aboutsummaryrefslogtreecommitdiff
path: root/backend/router.go
diff options
context:
space:
mode:
authorWilliam Hergès <william@herges.fr>2025-10-29 14:46:50 +0100
committerWilliam Hergès <william@herges.fr>2025-10-29 14:46:50 +0100
commitf582b92e2b8e2a301380e420794e71200f0dbdfa (patch)
treea21462dac06b618f67062bb7050a2657d2a7fd18 /backend/router.go
parent8be00c8b9915a91ee57ff6125962f2dccdad1a6f (diff)
feat(security): set headers
Diffstat (limited to 'backend/router.go')
-rw-r--r--backend/router.go15
1 files changed, 13 insertions, 2 deletions
diff --git a/backend/router.go b/backend/router.go
index fd72711..3e6a39a 100644
--- a/backend/router.go
+++ b/backend/router.go
@@ -67,15 +67,26 @@ func NewRouter(debug bool, cfg *Config, assets fs.FS) *chi.Mux {
LogRequestHeaders: []string{"Origin"},
LogResponseHeaders: []string{},
}))
+ // security headers
r.Use(func(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
- r.Header.Add("Access-Control-Allow-Origin", fmt.Sprintf("https://%s", cfg.Domain))
+ // prevent tracking
+ w.Header().Add("Referrer-Policy", "no-referrer")
+ // prevent iframe
+ w.Header().Add("X-Frame-Options", "deny")
+ // prevent bad content being parsed
+ w.Header().Add("X-Content-Type-Options", "nosniff")
+ w.Header().Add("X-Permitted-Cross-Domain-Policies", "none")
+ // content security, cors & co
+ w.Header().Add("Content-Security-Policy", fmt.Sprintf("default-src 'self' *.%s; object-src 'none';", cfg.Domain))
+ w.Header().Add("Access-Control-Allow-Origin", fmt.Sprintf("https://%s", cfg.Domain))
if !debug {
- r.Header.Add("Access-Control-Max-Age", fmt.Sprintf("%d", 24*60*60))
+ w.Header().Add("Access-Control-Max-Age", fmt.Sprintf("%d", 24*60*60))
}
next.ServeHTTP(w, r)
})
})
+ // context
r.Use(func(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
ctx := context.WithValue(r.Context(), configKey, cfg)