mirror of
https://github.com/kataras/iris.git
synced 2025-01-23 18:51:03 +01:00
404 lines
12 KiB
Go
404 lines
12 KiB
Go
|
// Cors credits goes to @rs
|
||
|
|
||
|
package cors
|
||
|
|
||
|
import (
|
||
|
"log"
|
||
|
"net/http"
|
||
|
"os"
|
||
|
"strconv"
|
||
|
"strings"
|
||
|
|
||
|
"github.com/kataras/iris"
|
||
|
)
|
||
|
|
||
|
const toLower = 'a' - 'A'
|
||
|
|
||
|
type converter func(string) string
|
||
|
|
||
|
type wildcard struct {
|
||
|
prefix string
|
||
|
suffix string
|
||
|
}
|
||
|
|
||
|
func (w wildcard) match(s string) bool {
|
||
|
return len(s) >= len(w.prefix+w.suffix) && strings.HasPrefix(s, w.prefix) && strings.HasSuffix(s, w.suffix)
|
||
|
}
|
||
|
|
||
|
// convert converts a list of string using the passed converter function
|
||
|
func convert(s []string, c converter) []string {
|
||
|
out := []string{}
|
||
|
for _, i := range s {
|
||
|
out = append(out, c(i))
|
||
|
}
|
||
|
return out
|
||
|
}
|
||
|
|
||
|
// parseHeaderList tokenize + normalize a string containing a list of headers
|
||
|
func parseHeaderList(headerList string) []string {
|
||
|
l := len(headerList)
|
||
|
h := make([]byte, 0, l)
|
||
|
upper := true
|
||
|
// Estimate the number headers in order to allocate the right splice size
|
||
|
t := 0
|
||
|
for i := 0; i < l; i++ {
|
||
|
if headerList[i] == ',' {
|
||
|
t++
|
||
|
}
|
||
|
}
|
||
|
headers := make([]string, 0, t)
|
||
|
for i := 0; i < l; i++ {
|
||
|
b := headerList[i]
|
||
|
if b >= 'a' && b <= 'z' {
|
||
|
if upper {
|
||
|
h = append(h, b-toLower)
|
||
|
} else {
|
||
|
h = append(h, b)
|
||
|
}
|
||
|
} else if b >= 'A' && b <= 'Z' {
|
||
|
if !upper {
|
||
|
h = append(h, b+toLower)
|
||
|
} else {
|
||
|
h = append(h, b)
|
||
|
}
|
||
|
} else if b == '-' || b == '_' || (b >= '0' && b <= '9') {
|
||
|
h = append(h, b)
|
||
|
}
|
||
|
|
||
|
if b == ' ' || b == ',' || i == l-1 {
|
||
|
if len(h) > 0 {
|
||
|
// Flush the found header
|
||
|
headers = append(headers, string(h))
|
||
|
h = h[:0]
|
||
|
upper = true
|
||
|
}
|
||
|
} else {
|
||
|
upper = b == '-' || b == '_'
|
||
|
}
|
||
|
}
|
||
|
return headers
|
||
|
}
|
||
|
|
||
|
// Options is a configuration container to setup the CORS middleware.
|
||
|
type Options struct {
|
||
|
// AllowedOrigins is a list of origins a cross-domain request can be executed from.
|
||
|
// If the special "*" value is present in the list, all origins will be allowed.
|
||
|
// An origin may contain a wildcard (*) to replace 0 or more characters
|
||
|
// (i.e.: http://*.domain.com). Usage of wildcards implies a small performance penality.
|
||
|
// Only one wildcard can be used per origin.
|
||
|
// Default value is ["*"]
|
||
|
AllowedOrigins []string
|
||
|
// AllowOriginFunc is a custom function to validate the origin. It take the origin
|
||
|
// as argument and returns true if allowed or false otherwise. If this option is
|
||
|
// set, the content of AllowedOrigins is ignored.
|
||
|
AllowOriginFunc func(origin string) bool
|
||
|
// AllowedMethods is a list of methods the client is allowed to use with
|
||
|
// cross-domain requests. Default value is simple methods (GET and POST)
|
||
|
AllowedMethods []string
|
||
|
// AllowedHeaders is list of non simple headers the client is allowed to use with
|
||
|
// cross-domain requests.
|
||
|
// If the special "*" value is present in the list, all headers will be allowed.
|
||
|
// Default value is [] but "Origin" is always appended to the list.
|
||
|
AllowedHeaders []string
|
||
|
// ExposedHeaders indicates which headers are safe to expose to the API of a CORS
|
||
|
// API specification
|
||
|
ExposedHeaders []string
|
||
|
// AllowCredentials indicates whether the request can include user credentials like
|
||
|
// cookies, HTTP authentication or client side SSL certificates.
|
||
|
AllowCredentials bool
|
||
|
// MaxAge indicates how long (in seconds) the results of a preflight request
|
||
|
// can be cached
|
||
|
MaxAge int
|
||
|
// OptionsPassthrough instructs preflight to let other potential next handlers to
|
||
|
// process the OPTIONS method. Turn this on if your application handles OPTIONS.
|
||
|
OptionsPassthrough bool
|
||
|
// Debugging flag adds additional output to debug server side CORS issues
|
||
|
Debug bool
|
||
|
}
|
||
|
|
||
|
// Cors http handler
|
||
|
type Cors struct {
|
||
|
// Debug logger
|
||
|
Log *log.Logger
|
||
|
// Set to true when allowed origins contains a "*"
|
||
|
allowedOriginsAll bool
|
||
|
// Normalized list of plain allowed origins
|
||
|
allowedOrigins []string
|
||
|
// List of allowed origins containing wildcards
|
||
|
allowedWOrigins []wildcard
|
||
|
// Optional origin validator function
|
||
|
allowOriginFunc func(origin string) bool
|
||
|
// Set to true when allowed headers contains a "*"
|
||
|
allowedHeadersAll bool
|
||
|
// Normalized list of allowed headers
|
||
|
allowedHeaders []string
|
||
|
// Normalized list of allowed methods
|
||
|
allowedMethods []string
|
||
|
// Normalized list of exposed headers
|
||
|
exposedHeaders []string
|
||
|
allowCredentials bool
|
||
|
maxAge int
|
||
|
optionPassthrough bool
|
||
|
}
|
||
|
|
||
|
// New creates a new Cors handler with the provided options.
|
||
|
func New(options Options) *Cors {
|
||
|
c := &Cors{
|
||
|
exposedHeaders: convert(options.ExposedHeaders, http.CanonicalHeaderKey),
|
||
|
allowOriginFunc: options.AllowOriginFunc,
|
||
|
allowCredentials: options.AllowCredentials,
|
||
|
maxAge: options.MaxAge,
|
||
|
optionPassthrough: options.OptionsPassthrough,
|
||
|
}
|
||
|
if options.Debug {
|
||
|
c.Log = log.New(os.Stdout, "[cors] ", log.LstdFlags)
|
||
|
}
|
||
|
|
||
|
// Normalize options
|
||
|
// Note: for origins and methods matching, the spec requires a case-sensitive matching.
|
||
|
// As it may error prone, we chose to ignore the spec here.
|
||
|
|
||
|
// Allowed Origins
|
||
|
if len(options.AllowedOrigins) == 0 {
|
||
|
// Default is all origins
|
||
|
c.allowedOriginsAll = true
|
||
|
} else {
|
||
|
c.allowedOrigins = []string{}
|
||
|
c.allowedWOrigins = []wildcard{}
|
||
|
for _, origin := range options.AllowedOrigins {
|
||
|
// Normalize
|
||
|
origin = strings.ToLower(origin)
|
||
|
if origin == "*" {
|
||
|
// If "*" is present in the list, turn the whole list into a match all
|
||
|
c.allowedOriginsAll = true
|
||
|
c.allowedOrigins = nil
|
||
|
c.allowedWOrigins = nil
|
||
|
break
|
||
|
} else if i := strings.IndexByte(origin, '*'); i >= 0 {
|
||
|
// Split the origin in two: start and end string without the *
|
||
|
w := wildcard{origin[0:i], origin[i+1 : len(origin)]}
|
||
|
c.allowedWOrigins = append(c.allowedWOrigins, w)
|
||
|
} else {
|
||
|
c.allowedOrigins = append(c.allowedOrigins, origin)
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// Allowed Headers
|
||
|
if len(options.AllowedHeaders) == 0 {
|
||
|
// Use sensible defaults
|
||
|
c.allowedHeaders = []string{"Origin", "Accept", "Content-Type"}
|
||
|
} else {
|
||
|
// Origin is always appended as some browsers will always request for this header at preflight
|
||
|
c.allowedHeaders = convert(append(options.AllowedHeaders, "Origin"), http.CanonicalHeaderKey)
|
||
|
for _, h := range options.AllowedHeaders {
|
||
|
if h == "*" {
|
||
|
c.allowedHeadersAll = true
|
||
|
c.allowedHeaders = nil
|
||
|
break
|
||
|
}
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// Allowed Methods
|
||
|
if len(options.AllowedMethods) == 0 {
|
||
|
// Default is spec's "simple" methods
|
||
|
c.allowedMethods = []string{"GET", "POST"}
|
||
|
} else {
|
||
|
c.allowedMethods = convert(options.AllowedMethods, strings.ToUpper)
|
||
|
}
|
||
|
|
||
|
return c
