare global {
namespace App {
interface Locals extends EdgeCsrfLocals {}
}
}
export {};
Integrations
For details about each integration see:
Low-level API
The following methods are named exports in the the top-level edge-csrf
module:
createSecret(length) - Create new secret (cryptographically secure)
* @param {int} length - Byte length of secret
* @returns {Uint8Array} - The secret
createToken(secret, saltByteLength) - Create new CSRF token (cryptographically insecure
salt hashed with secret)
* @param {Uint8Array} secret - The secret
* @param {int} saltByteLength - Salt length in number of bytes
* @returns {Promise<Uint8Array>} - A promise returning the token in Uint8Array format
getTokenString(request) - Get the CSRF token from the request
* @param {Request} request - The request object
* @returns {Promise<string>} - A promise returning the token in string format
verifyToken(token, secret) - Verify the CSRF token and secret obtained from the request
* @param {Uint8Array} token - The CSRF token
* @param {Uint8Array} secret - The CSRF secret
* @returns {Promise<boolean>} - A promise returning result of verification
utoa(input) - Encode Uint8Array as base64 string
* @param {Uint8Array} input - The data to be converted from Uint8Array to base64
* @returns {string} The base64 encoded string
atou(input) - Decode base64 string into Uint8Array
* @param {string} input - The data to be converted from base64 to Uint8Array
* @returns {Uint8Array} - The Uint8Array representing the input string
Note: If you're using these methods you're probably working on a custom framework integration. If so, please consider contributing it back to this project!
Development
Get the code
To develop edge-csrf, first clone the repository then install the dependencies:
git clone git@github.com:kubetail-org/edge-csrf.git
cd edge-csrf
pnpm install
Run the unit tests
Edge-CSRF uses jest for testing (via vitest). To run the tests in node, edge and miniflare environments, use the test-all
command:
pnpm test-all
The test files are colocated with the source code in the src/
directory, with the filename format {name}.test.ts
.
Build for production
To build Edge-CSRF for production, run the build
command:
pnpm build
The build artifacts will be located in the dist/
directory.