mirror of
https://github.com/DRYTRIX/TimeTracker.git
synced 2026-01-22 04:20:18 -06:00
Complete reorganization of project documentation to improve discoverability, navigation, and maintainability. All documentation has been restructured into a clear, role-based hierarchy. ## Major Changes ### New Directory Structure - Created `docs/api/` for API documentation - Created `docs/admin/` with subdirectories: - `admin/configuration/` - Configuration guides - `admin/deployment/` - Deployment guides - `admin/security/` - Security documentation - `admin/monitoring/` - Monitoring and analytics - Created `docs/development/` for developer documentation - Created `docs/guides/` for user-facing guides - Created `docs/reports/` for analysis reports and summaries - Created `docs/changelog/` for detailed changelog entries (ready for future use) ### File Organization #### Moved from Root Directory (40+ files) - Implementation notes → `docs/implementation-notes/` - Test reports → `docs/testing/` - Analysis reports → `docs/reports/` - User guides → `docs/guides/` #### Reorganized within docs/ - API documentation → `docs/api/` - Administrator documentation → `docs/admin/` (with subdirectories) - Developer documentation → `docs/development/` - Security documentation → `docs/admin/security/` - Telemetry documentation → `docs/admin/monitoring/` ### Documentation Updates #### docs/README.md - Complete rewrite with improved navigation - Added visual documentation map - Organized by role (Users, Administrators, Developers) - Better categorization and quick links - Updated all internal links to new structure #### README.md (root) - Updated all documentation links to reflect new structure - Fixed 8 broken links #### app/templates/main/help.html - Enhanced "Where can I get additional help?" section - Added links to new documentation structure - Added documentation index link - Added admin documentation link for administrators - Improved footer with organized documentation links - Added "Complete Documentation" section with role-based links ### New Index Files - Created README.md files for all new directories: - `docs/api/README.md` - `docs/guides/README.md` - `docs/reports/README.md` - `docs/development/README.md` - `docs/admin/README.md` ### Cleanup - Removed empty `docs/security/` directory (moved to `admin/security/`) - Removed empty `docs/telemetry/` directory (moved to `admin/monitoring/`) - Root directory now only contains: README.md, CHANGELOG.md, LICENSE ## Results **Before:** - 45+ markdown files cluttering root directory - Documentation scattered across root and docs/ - Difficult to find relevant documentation - No clear organization structure **After:** - 3 files in root directory (README, CHANGELOG, LICENSE) - Clear directory structure organized by purpose and audience - Easy navigation with role-based organization - All documentation properly categorized - Improved discoverability ## Benefits 1. Better Organization - Documentation grouped by purpose and audience 2. Easier Navigation - Role-based sections (Users, Admins, Developers) 3. Improved Discoverability - Clear structure with README files in each directory 4. Cleaner Root - Only essential files at project root 5. Maintainability - Easier to add and organize new documentation ## Files Changed - 40+ files moved from root to appropriate docs/ subdirectories - 15+ files reorganized within docs/ - 3 major documentation files updated (docs/README.md, README.md, help.html) - 5 new README index files created - 2 empty directories removed All internal links have been updated to reflect the new structure.
227 lines
6.3 KiB
Markdown
227 lines
6.3 KiB
Markdown
# CSRF Token Configuration for Docker
|
|
|
|
This document explains how CSRF (Cross-Site Request Forgery) protection is configured in TimeTracker when running in Docker containers.
|
|
|
|
## Overview
|
|
|
|
TimeTracker uses Flask-WTF's `CSRFProtect` extension to protect against CSRF attacks. CSRF tokens are cryptographic tokens that ensure forms are submitted by legitimate users from your application, not from malicious third-party sites.