|
||
|
}
|
||
|
|
||
|
// Default creates a new Cors handler with default options
|
||
|
func Default() *Cors {
|
||
|
return New(Options{})
|
||
|
}
|
||
|
|
||
|
// DefaultCors creates a new Cors handler with default options
|
||
|
func DefaultCors() *Cors {
|
||
|
return Default()
|
||
|
}
|
||
|
|
||
|
func (c *Cors) Conflicts() string {
|
||
|
return "httpmethod"
|
||
|
}
|
||
|
|
||
|
func (c *Cors) Serve(ctx *iris.Context) {
|
||
|
if ctx.MethodString() == "OPTIONS" {
|
||
|
c.logf("Serve: Preflight request")
|
||
|
c.handlePreflight(ctx)
|
||
|
// Preflight requests are standalone and should stop the chain as some other
|
||
|
// middleware may not handle OPTIONS requests correctly. One typical example
|
||
|
// is authentication middleware ; OPTIONS requests won't carry authentication
|
||
|
// headers (see #1)
|
||
|
if c.optionPassthrough {
|
||
|
ctx.Next()
|
||
|
}
|
||
|
} else {
|
||
|
c.logf("Serve: Actual request")
|
||
|
c.handleActualRequest(ctx)
|
||
|
ctx.Next()
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// handlePreflight handles pre-flight CORS requests
|
||
|
func (c *Cors) handlePreflight(ctx *iris.Context) {
|
||
|
origin := ctx.RequestHeader("Origin")
|
||
|
|
||
|
if ctx.MethodString() != "OPTIONS" {
|
||
|
c.logf(" Preflight aborted: %s!=OPTIONS", ctx.MethodString())
|
||
|
return
|
||
|
}
|
||
|
// Always set Vary headers
|
||
|
ctx.Response.Header.Add("Vary", "Origin")
|
||
|
ctx.Response.Header.Add("Vary", "Access-Control-Request-Method")
|
||
|
ctx.Response.Header.Add("Vary", "Access-Control-Request-Headers")
|
||
|
|
||
|
if origin == "" {
|
||
|
c.logf(" Preflight aborted: empty origin")
|
||
|
return
|
||
|
}
|
||
|
if !c.isOriginAllowed(origin) {
|
||
|
c.logf(" Preflight aborted: origin '%s' not allowed", origin)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
reqMethod := ctx.RequestHeader("Access-Control-Request-Method")
|
||
|
if !c.isMethodAllowed(reqMethod) {
|
||
|
c.logf(" Preflight aborted: method '%s' not allowed", reqMethod)
|
||
|
return
|
||
|
}
|
||
|
reqHeaders := parseHeaderList(ctx.RequestHeader("Access-Control-Request-Headers"))
|
||
|
if !c.areHeadersAllowed(reqHeaders) {
|
||
|
c.logf(" Preflight aborted: headers '%v' not allowed", reqHeaders)
|
||
|
return
|
||
|
}
|
||
|
ctx.Response.Header.Set("Access-Control-Allow-Origin", origin)
|
||
|
// Spec says: Since the list of methods can be unbounded, simply returning the method indicated
|
||
|
// by Access-Control-Request-Method (if supported) can be enough
|
||
|
ctx.Response.Header.Set("Access-Control-Allow-Methods", strings.ToUpper(reqMethod))
|
||
|
if len(reqHeaders) > 0 {
|
||
|
|
||
|
// Spec says: Since the list of headers can be unbounded, simply returning supported headers
|
||
|
// from Access-Control-Request-Headers can be enough
|
||
|
ctx.Response.Header.Set("Access-Control-Allow-Headers", strings.Join(reqHeaders, ", "))
|
||
|
}
|
||
|
if c.allowCredentials {
|
||
|
ctx.Response.Header.Set("Access-Control-Allow-Credentials", "true")
|
||
|
}
|
||
|
if c.maxAge > 0 {
|
||
|
ctx.Response.Header.Set("Access-Control-Max-Age", strconv.Itoa(c.maxAge))
|
||
|
}
|
||
|
c.logf(" Preflight response headers: %v", ctx.Response.Header)
|
||
|
}
|
||
|
|
||
|
// handleActualRequest handles simple cross-origin requests, actual request or redirects
|
||
|
func (c *Cors) handleActualRequest(ctx *iris.Context) {
|
||
|
origin := ctx.RequestHeader("Origin")
|
||
|
|
||
|
if ctx.MethodString() == "OPTIONS" {
|
||
|
c.logf(" Actual request no headers added: method == %s", ctx.MethodString())
|
||
|
return
|
||
|
}
|
||
|
|
||
|
ctx.Response.Header.Add("Vary", "Origin")
|
||
|
if origin == "" {
|
||
|
c.logf(" Actual request no headers added: missing origin")
|
||
|
return
|
||
|
}
|
||
|
if !c.isOriginAllowed(origin) {
|
||
|
c.logf(" Actual request no headers added: origin '%s' not allowed", origin)
|
||
|
return
|
||
|
}
|
||
|
|
||
|
// Note that spec does define a way to specifically disallow a simple method like GET or
|
||
|
// POST. Access-Control-Allow-Methods is only used for pre-flight requests and the
|
||
|
// spec doesn't instruct to check the allowed methods for simple cross-origin requests.
