File size: 4,732 Bytes
1e92f2d
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
// @flow
const hpp = require('hpp');
const helmet = require('helmet');
const uuid = require('uuid');
const hsts = require('hsts');
const express_enforces_ssl = require('express-enforces-ssl');
const IS_PROD = process.env.NODE_ENV === 'production' && !process.env.FORCE_DEV;

function securityMiddleware(
  server: express$Application,
  { enableNonce, enableCSP }: { enableNonce: boolean, enableCSP: boolean }
) {
  // Don't expose any software information to hackers.
  server.disable('x-powered-by');

  // Prevent HTTP Parameter pollution.
  server.use(hpp());

  if (IS_PROD) {
    server.use(
      hsts({
        // 5 mins in seconds
        // we will scale this up incrementally to ensure we dont break the
        // app for end users
        // see deployment recommendations here https://hstspreload.org/?domain=spectrum.chat
        maxAge: 300,
        includeSubDomains: true,
        preload: true,
      })
    );

    server.use(express_enforces_ssl());
  }

  // The xssFilter middleware sets the X-XSS-Protection header to prevent
  // reflected XSS attacks.
  // @see https://helmetjs.github.io/docs/xss-filter/
  server.use(helmet.xssFilter());

  // Frameguard mitigates clickjacking attacks by setting the X-Frame-Options header.
  // @see https://helmetjs.github.io/docs/frameguard/
  server.use(helmet.frameguard('deny'));

  // Sets the X-Download-Options to prevent Internet Explorer from executing
  // downloads in your site’s context.
  // @see https://helmetjs.github.io/docs/ienoopen/
  server.use(helmet.ieNoOpen());

  // Don’t Sniff Mimetype middleware, noSniff, helps prevent browsers from trying
  // to guess (“sniff”) the MIME type, which can have security implications. It
  // does this by setting the X-Content-Type-Options header to nosniff.
  // @see https://helmetjs.github.io/docs/dont-sniff-mimetype/
  server.use(helmet.noSniff());

  if (enableNonce) {
    // Attach a unique "nonce" to every response. This allows use to declare
    // inline scripts as being safe for execution against our content security policy.
    // @see https://helmetjs.github.io/docs/csp/
    server.use(
      (
        request: express$Request,
        response: express$Response,
        next: express$NextFunction
      ) => {
        response.locals.nonce = uuid.v4();
        next();
      }
    );
  }

  // Content Security Policy (CSP)
  // It can be a pain to manage these, but it's a really great habit to get in to.
  // @see https://helmetjs.github.io/docs/csp/
  const cspConfig = {
    directives: {
      // The default-src is the default policy for loading content such as
      // JavaScript, Images, CSS, Fonts, AJAX requests, Frames, HTML5 Media.
      // As you might suspect, is used as fallback for unspecified directives.
      defaultSrc: ["'self'"],

      // Defines valid sources of JavaScript.
      scriptSrc: [
        "'self'",
        "'unsafe-eval'",
        'cdn.ravenjs.com',
        'cdn.polyfill.io',

        // Note: We will execution of any inline scripts that have the following
        // nonce identifier attached to them.
        // This is useful for guarding your application whilst allowing an inline
        // script to do data store rehydration (redux/mobx/apollo) for example.
        // @see https://helmetjs.github.io/docs/csp/
        (request, response) => `'nonce-${response.locals.nonce}'`,
      ],

      // Defines the origins from which images can be loaded.
      // @note: Leave open to all images, too much image coming from different servers.
      imgSrc: ['https:', 'http:', "'self'", 'data:', 'blob:'],

      // Defines valid sources of stylesheets.
      styleSrc: ["'self'", "'unsafe-inline'"],

      // Applies to XMLHttpRequest (AJAX), WebSocket or EventSource.
      // If not allowed the browser emulates a 400 HTTP status code.
      connectSrc: ['https:', 'wss:'],

      // lists the URLs for workers and embedded frame contents.
      // For example: child-src https://youtube.com would enable
      // embedding videos from YouTube but not from other origins.
      // @note: we allow users to embed any page they want.
      childSrc: ['https:', 'http:'],

      // allows control over Flash and other plugins.
      objectSrc: ["'none'"],

      // restricts the origins allowed to deliver video and audio.
      mediaSrc: ["'none'"],
    },

    // Set to true if you only want browsers to report errors, not block them.
    reportOnly:
      process.env.NODE_ENV === 'development' || process.env.FORCE_DEV || false,
    // Necessary because of Vercel CDN usage
    browserSniff: false,
  };

  if (enableCSP) {
    server.use(helmet.contentSecurityPolicy(cspConfig));
  }
}

module.exports = securityMiddleware;