|
|
|
|
## How CSRF Tokens Work
|
|
|
|
1. When a user visits a page with a form, the server generates a unique CSRF token
|
|
2. This token is embedded in the form (usually as a hidden field)
|
|
3. When the form is submitted, the token is sent back to the server
|
|
4. The server validates the token matches what was originally generated
|
|
5. If the token is invalid or missing, the request is rejected with a 400 error
|
|
|
|
## Critical: SECRET_KEY Configuration
|
|
|
|
**CSRF tokens are signed using the Flask `SECRET_KEY`.** This means:
|
|
|
|
- ✅ The same `SECRET_KEY` must be used across container restarts
|
|
- ✅ The same `SECRET_KEY` must be used if you run multiple app replicas
|
|
- ⚠️ If `SECRET_KEY` changes, all existing CSRF tokens become invalid
|
|
- ⚠️ Users will get CSRF errors on form submissions if the key changes
|
|
|
|
### Generating a Secure SECRET_KEY
|
|
|
|
Generate a cryptographically secure random key:
|
|
|
|
```bash
|
|
python -c "import secrets; print(secrets.token_hex(32))"
|
|
```
|
|
|
|
### Setting SECRET_KEY in Docker
|
|
|
|
#### Option 1: Environment Variable File
|
|
|
|
Create a `.env` file (do not commit this to git):
|
|
|
|
```bash
|
|
SECRET_KEY=your-generated-key-here
|
|
```
|
|
|
|
Then run docker-compose:
|
|
|
|
```bash
|
|
docker-compose up -d
|
|
```
|
|
|
|
#### Option 2: Export Environment Variable
|
|
|
|
```bash
|
|
export SECRET_KEY="your-generated-key-here"
|
|
docker-compose up -d
|
|
```
|
|
|
|
#### Option 3: Docker Secrets (Production Recommended)
|
|
|
|
For production deployments with Docker Swarm or Kubernetes, use secrets management:
|
|
|
|
```yaml
|
|
secrets:
|
|
secret_key:
|
|
external: true
|
|
|
|
services:
|
|
app:
|
|
secrets:
|
|
- secret_key
|
|
environment:
|
|
- SECRET_KEY_FILE=/run/secrets/secret_key
|
|
```
|
|
|
|
## CSRF Configuration Variables
|
|
|
|
### WTF_CSRF_ENABLED
|
|
|
|
Controls whether CSRF protection is enabled.
|
|
|
|
- **Default in Production**: `true`
|
|
- **Default in Development**: `false` (for easier testing)
|
|
- **Recommended**: Keep enabled in production
|
|
|
|
Set in docker-compose:
|
|
|
|
```yaml
|
|
environment:
|
|
- WTF_CSRF_ENABLED=true
|
|
```
|
|
|
|
### WTF_CSRF_TIME_LIMIT
|
|
|
|
Time in seconds before a CSRF token expires.
|
|
|
|
- **Default**: `3600` (1 hour)
|
|
- **Range**: Set to `null` for no expiration, or any positive integer
|
|
|
|
Set in docker-compose:
|
|
|
|
```yaml
|
|
environment:
|
|
- WTF_CSRF_TIME_LIMIT=3600
|
|
```
|
|
|
|
## Docker Compose Files
|
|
|
|
### docker-compose.yml (Local Development)
|
|
|
|
```yaml
|
|
environment:
|
|
# CSRF enabled by default for security testing
|
|
- WTF_CSRF_ENABLED=${WTF_CSRF_ENABLED:-true}
|
|
- WTF_CSRF_TIME_LIMIT=${WTF_CSRF_TIME_LIMIT:-3600}
|
|
- SECRET_KEY=${SECRET_KEY:-your-secret-key-change-this}
|
|
```
|
|
|
|
### docker-compose.remote.yml (Production)
|
|
|
|
```yaml
|
|
environment:
|
|
# CSRF always enabled in production
|
|
- WTF_CSRF_ENABLED=${WTF_CSRF_ENABLED:-true}
|
|
- WTF_CSRF_TIME_LIMIT=${WTF_CSRF_TIME_LIMIT:-3600}
|
|
- SECRET_KEY=${SECRET_KEY:-your-secret-key-change-this}
|
|
```
|
|
|
|
**Important**: The app will refuse to start in production mode with the default `SECRET_KEY`.
|
|
|
|
### docker-compose.local-test.yml (Testing)
|
|
|
|
```yaml
|
|
environment:
|
|
# CSRF can be disabled for local testing
|
|
- WTF_CSRF_ENABLED=${WTF_CSRF_ENABLED:-false}
|
|
- WTF_CSRF_TIME_LIMIT=${WTF_CSRF_TIME_LIMIT:-3600}
|
|
- SECRET_KEY=${SECRET_KEY:-local-test-secret-key}
|
|
```
|
|
|
|
## Verifying CSRF Protection
|
|
|
|
### Check if CSRF is Enabled
|
|
|
|
Look at the application logs when starting:
|
|
|
|
```bash
|
|
docker-compose logs app | grep -i csrf
|
|
```
|
|
|
|
### Test CSRF Protection
|
|
|
|
1. Open your browser's developer tools
|
|
2. Navigate to a form in TimeTracker
|
|
3. Look for a hidden input field: `<input type="hidden" name="csrf_token" value="...">`
|
|
4. Try submitting the form without the token (should fail with 400 error)
|
|
|
|
### Common Issues
|
|
|
|
#### Issue: "CSRF token missing or invalid"
|
|
|
|
**Cause**: One of the following:
|
|
- `SECRET_KEY` changed between token generation and validation
|
|
- Token expired (check `WTF_CSRF_TIME_LIMIT`)
|
|
- Clock skew between server and client
|
|
- Browser cookies disabled or blocked
|
|
|
|
**Solution**:
|
|
1. Check `SECRET_KEY` is consistent
|
|
2. Verify `WTF_CSRF_ENABLED=true`
|
|
3. Ensure cookies are enabled
|
|
4. Check system time is synchronized
|
|
|
|
#### Issue: Forms work in development but not in production Docker
|
|
|
|
**Cause**: Missing or misconfigured `SECRET_KEY`
|
|
|
|
**Solution**:
|
|
1. Set a proper `SECRET_KEY` in your `.env` file
|
|
2. Verify the environment variable is passed to the container:
|
|
```bash
|
|
docker-compose exec app env | grep SECRET_KEY
|
|
```
|
|
|
|
#### Issue: CSRF tokens expire too quickly
|
|
|
|
**Cause**: `WTF_CSRF_TIME_LIMIT` too short
|
|
|
|
**Solution**: Increase the time limit or disable expiration:
|
|
```yaml
|
|
environment:
|
|
- WTF_CSRF_TIME_LIMIT=7200 # 2 hours
|
|
```
|
|
|
|
## API Endpoints
|
|
|
|
The `/api/*` endpoints are **exempted from CSRF protection** because they use JSON and are designed for programmatic access. They rely on other authentication mechanisms instead.
|
|
|
|
## Security Best Practices
|
|
|
|
1. ✅ **Always use a strong SECRET_KEY in production**
|
|
2. ✅ **Keep SECRET_KEY secret** - never commit to version control
|
|
3. ✅ **Use the same SECRET_KEY across all app replicas**
|
|
4. ✅ **Enable CSRF protection in production** (`WTF_CSRF_ENABLED=true`)
|
|
5. ✅ **Use HTTPS in production** for secure cookie transmission
|
|
6. ✅ **Set appropriate cookie security flags**:
|
|
- `SESSION_COOKIE_SECURE=true` (HTTPS only)
|
|
- `SESSION_COOKIE_HTTPONLY=true` (no JavaScript access)
|
|
- `SESSION_COOKIE_SAMESITE=Lax` (CSRF defense)
|
|
|
|
## Additional Resources
|
|
|
|
- [Flask-WTF CSRF Protection](https://flask-wtf.readthedocs.io/en/stable/csrf.html)
|
|
- [OWASP CSRF Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html)
|
|
- [Flask Security Considerations](https://flask.palletsprojects.com/en/2.3.x/security/)
|
|
|
|
## Summary
|
|
|
|
For CSRF tokens to work correctly in Docker:
|
|
|
|
1. **Set a strong SECRET_KEY** and keep it consistent
|
|
2. **Enable CSRF protection** with `WTF_CSRF_ENABLED=true`
|
|
3. **Configure timeout** appropriately with `WTF_CSRF_TIME_LIMIT`
|
|
4. **Use HTTPS in production** with secure cookie flags
|
|
5. **Never change SECRET_KEY** without understanding the impact
|
|
|
|
All docker-compose files have been updated with these settings and include helpful comments.
|
|
|