Adjust our securityheader pkg to support form_post.
Our Supervisor callback handler now needs to load JS and CSS from the provider endpoint, and this JS needs to make a `fetch()` call across origins (to post the form to the CLI callback). This requires a custom Content-Security-Policy compared to other pages we render. Signed-off-by: Matt Moyer <moyerm@vmware.com>
This commit is contained in:
parent
7217cf4892
commit
674cd4a88c
@ -1,16 +1,22 @@
|
|||||||
// Copyright 2020 the Pinniped contributors. All Rights Reserved.
|
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved.
|
||||||
// SPDX-License-Identifier: Apache-2.0
|
// SPDX-License-Identifier: Apache-2.0
|
||||||
|
|
||||||
// Package securityheader implements an HTTP middleware for setting security-related response headers.
|
// Package securityheader implements an HTTP middleware for setting security-related response headers.
|
||||||
package securityheader
|
package securityheader
|
||||||
|
|
||||||
import "net/http"
|
import (
|
||||||
|
"net/http"
|
||||||
|
)
|
||||||
|
|
||||||
// Wrap the provided http.Handler so it sets appropriate security-related response headers.
|
// Wrap the provided http.Handler so it sets appropriate security-related response headers.
|
||||||
func Wrap(wrapped http.Handler) http.Handler {
|
func Wrap(wrapped http.Handler) http.Handler {
|
||||||
|
return WrapWithCustomCSP(wrapped, "default-src 'none'; frame-ancestors 'none'")
|
||||||
|
}
|
||||||
|
|
||||||
|
func WrapWithCustomCSP(wrapped http.Handler, cspHeader string) http.Handler {
|
||||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
h := w.Header()
|
h := w.Header()
|
||||||
h.Set("Content-Security-Policy", "default-src 'none'; frame-ancestors 'none'")
|
h.Set("Content-Security-Policy", cspHeader)
|
||||||
h.Set("X-Frame-Options", "DENY")
|
h.Set("X-Frame-Options", "DENY")
|
||||||
h.Set("X-XSS-Protection", "1; mode=block")
|
h.Set("X-XSS-Protection", "1; mode=block")
|
||||||
h.Set("X-Content-Type-Options", "nosniff")
|
h.Set("X-Content-Type-Options", "nosniff")
|
||||||
|
@ -16,7 +16,49 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
func TestWrap(t *testing.T) {
|
func TestWrap(t *testing.T) {
|
||||||
testServer := httptest.NewServer(Wrap(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
for _, tt := range []struct {
|
||||||
|
name string
|
||||||
|
wrapFunc func(http.Handler) http.Handler
|
||||||
|
expectHeaders http.Header
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "wrap",
|
||||||
|
wrapFunc: Wrap,
|
||||||
|
expectHeaders: http.Header{
|
||||||
|
"X-Test-Header": []string{"test value"},
|
||||||
|
"Content-Security-Policy": []string{"default-src 'none'; frame-ancestors 'none'"},
|
||||||
|
"Content-Type": []string{"text/plain; charset=utf-8"},
|
||||||
|
"Referrer-Policy": []string{"no-referrer"},
|
||||||
|
"X-Content-Type-Options": []string{"nosniff"},
|
||||||
|
"X-Frame-Options": []string{"DENY"},
|
||||||
|
"X-Xss-Protection": []string{"1; mode=block"},
|
||||||
|
"X-Dns-Prefetch-Control": []string{"off"},
|
||||||
|
"Cache-Control": []string{"no-cache,no-store,max-age=0,must-revalidate"},
|
||||||
|
"Pragma": []string{"no-cache"},
|
||||||
|
"Expires": []string{"0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "custom CSP",
|
||||||
|
wrapFunc: func(h http.Handler) http.Handler { return WrapWithCustomCSP(h, "my-custom-csp-header") },
|
||||||
|
expectHeaders: http.Header{
|
||||||
|
"X-Test-Header": []string{"test value"},
|
||||||
|
"Content-Security-Policy": []string{"my-custom-csp-header"},
|
||||||
|
"Content-Type": []string{"text/plain; charset=utf-8"},
|
||||||
|
"Referrer-Policy": []string{"no-referrer"},
|
||||||
|
"X-Content-Type-Options": []string{"nosniff"},
|
||||||
|
"X-Frame-Options": []string{"DENY"},
|
||||||
|
"X-Xss-Protection": []string{"1; mode=block"},
|
||||||
|
"X-Dns-Prefetch-Control": []string{"off"},
|
||||||
|
"Cache-Control": []string{"no-cache,no-store,max-age=0,must-revalidate"},
|
||||||
|
"Pragma": []string{"no-cache"},
|
||||||
|
"Expires": []string{"0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
} {
|
||||||
|
tt := tt
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
testServer := httptest.NewServer(tt.wrapFunc(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
w.Header().Set("X-Test-Header", "test value")
|
w.Header().Set("X-Test-Header", "test value")
|
||||||
_, _ = w.Write([]byte("hello world"))
|
_, _ = w.Write([]byte("hello world"))
|
||||||
})))
|
})))
|
||||||
@ -36,20 +78,9 @@ func TestWrap(t *testing.T) {
|
|||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.Equal(t, "hello world", string(respBody))
|
require.Equal(t, "hello world", string(respBody))
|
||||||
|
|
||||||
expected := http.Header{
|
for key, values := range tt.expectHeaders {
|
||||||
"X-Test-Header": []string{"test value"},
|
|
||||||
"Content-Security-Policy": []string{"default-src 'none'; frame-ancestors 'none'"},
|
|
||||||
"Content-Type": []string{"text/plain; charset=utf-8"},
|
|
||||||
"Referrer-Policy": []string{"no-referrer"},
|
|
||||||
"X-Content-Type-Options": []string{"nosniff"},
|
|
||||||
"X-Frame-Options": []string{"DENY"},
|
|
||||||
"X-Xss-Protection": []string{"1; mode=block"},
|
|
||||||
"X-Dns-Prefetch-Control": []string{"off"},
|
|
||||||
"Cache-Control": []string{"no-cache,no-store,max-age=0,must-revalidate"},
|
|
||||||
"Pragma": []string{"no-cache"},
|
|
||||||
"Expires": []string{"0"},
|
|
||||||
}
|
|
||||||
for key, values := range expected {
|
|
||||||
assert.Equalf(t, values, resp.Header.Values(key), "unexpected values for header %s", key)
|
assert.Equalf(t, values, resp.Header.Values(key), "unexpected values for header %s", key)
|
||||||
}
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user