|
||
|
// We think it's a nice feature to be able to have control on those methods though.
|
||
|
if !c.isMethodAllowed(ctx.MethodString()) {
|
||
|
c.logf(" Actual request no headers added: method '%s' not allowed", ctx.MethodString())
|
||
|
return
|
||
|
}
|
||
|
ctx.Response.Header.Set("Access-Control-Allow-Origin", origin)
|
||
|
if len(c.exposedHeaders) > 0 {
|
||
|
ctx.Response.Header.Set("Access-Control-Expose-Headers", strings.Join(c.exposedHeaders, ", "))
|
||
|
}
|
||
|
if c.allowCredentials {
|
||
|
ctx.Response.Header.Set("Access-Control-Allow-Credentials", "true")
|
||
|
}
|
||
|
c.logf(" Actual response added headers: %v", ctx.Response.Header)
|
||
|
}
|
||
|
|
||
|
// convenience method. checks if debugging is turned on before printing
|
||
|
func (c *Cors) logf(format string, a ...interface{}) {
|
||
|
if c.Log != nil {
|
||
|
c.Log.Printf(format, a...)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// isOriginAllowed checks if a given origin is allowed to perform cross-domain requests
|
||
|
// on the endpoint
|
||
|
func (c *Cors) isOriginAllowed(origin string) bool {
|
||
|
if c.allowOriginFunc != nil {
|
||
|
return c.allowOriginFunc(origin)
|
||
|
}
|
||
|
if c.allowedOriginsAll {
|
||
|
return true
|
||
|
}
|
||
|
origin = strings.ToLower(origin)
|
||
|
for _, o := range c.allowedOrigins {
|
||
|
if o == origin {
|
||
|
return true
|
||
|
}
|
||
|
}
|
||
|
for _, w := range c.allowedWOrigins {
|
||
|
if w.match(origin) {
|
||
|
return true
|
||
|
}
|
||
|
}
|
||
|
return false
|
||
|
}
|
||
|
|
||
|
// isMethodAllowed checks if a given method can be used as part of a cross-domain request
|
||
|
// on the endpoing
|
||
|
func (c *Cors) isMethodAllowed(method string) bool {
|
||
|
if len(c.allowedMethods) == 0 {
|
||
|
// If no method allowed, always return false, even for preflight request
|
||
|
return false
|
||
|
}
|
||
|
method = strings.ToUpper(method)
|
||
|
if method == "OPTIONS" {
|
||
|
// Always allow preflight requests
|
||
|
return true
|
||
|
}
|
||
|
for _, m := range c.allowedMethods {
|
||
|
if m == method {
|
||
|
return true
|
||
|
}
|
||
|
}
|
||
|
return false
|
||
|
}
|
||
|
|
||
|
// areHeadersAllowed checks if a given list of headers are allowed to used within
|
||
|
// a cross-domain request.
|
||
|
func (c *Cors) areHeadersAllowed(requestedHeaders []string) bool {
|
||
|
if c.allowedHeadersAll || len(requestedHeaders) == 0 {
|
||
|
return true
|
||
|
}
|
||
|
for _, header := range requestedHeaders {
|
||
|
header = http.CanonicalHeaderKey(header)
|
||
|
found := false
|
||
|
for _, h := range c.allowedHeaders {
|
||
|
if h == header {
|
||
|
found = true
|
||
|
}
|
||
|
}
|
||
|
if !found {
|
||
|
return false
|
||
|
}
|
||
|
}
|
||
|
return true
|
||
|
}
|