mirror of
https://github.com/labstack/echo.git
synced 2024-12-24 20:14:31 +02:00
Merge branch 'middleware-secure-header' of https://github.com/coderhaoxin/echo into coderhaoxin-middleware-secure-header
This commit is contained in:
commit
c31a524d05
93
middleware/secure.go
Normal file
93
middleware/secure.go
Normal file
@ -0,0 +1,93 @@
|
||||
package middleware
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
|
||||
"github.com/labstack/echo"
|
||||
)
|
||||
|
||||
type (
|
||||
SecureConfig struct {
|
||||
STSMaxAge int64
|
||||
STSIncludeSubdomains bool
|
||||
FrameDeny bool
|
||||
FrameOptionsValue string
|
||||
ContentTypeNosniff bool
|
||||
XssProtected bool
|
||||
XssProtectionValue string
|
||||
ContentSecurityPolicy string
|
||||
DisableProdCheck bool
|
||||
}
|
||||
)
|
||||
|
||||
var (
|
||||
DefaultSecureConfig = SecureConfig{}
|
||||
)
|
||||
|
||||
const (
|
||||
stsHeader = "Strict-Transport-Security"
|
||||
stsSubdomainString = "; includeSubdomains"
|
||||
frameOptionsHeader = "X-Frame-Options"
|
||||
frameOptionsValue = "DENY"
|
||||
contentTypeHeader = "X-Content-Type-Options"
|
||||
contentTypeValue = "nosniff"
|
||||
xssProtectionHeader = "X-XSS-Protection"
|
||||
xssProtectionValue = "1; mode=block"
|
||||
cspHeader = "Content-Security-Policy"
|
||||
)
|
||||
|
||||
func Secure() echo.MiddlewareFunc {
|
||||
return SecureWithConfig(DefaultSecureConfig)
|
||||
}
|
||||
|
||||
func SecureWithConfig(config SecureConfig) echo.MiddlewareFunc {
|
||||
return func(next echo.HandlerFunc) echo.HandlerFunc {
|
||||
return func(c echo.Context) error {
|
||||
setFrameOptions(c, config)
|
||||
setContentTypeOptions(c, config)
|
||||
setXssProtection(c, config)
|
||||
setSTS(c, config)
|
||||
setCSP(c, config)
|
||||
return next(c)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func setFrameOptions(c echo.Context, opts SecureConfig) {
|
||||
if opts.FrameOptionsValue != "" {
|
||||
c.Response().Header().Set(frameOptionsHeader, opts.FrameOptionsValue)
|
||||
} else if opts.FrameDeny {
|
||||
c.Response().Header().Set(frameOptionsHeader, frameOptionsValue)
|
||||
}
|
||||
}
|
||||
|
||||
func setContentTypeOptions(c echo.Context, opts SecureConfig) {
|
||||
if opts.ContentTypeNosniff {
|
||||
c.Response().Header().Set(contentTypeHeader, contentTypeValue)
|
||||
}
|
||||
}
|
||||
|
||||
func setXssProtection(c echo.Context, opts SecureConfig) {
|
||||
if opts.XssProtectionValue != "" {
|
||||
c.Response().Header().Set(xssProtectionHeader, opts.XssProtectionValue)
|
||||
} else if opts.XssProtected {
|
||||
c.Response().Header().Set(xssProtectionHeader, xssProtectionValue)
|
||||
}
|
||||
}
|
||||
|
||||
func setSTS(c echo.Context, opts SecureConfig) {
|
||||
if opts.STSMaxAge != 0 && opts.DisableProdCheck {
|
||||
subDomains := ""
|
||||
if opts.STSIncludeSubdomains {
|
||||
subDomains = stsSubdomainString
|
||||
}
|
||||
|
||||
c.Response().Header().Set(stsHeader, fmt.Sprintf("max-age=%d%s", opts.STSMaxAge, subDomains))
|
||||
}
|
||||
}
|
||||
|
||||
func setCSP(c echo.Context, opts SecureConfig) {
|
||||
if opts.ContentSecurityPolicy != "" {
|
||||
c.Response().Header().Set(cspHeader, opts.ContentSecurityPolicy)
|
||||
}
|
||||
}
|
41
middleware/secure_test.go
Normal file
41
middleware/secure_test.go
Normal file
@ -0,0 +1,41 @@
|
||||
package middleware
|
||||
|
||||
import (
|
||||
"net/http"
|
||||
"testing"
|
||||
|
||||
"github.com/labstack/echo"
|
||||
"github.com/labstack/echo/test"
|
||||
"github.com/stretchr/testify/assert"
|
||||
)
|
||||
|
||||
func TestSecureWithConfig(t *testing.T) {
|
||||
e := echo.New()
|
||||
|
||||
config := SecureConfig{
|
||||
STSMaxAge: 100,
|
||||
STSIncludeSubdomains: true,
|
||||
FrameDeny: true,
|
||||
FrameOptionsValue: "",
|
||||
ContentTypeNosniff: true,
|
||||
XssProtected: true,
|
||||
XssProtectionValue: "",
|
||||
ContentSecurityPolicy: "default-src 'self'",
|
||||
DisableProdCheck: true,
|
||||
}
|
||||
secure := SecureWithConfig(config)
|
||||
h := secure(func(c echo.Context) error {
|
||||
return c.String(http.StatusOK, "test")
|
||||
})
|
||||
|
||||
rq := test.NewRequest(echo.GET, "/", nil)
|
||||
rc := test.NewResponseRecorder()
|
||||
c := e.NewContext(rq, rc)
|
||||
h(c)
|
||||
|
||||
assert.Equal(t, "max-age=100; includeSubdomains", rc.Header().Get(stsHeader))
|
||||
assert.Equal(t, "DENY", rc.Header().Get(frameOptionsHeader))
|
||||
assert.Equal(t, "nosniff", rc.Header().Get(contentTypeHeader))
|
||||
assert.Equal(t, xssProtectionValue, rc.Header().Get(xssProtectionHeader))
|
||||
assert.Equal(t, "default-src 'self'", rc.Header().Get(cspHeader))
|
||||
}
|
Loading…
Reference in New Issue
Block a user