mirror of
https://github.com/syntrex-lab/gomcp.git
synced 2026-04-26 12:56:21 +02:00
C1: Remove verification_code_dev from API response (CVSS 9.8)
- Code now logged server-side only when email service not configured
C2: Tenant isolation on /api/auth/users (CVSS 9.1)
- HandleListUsers filters by claims.TenantID
- TenantID added to User struct, DB migration, persistUser, loadFromDB
C3: Include TenantID in JWT tokens (CVSS 8.8)
- Login handler now uses Sign() with full Claims including TenantID
- Enables downstream RBAC tenant filtering
M1: nginx server_tokens off (hide version fingerprint)
M2: syntrex.pro added to server_name
M3: CORS multi-origin support (SOC_CORS_ORIGIN=origin1,origin2)
89 lines
2.9 KiB
Go
89 lines
2.9 KiB
Go
package httpserver
|
|
|
|
import (
|
|
"net/http"
|
|
"os"
|
|
"strings"
|
|
)
|
|
|
|
// corsAllowedOrigins returns the configured CORS origins.
|
|
// Set SOC_CORS_ORIGIN in production (e.g. "https://syntrex.pro,https://xn--80akacl3adqr.xn--p1acf").
|
|
// Defaults to "*" for local development.
|
|
func corsAllowedOrigins() []string {
|
|
if v := os.Getenv("SOC_CORS_ORIGIN"); v != "" {
|
|
parts := strings.Split(v, ",")
|
|
for i := range parts {
|
|
parts[i] = strings.TrimSpace(parts[i])
|
|
}
|
|
return parts
|
|
}
|
|
return []string{"*"}
|
|
}
|
|
|
|
// corsMiddleware adds CORS headers with configurable origin.
|
|
// Production: set SOC_CORS_ORIGIN=https://syntrex.pro,https://xn--80akacl3adqr.xn--p1acf
|
|
func corsMiddleware(next http.Handler) http.Handler {
|
|
origins := corsAllowedOrigins()
|
|
allowAll := len(origins) == 1 && origins[0] == "*"
|
|
allowedSet := make(map[string]bool, len(origins))
|
|
for _, o := range origins {
|
|
allowedSet[o] = true
|
|
}
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
if allowAll {
|
|
w.Header().Set("Access-Control-Allow-Origin", "*")
|
|
} else {
|
|
reqOrigin := r.Header.Get("Origin")
|
|
if allowedSet[reqOrigin] {
|
|
w.Header().Set("Access-Control-Allow-Origin", reqOrigin)
|
|
w.Header().Set("Vary", "Origin")
|
|
}
|
|
}
|
|
w.Header().Set("Access-Control-Allow-Methods", "GET, POST, PUT, PATCH, DELETE, OPTIONS")
|
|
w.Header().Set("Access-Control-Allow-Headers", "Content-Type, Authorization, X-API-Key")
|
|
w.Header().Set("Access-Control-Allow-Credentials", "true")
|
|
w.Header().Set("Access-Control-Max-Age", "86400")
|
|
|
|
// Handle preflight
|
|
if r.Method == http.MethodOptions {
|
|
w.WriteHeader(http.StatusNoContent)
|
|
return
|
|
}
|
|
|
|
next.ServeHTTP(w, r)
|
|
})
|
|
}
|
|
|
|
// securityHeadersMiddleware adds defense-in-depth headers to all responses.
|
|
// Mitigates XSS, clickjacking, MIME sniffing, and information leak vectors.
|
|
func securityHeadersMiddleware(next http.Handler) http.Handler {
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
// Prevent MIME type sniffing (IE/Chrome auto-exec attacks)
|
|
w.Header().Set("X-Content-Type-Options", "nosniff")
|
|
|
|
// Block iframe embedding (clickjacking defense)
|
|
w.Header().Set("X-Frame-Options", "DENY")
|
|
|
|
// XSS filter (legacy browsers)
|
|
w.Header().Set("X-XSS-Protection", "1; mode=block")
|
|
|
|
// Referrer leak prevention (no full URL in Referer header)
|
|
w.Header().Set("Referrer-Policy", "strict-origin-when-cross-origin")
|
|
|
|
// Content Security Policy — API only, no inline scripts
|
|
w.Header().Set("Content-Security-Policy", "default-src 'none'; frame-ancestors 'none'")
|
|
|
|
// Permissions Policy — deny all sensitive browser APIs
|
|
w.Header().Set("Permissions-Policy", "camera=(), microphone=(), geolocation=(), interest-cohort=()")
|
|
|
|
// Force HTTPS in production (1 year, include subdomains)
|
|
w.Header().Set("Strict-Transport-Security", "max-age=31536000; includeSubDomains")
|
|
|
|
// Hide server identity
|
|
w.Header().Set("X-Powered-By", "")
|
|
w.Header().Del("Server")
|
|
|
|
next.ServeHTTP(w, r)
|
|
})
|
|
}
|