mirror of https://github.com/abpframework/abp
parent
88bef292fe
commit
32d7219580
@ -1,37 +1,30 @@
|
||||
using System.Collections.Generic;
|
||||
using System.Threading.Tasks;
|
||||
using Microsoft.AspNetCore.Http;
|
||||
using Microsoft.Extensions.Primitives;
|
||||
using Volo.Abp.DependencyInjection;
|
||||
|
||||
namespace Volo.Abp.AspNetCore.Security
|
||||
{
|
||||
public class AbpSecurityHeadersMiddleware
|
||||
public class AbpSecurityHeadersMiddleware : IMiddleware, ITransientDependency
|
||||
{
|
||||
private readonly RequestDelegate _next;
|
||||
|
||||
public AbpSecurityHeadersMiddleware(RequestDelegate next)
|
||||
{
|
||||
_next = next;
|
||||
}
|
||||
|
||||
public async Task Invoke(HttpContext httpContext)
|
||||
public async Task InvokeAsync(HttpContext context, RequestDelegate next)
|
||||
{
|
||||
/*X-Content-Type-Options header tells the browser to not try and “guess” what a mimetype of a resource might be, and to just take what mimetype the server has returned as fact.*/
|
||||
AddHeaderIfNotExists(httpContext, "X-Content-Type-Options", "nosniff");
|
||||
AddHeaderIfNotExists(context, "X-Content-Type-Options", "nosniff");
|
||||
|
||||
/*X-XSS-Protection is a feature of Internet Explorer, Chrome and Safari that stops pages from loading when they detect reflected cross-site scripting (XSS) attacks*/
|
||||
AddHeaderIfNotExists(httpContext, "X-XSS-Protection", "1; mode=block");
|
||||
AddHeaderIfNotExists(context, "X-XSS-Protection", "1; mode=block");
|
||||
|
||||
/*The X-Frame-Options HTTP response header can be used to indicate whether or not a browser should be allowed to render a page in a <frame>, <iframe> or <object>. SAMEORIGIN makes it being displayed in a frame on the same origin as the page itself. The spec leaves it up to browser vendors to decide whether this option applies to the top level, the parent, or the whole chain*/
|
||||
AddHeaderIfNotExists(httpContext, "X-Frame-Options", "SAMEORIGIN");
|
||||
AddHeaderIfNotExists(context, "X-Frame-Options", "SAMEORIGIN");
|
||||
|
||||
await _next.Invoke(httpContext);
|
||||
await next.Invoke(context);
|
||||
}
|
||||
|
||||
private static void AddHeaderIfNotExists(HttpContext context, string key, string value)
|
||||
protected virtual void AddHeaderIfNotExists(HttpContext context, string key, string value)
|
||||
{
|
||||
if (!context.Response.Headers.ContainsKey(key))
|
||||
{
|
||||
context.Response.Headers.Add(key, value);
|
||||
}
|
||||
context.Response.Headers.AddIfNotContains(new KeyValuePair<string, StringValues>(key, value));
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
Loading…
Reference in new issue