CORS middleware. And fix middleware types for logging and securityheaders.
This commit is contained in:
parent
e8f22496e1
commit
c2265330dd
@ -51,12 +51,12 @@ var startCmd = &cobra.Command{
|
|||||||
|
|
||||||
// Create middleware stack
|
// Create middleware stack
|
||||||
stack := middleware.CreateStack(
|
stack := middleware.CreateStack(
|
||||||
middleware.Logging, // Log requests with structured logging
|
middleware.Logging(), // Log requests with structured logging
|
||||||
middleware.Recovery(), // Catch all panics
|
middleware.Recovery(), // Catch all panics
|
||||||
middleware.Timeout(32*time.Second), // Set request timeout
|
middleware.Timeout(32*time.Second), // Set request timeout
|
||||||
middleware.RequestID(), // Generate a unique request ID
|
middleware.RequestID(), // Generate a unique request ID
|
||||||
middleware.MaxBodySize(1024*1024), // 1MB size limit
|
middleware.MaxBodySize(1024*1024), // 1MB size limit
|
||||||
middleware.SecureHeaders, // Set secure headers
|
middleware.SecureHeaders(), // Set secure headers
|
||||||
authConfig.Middleware(), // OIDC authentication middleware
|
authConfig.Middleware(), // OIDC authentication middleware
|
||||||
)
|
)
|
||||||
|
|
||||||
|
121
internal/middleware/cors.go
Normal file
121
internal/middleware/cors.go
Normal file
@ -0,0 +1,121 @@
|
|||||||
|
package middleware
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net/http"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
)
|
||||||
|
|
||||||
|
// CORSConfig defines the configuration options for CORS middleware
|
||||||
|
type CORSConfig struct {
|
||||||
|
// AllowedOrigins defines the origins that are allowed to access the resource
|
||||||
|
AllowedOrigins []string
|
||||||
|
|
||||||
|
// AllowedMethods defines the HTTP methods that are allowed
|
||||||
|
AllowedMethods []string
|
||||||
|
|
||||||
|
// AllowedHeaders defines the headers that are allowed in requests
|
||||||
|
AllowedHeaders []string
|
||||||
|
|
||||||
|
// ExposedHeaders defines the headers that can be read by the browser
|
||||||
|
ExposedHeaders []string
|
||||||
|
|
||||||
|
// AllowCredentials defines whether cookies, HTTP authentication and client SSL
|
||||||
|
// certificates can be transmitted in cross-origin requests
|
||||||
|
AllowCredentials bool
|
||||||
|
|
||||||
|
// MaxAge defines how long (in seconds) the results of a preflight request can be cached
|
||||||
|
MaxAge int
|
||||||
|
}
|
||||||
|
|
||||||
|
// DefaultCORSConfig returns a default configuration for CORS middleware
|
||||||
|
func DefaultCORSConfig() CORSConfig {
|
||||||
|
return CORSConfig{
|
||||||
|
AllowedOrigins: []string{},
|
||||||
|
AllowedMethods: []string{"GET"},
|
||||||
|
AllowedHeaders: []string{},
|
||||||
|
ExposedHeaders: []string{},
|
||||||
|
AllowCredentials: false,
|
||||||
|
MaxAge: 0,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// CORS middleware handles Cross-Origin Resource Sharing
|
||||||
|
func CORS(config CORSConfig) Middleware {
|
||||||
|
// Precompute values for better performance
|
||||||
|
allowedOriginsMap := make(map[string]bool)
|
||||||
|
for _, origin := range config.AllowedOrigins {
|
||||||
|
allowedOriginsMap[origin] = true
|
||||||
|
}
|
||||||
|
|
||||||
|
allowAllOrigins := allowedOriginsMap["*"]
|
||||||
|
allowedMethodsValue := strings.Join(config.AllowedMethods, ", ")
|
||||||
|
allowedHeadersValue := strings.Join(config.AllowedHeaders, ", ")
|
||||||
|
exposedHeadersValue := strings.Join(config.ExposedHeaders, ", ")
|
||||||
|
|
||||||
|
// Convert MaxAge to a string once
|
||||||
|
var maxAgeValue string
|
||||||
|
if config.MaxAge > 0 {
|
||||||
|
maxAgeValue = strconv.Itoa(config.MaxAge)
|
||||||
|
}
|
