mirror of https://github.com/hashicorp/consul
explicitly add content-type anywhere possible and add middleware to set and warn
parent
8d2178d83d
commit
52f4b86c5c
|
@ -6,6 +6,7 @@ package agent
|
|||
import (
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"github.com/hashicorp/go-hclog"
|
||||
"io"
|
||||
"net"
|
||||
"net/http"
|
||||
|
@ -43,6 +44,13 @@ import (
|
|||
"github.com/hashicorp/consul/proto/private/pbcommon"
|
||||
)
|
||||
|
||||
const (
|
||||
contentTypeHeader = "Content-Type"
|
||||
plainContentType = "text/plain"
|
||||
htmlContentType = "text/html"
|
||||
jsonContentType = "application/json"
|
||||
)
|
||||
|
||||
var HTTPSummaries = []prometheus.SummaryDefinition{
|
||||
{
|
||||
Name: []string{"api", "http"},
|
||||
|
@ -220,6 +228,7 @@ func (s *HTTPHandlers) handler() http.Handler {
|
|||
// If enableDebug register wrapped pprof handlers
|
||||
if !s.agent.enableDebug.Load() && s.checkACLDisabled() {
|
||||
resp.WriteHeader(http.StatusNotFound)
|
||||
req.Header.Set(contentTypeHeader, plainContentType)
|
||||
return
|
||||
}
|
||||
|
||||
|
@ -228,6 +237,7 @@ func (s *HTTPHandlers) handler() http.Handler {
|
|||
|
||||
authz, err := s.agent.delegate.ResolveTokenAndDefaultMeta(token, nil, nil)
|
||||
if err != nil {
|
||||
req.Header.Set(contentTypeHeader, plainContentType)
|
||||
resp.WriteHeader(http.StatusForbidden)
|
||||
return
|
||||
}
|
||||
|
@ -238,6 +248,7 @@ func (s *HTTPHandlers) handler() http.Handler {
|
|||
// TODO(acl-error-enhancements): We should return error details somehow here.
|
||||
if authz.OperatorRead(nil) != acl.Allow {
|
||||
resp.WriteHeader(http.StatusForbidden)
|
||||
req.Header.Set(contentTypeHeader, plainContentType)
|
||||
return
|
||||
}
|
||||
|
||||
|
@ -317,6 +328,9 @@ func (s *HTTPHandlers) handler() http.Handler {
|
|||
}
|
||||
|
||||
h = withRemoteAddrHandler(h)
|
||||
|
||||
h = ensureContentTypeHeader(h, s.agent.logger)
|
||||
|
||||
s.h = &wrappedMux{
|
||||
mux: mux,
|
||||
handler: h,
|
||||
|
@ -337,6 +351,20 @@ func withRemoteAddrHandler(next http.Handler) http.Handler {
|
|||
})
|
||||
}
|
||||
|
||||
// Injects content type explicitly if not already set into request to prevent XSS
|
||||
func ensureContentTypeHeader(next http.Handler, logger hclog.Logger) http.Handler {
|
||||
|
||||
return http.HandlerFunc(func(resp http.ResponseWriter, req *http.Request) {
|
||||
val := req.Header.Get(contentTypeHeader)
|
||||
if val == "" {
|
||||
req.Header.Set(contentTypeHeader, plainContentType)
|
||||
logger.Debug("warning: content-type header not explicitly set.", "request-path", req.URL)
|
||||
|
||||
}
|
||||
next.ServeHTTP(resp, req)
|
||||
})
|
||||
}
|
||||
|
||||
// nodeName returns the node name of the agent
|
||||
func (s *HTTPHandlers) nodeName() string {
|
||||
return s.agent.config.NodeName
|
||||
|
@ -380,6 +408,8 @@ func (s *HTTPHandlers) wrap(handler endpoint, methods []string) http.HandlerFunc
|
|||
"from", req.RemoteAddr,
|
||||
"error", err,
|
||||
)
|
||||
//set response type to plain to prevent XSS
|
||||
resp.Header().Set(contentTypeHeader, plainContentType)
|
||||
resp.WriteHeader(http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
|
@ -406,6 +436,8 @@ func (s *HTTPHandlers) wrap(handler endpoint, methods []string) http.HandlerFunc
|
|||
"from", req.RemoteAddr,
|
||||
"error", errMsg,
|
||||
)
|
||||
//set response type to plain to prevent XSS
|
||||
resp.Header().Set(contentTypeHeader, plainContentType)
|
||||
resp.WriteHeader(http.StatusForbidden)
|
||||
fmt.Fprint(resp, errMsg)
|
||||
return
|
||||
|
@ -585,6 +617,8 @@ func (s *HTTPHandlers) wrap(handler endpoint, methods []string) http.HandlerFunc
|
|||
resp.Header().Add("X-Consul-Reason", errPayload.Reason)
|
||||
}
|
||||
} else {
|
||||
//set response type to plain to prevent XSS
|
||||
resp.Header().Set(contentTypeHeader, plainContentType)
|
||||
handleErr(err)
|
||||
return
|
||||
}
|
||||
|
@ -596,6 +630,8 @@ func (s *HTTPHandlers) wrap(handler endpoint, methods []string) http.HandlerFunc
|
|||
if contentType == "application/json" {
|
||||
buf, err = s.marshalJSON(req, obj)
|
||||
if err != nil {
|
||||
//set response type to plain to prevent XSS
|
||||
resp.Header().Set(contentTypeHeader, plainContentType)
|
||||
handleErr(err)
|
||||
return
|
||||
}
|
||||
|
@ -606,7 +642,7 @@ func (s *HTTPHandlers) wrap(handler endpoint, methods []string) http.HandlerFunc
|
|||
}
|
||||
}
|
||||
}
|
||||
resp.Header().Set("Content-Type", contentType)
|
||||
resp.Header().Set(contentTypeHeader, contentType)
|
||||
resp.WriteHeader(httpCode)
|
||||
resp.Write(buf)
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue