146 lines
4.6 KiB
JavaScript
146 lines
4.6 KiB
JavaScript
|
'use strict'
|
||
|
|
||
|
module.exports = {
|
||
|
/*
|
||
|
|--------------------------------------------------------------------------
|
||
|
| Content Security Policy
|
||
|
|--------------------------------------------------------------------------
|
||
|
|
|
||
|
| Content security policy filters out the origins not allowed to execute
|
||
|
| and load resources like scripts, styles and fonts. There are wide
|
||
|
| variety of options to choose from.
|
||
|
*/
|
||
|
csp: {
|
||
|
/*
|
||
|
|--------------------------------------------------------------------------
|
||
|
| Directives
|
||
|
|--------------------------------------------------------------------------
|
||
|
|
|
||
|
| All directives are defined in camelCase and here is the list of
|
||
|
| available directives and their possible values.
|
||
|
|
|
||
|
| https://content-security-policy.com
|
||
|
|
|
||
|
| @example
|
||
|
| directives: {
|
||
|
| defaultSrc: ['self', '@nonce', 'cdnjs.cloudflare.com']
|
||
|
| }
|
||
|
|
|
||
|
*/
|
||
|
directives: {
|
||
|
},
|
||
|
/*
|
||
|
|--------------------------------------------------------------------------
|
||
|
| Report only
|
||
|
|--------------------------------------------------------------------------
|
||
|
|
|
||
|
| Setting `reportOnly=true` will not block the scripts from running and
|
||
|
| instead report them to a URL.
|
||
|
|
|
||
|
*/
|
||
|
reportOnly: false,
|
||
|
/*
|
||
|
|--------------------------------------------------------------------------
|
||
|
| Set all headers
|
||
|
|--------------------------------------------------------------------------
|
||
|
|
|
||
|
| Headers staring with `X` have been depreciated, since all major browsers
|
||
|
| supports the standard CSP header. So its better to disable deperciated
|
||
|
| headers, unless you want them to be set.
|
||
|
|
|
||
|
*/
|
||
|
setAllHeaders: false,
|
||
|
|
||
|
/*
|
||
|
|--------------------------------------------------------------------------
|
||
|
| Disable on android
|
||
|
|--------------------------------------------------------------------------
|
||
|
|
|
||
|
| Certain versions of android are buggy with CSP policy. So you can set
|
||
|
| this value to true, to disable it for Android versions with buggy
|
||
|
| behavior.
|
||
|
|
|
||
|
| Here is an issue reported on a different package, but helpful to read
|
||
|
| if you want to know the behavior. https://github.com/helmetjs/helmet/pull/82
|
||
|
|
|
||
|
*/
|
||
|
disableAndroid: true
|
||
|
},
|
||
|
|
||
|
/*
|
||
|
|--------------------------------------------------------------------------
|
||
|
| X-XSS-Protection
|
||
|
|--------------------------------------------------------------------------
|
||
|
|
|
||
|
| X-XSS Protection saves applications from XSS attacks. It is adopted
|
||
|
| by IE and later followed by some other browsers.
|
||
|
|
|
||
|
| Learn more at https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection
|
||
|
|
|
||
|
*/
|
||
|
xss: {
|
||
|
enabled: true,
|
||
|
enableOnOldIE: false
|
||
|
},
|
||
|
|
||
|
/*
|
||
|
|--------------------------------------------------------------------------
|
||
|
| Iframe Options
|
||
|
|--------------------------------------------------------------------------
|
||
|
|
|
||
|
| xframe defines whether or not your website can be embedded inside an
|
||
|
| iframe. Choose from one of the following options.
|
||
|
| @available options
|
||
|
| DENY, SAMEORIGIN, ALLOW-FROM http://example.com
|
||
|
|
|
||
|
| Learn more at https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
|
||
|
*/
|
||
|
xframe: 'DENY',
|
||
|
|
||
|
/*
|
||
|
|--------------------------------------------------------------------------
|
||
|
| No Sniff
|
||
|
|--------------------------------------------------------------------------
|
||
|
|
|
||
|
| Browsers have a habit of sniffing content-type of a response. Which means
|
||
|
| files with .txt extension containing Javascript code will be executed as
|
||
|
| Javascript. You can disable this behavior by setting nosniff to false.
|
||
|
|
|
||
|
| Learn more at https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options
|
||
|
|
|
||
|
*/
|
||
|
nosniff: true,
|
||
|
|
||
|
/*
|
||
|
|--------------------------------------------------------------------------
|
||
|
| No Open
|
||
|
|--------------------------------------------------------------------------
|
||
|
|
|
||
|
| IE users can execute webpages in the context of your website, which is
|
||
|
| a serious security risk. Below option will manage this for you.
|
||
|
|
|
||
|
*/
|
||
|
noopen: true,
|
||
|
|
||
|
/*
|
||
|
|--------------------------------------------------------------------------
|
||
|
| CSRF Protection
|
||
|
|--------------------------------------------------------------------------
|
||
|
|
|
||
|
| CSRF Protection adds another layer of security by making sure, actionable
|
||
|
| routes does have a valid token to execute an action.
|
||
|
|
|
||
|
*/
|
||
|
csrf: {
|
||
|
enable: true,
|
||
|
methods: ['POST', 'PUT', 'DELETE'],
|
||
|
filterUris: [],
|
||
|
cookieOptions: {
|
||
|
httpOnly: false,
|
||
|
sameSite: true,
|
||
|
path: '/',
|
||
|
maxAge: 7200
|
||
|
}
|
||
|
}
|
||
|
}
|