// @flow const hpp = require('hpp'); const helmet = require('helmet'); const uuid = require('uuid'); const hsts = require('hsts'); const express_enforces_ssl = require('express-enforces-ssl'); const IS_PROD = process.env.NODE_ENV === 'production' && !process.env.FORCE_DEV; function securityMiddleware( server: express$Application, { enableNonce, enableCSP }: { enableNonce: boolean, enableCSP: boolean } ) { // Don't expose any software information to hackers. server.disable('x-powered-by'); // Prevent HTTP Parameter pollution. server.use(hpp()); if (IS_PROD) { server.use( hsts({ // 5 mins in seconds // we will scale this up incrementally to ensure we dont break the // app for end users // see deployment recommendations here https://hstspreload.org/?domain=spectrum.chat maxAge: 300, includeSubDomains: true, preload: true, }) ); server.use(express_enforces_ssl()); } // The xssFilter middleware sets the X-XSS-Protection header to prevent // reflected XSS attacks. // @see https://helmetjs.github.io/docs/xss-filter/ server.use(helmet.xssFilter()); // Frameguard mitigates clickjacking attacks by setting the X-Frame-Options header. // @see https://helmetjs.github.io/docs/frameguard/ server.use(helmet.frameguard('deny')); // Sets the X-Download-Options to prevent Internet Explorer from executing // downloads in your site’s context. // @see https://helmetjs.github.io/docs/ienoopen/ server.use(helmet.ieNoOpen()); // Don’t Sniff Mimetype middleware, noSniff, helps prevent browsers from trying // to guess (“sniff”) the MIME type, which can have security implications. It // does this by setting the X-Content-Type-Options header to nosniff. // @see https://helmetjs.github.io/docs/dont-sniff-mimetype/ server.use(helmet.noSniff()); if (enableNonce) { // Attach a unique "nonce" to every response. This allows use to declare // inline scripts as being safe for execution against our content security policy. // @see https://helmetjs.github.io/docs/csp/ server.use( ( request: express$Request, response: express$Response, next: express$NextFunction ) => { response.locals.nonce = uuid.v4(); next(); } ); } // Content Security Policy (CSP) // It can be a pain to manage these, but it's a really great habit to get in to. // @see https://helmetjs.github.io/docs/csp/ const cspConfig = { directives: { // The default-src is the default policy for loading content such as // JavaScript, Images, CSS, Fonts, AJAX requests, Frames, HTML5 Media. // As you might suspect, is used as fallback for unspecified directives. defaultSrc: ["'self'"], // Defines valid sources of JavaScript. scriptSrc: [ "'self'", "'unsafe-eval'", 'cdn.ravenjs.com', 'cdn.polyfill.io', // Note: We will execution of any inline scripts that have the following // nonce identifier attached to them. // This is useful for guarding your application whilst allowing an inline // script to do data store rehydration (redux/mobx/apollo) for example. // @see https://helmetjs.github.io/docs/csp/ (request, response) => `'nonce-${response.locals.nonce}'`, ], // Defines the origins from which images can be loaded. // @note: Leave open to all images, too much image coming from different servers. imgSrc: ['https:', 'http:', "'self'", 'data:', 'blob:'], // Defines valid sources of stylesheets. styleSrc: ["'self'", "'unsafe-inline'"], // Applies to XMLHttpRequest (AJAX), WebSocket or EventSource. // If not allowed the browser emulates a 400 HTTP status code. connectSrc: ['https:', 'wss:'], // lists the URLs for workers and embedded frame contents. // For example: child-src https://youtube.com would enable // embedding videos from YouTube but not from other origins. // @note: we allow users to embed any page they want. childSrc: ['https:', 'http:'], // allows control over Flash and other plugins. objectSrc: ["'none'"], // restricts the origins allowed to deliver video and audio. mediaSrc: ["'none'"], }, // Set to true if you only want browsers to report errors, not block them. reportOnly: process.env.NODE_ENV === 'development' || process.env.FORCE_DEV || false, // Necessary because of Vercel CDN usage browserSniff: false, }; if (enableCSP) { server.use(helmet.contentSecurityPolicy(cspConfig)); } } module.exports = securityMiddleware;