||||||
|
|
||||||
|
return func(next http.Handler) http.Handler {
|
||||||
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
origin := r.Header.Get("Origin")
|
||||||
|
|
||||||
|
// Skip if no Origin header is present (same-origin request)
|
||||||
|
if origin == "" {
|
||||||
|
next.ServeHTTP(w, r)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if the origin is allowed
|
||||||
|
var allowedOrigin string
|
||||||
|
if allowAllOrigins {
|
||||||
|
allowedOrigin = origin
|
||||||
|
} else if allowedOriginsMap[origin] {
|
||||||
|
allowedOrigin = origin
|
||||||
|
}
|
||||||
|
|
||||||
|
// Preflight OPTIONS request
|
||||||
|
if r.Method == http.MethodOptions {
|
||||||
|
// Set allowed methods
|
||||||
|
w.Header().Set("Access-Control-Allow-Methods", allowedMethodsValue)
|
||||||
|
|
||||||
|
// Set allowed headers
|
||||||
|
if len(allowedHeadersValue) > 0 {
|
||||||
|
w.Header().Set("Access-Control-Allow-Headers", allowedHeadersValue)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set max age for preflight request caching
|
||||||
|
if maxAgeValue != "" {
|
||||||
|
w.Header().Set("Access-Control-Max-Age", maxAgeValue)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set allowed origin
|
||||||
|
if allowedOrigin != "" {
|
||||||
|
w.Header().Set("Access-Control-Allow-Origin", allowedOrigin)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set exposed headers
|
||||||
|
if len(exposedHeadersValue) > 0 {
|
||||||
|
w.Header().Set("Access-Control-Expose-Headers", exposedHeadersValue)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set allow credentials
|
||||||
|
if config.AllowCredentials {
|
||||||
|
w.Header().Set("Access-Control-Allow-Credentials", "true")
|
||||||
|
}
|
||||||
|
|
||||||
|
// If it's a preflight request, we're done
|
||||||
|
if r.Method == http.MethodOptions {
|
||||||
|
w.WriteHeader(http.StatusNoContent)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Process the actual request
|
||||||
|
next.ServeHTTP(w, r)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
@ -19,7 +19,8 @@ func (w *wrappedWriter) WriteHeader(statusCode int) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Logging is a middleware function that logs requests with structured logging
|
// Logging is a middleware function that logs requests with structured logging
|
||||||
func Logging(next http.Handler) http.Handler {
|
func Logging() Middleware {
|
||||||
|
return func(next http.Handler) http.Handler {
|
||||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
start := time.Now()
|
start := time.Now()
|
||||||
|
|
||||||
@ -63,3 +64,4 @@ func Logging(next http.Handler) http.Handler {
|
|||||||
)
|
)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
@ -7,7 +7,8 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
// SecurityHeaders adds security and cache-control headers to all responses
|
// SecurityHeaders adds security and cache-control headers to all responses
|
||||||
func SecureHeaders(next http.Handler) http.Handler {
|
func SecureHeaders() Middleware {
|
||||||
|
return func(next http.Handler) http.Handler {
|
||||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
// Caching headers
|
// Caching headers
|
||||||
w.Header().Set("Cache-Control", "no-store")
|
w.Header().Set("Cache-Control", "no-store")
|
||||||
@ -51,6 +52,7 @@ func SecureHeaders(next http.Handler) http.Handler {
|
|||||||
next.ServeHTTP(w, r)
|
next.ServeHTTP(w, r)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// middleware/csrf.go
|
// middleware/csrf.go
|
||||||
func CSRFMiddleware(store sessions.Store) Middleware {
|
func CSRFMiddleware(store sessions.Store) Middleware {
|
||||||
|
Loading…
x
Reference in New Issue
Block a user