mirror of https://github.com/minio/minio.git
fix: remove CORS credentials when wildcard origins are configured
This commit is contained in:
parent
e909be6380
commit
a6d2d89b12
|
|
@ -646,6 +646,51 @@ func registerAPIRouter(router *mux.Router) {
|
|||
apiRouter.MethodNotAllowedHandler = collectAPIStats("methodnotallowed", httpTraceAll(methodNotAllowedHandler("S3")))
|
||||
}
|
||||
|
||||
// corsCredentialsWrapper wraps http.ResponseWriter to post-process CORS headers
|
||||
type corsCredentialsWrapper struct {
|
||||
http.ResponseWriter
|
||||
headerWritten bool
|
||||
}
|
||||
|
||||
func (w *corsCredentialsWrapper) WriteHeader(code int) {
|
||||
if !w.headerWritten {
|
||||
w.fixCORSCredentialsViolation()
|
||||
w.headerWritten = true
|
||||
}
|
||||
w.ResponseWriter.WriteHeader(code)
|
||||
}
|
||||
|
||||
func (w *corsCredentialsWrapper) Write(b []byte) (int, error) {
|
||||
if !w.headerWritten {
|
||||
w.fixCORSCredentialsViolation()
|
||||
w.headerWritten = true
|
||||
}
|
||||
return w.ResponseWriter.Write(b)
|
||||
}
|
||||
|
||||
func hasWildcardConfig() bool {
|
||||
for _, o := range globalAPIConfig.getCorsAllowOrigins() {
|
||||
if o == "*" {
|
||||
return true
|
||||
}
|
||||
}
|
||||
return false
|
||||
}
|
||||
|
||||
func (w *corsCredentialsWrapper) fixCORSCredentialsViolation() {
|
||||
hdr := w.ResponseWriter.Header()
|
||||
|
||||
// Only run if CORS actually ran
|
||||
if hdr.Get("Access-Control-Allow-Origin") == "" {
|
||||
return
|
||||
}
|
||||
|
||||
// CORS spec compliance: never allow credentials with wildcard origins
|
||||
if hdr.Get("Access-Control-Allow-Origin") == "*" || hasWildcardConfig() {
|
||||
hdr.Del("Access-Control-Allow-Credentials")
|
||||
}
|
||||
}
|
||||
|
||||
// corsHandler handler for CORS (Cross Origin Resource Sharing)
|
||||
func corsHandler(handler http.Handler) http.Handler {
|
||||
commonS3Headers := []string{
|
||||
|
|
@ -691,5 +736,12 @@ func corsHandler(handler http.Handler) http.Handler {
|
|||
ExposedHeaders: commonS3Headers,
|
||||
AllowCredentials: true,
|
||||
}
|
||||
return cors.New(opts).Handler(handler)
|
||||
|
||||
corsMiddleware := cors.New(opts)
|
||||
|
||||
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
// Wrap response writer to post-process CORS headers
|
||||
wrapper := &corsCredentialsWrapper{ResponseWriter: w}
|
||||
corsMiddleware.Handler(handler).ServeHTTP(wrapper, r)
|
||||
})
|
||||
}
|
||||
|
|
|
|||
|
|
@ -0,0 +1,227 @@
|
|||
// Copyright (c) 2015-2021 MinIO, Inc.
|
||||
//
|
||||
// This file is part of MinIO Object Storage stack
|
||||
//
|
||||
// This program is free software: you can redistribute it and/or modify
|
||||
// it under the terms of the GNU Affero General Public License as published by
|
||||
// the Free Software Foundation, either version 3 of the License, or
|
||||
// (at your option) any later version.
|
||||
//
|
||||
// This program is distributed in the hope that it will be useful
|
||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
// GNU Affero General Public License for more details.
|
||||
//
|
||||
// You should have received a copy of the GNU Affero General Public License
|
||||
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
package cmd
|
||||
|
||||
import (
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"testing"
|
||||
)
|
||||
|
||||
// Test that CORS credentials are properly handled for wildcard origins
|
||||
func TestCORSCredentialsWithWildcard(t *testing.T) {
|
||||
// Save original config and restore after test
|
||||
originalOrigins := globalAPIConfig.getCorsAllowOrigins()
|
||||
defer func() {
|
||||
globalAPIConfig.mu.Lock()
|
||||
globalAPIConfig.corsAllowOrigins = originalOrigins
|
||||
globalAPIConfig.mu.Unlock()
|
||||
}()
|
||||
|
||||
// Setup wildcard CORS config
|
||||
globalAPIConfig.mu.Lock()
|
||||
globalAPIConfig.corsAllowOrigins = []string{"*"}
|
||||
globalAPIConfig.mu.Unlock()
|
||||
|
||||
// Create a simple handler
|
||||
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
})
|
||||
|
||||
// Wrap with CORS handler
|
||||
corsWrappedHandler := corsHandler(handler)
|
||||
|
||||
// Test preflight request
|
||||
req := httptest.NewRequest("OPTIONS", "/", nil)
|
||||
req.Header.Set("Origin", "https://example.com")
|
||||
req.Header.Set("Access-Control-Request-Method", "GET")
|
||||
|
||||
rr := httptest.NewRecorder()
|
||||
corsWrappedHandler.ServeHTTP(rr, req)
|
||||
|
||||
// Verify specific origin is echoed back (rs/cors library behavior)
|
||||
if got := rr.Header().Get("Access-Control-Allow-Origin"); got != "https://example.com" {
|
||||
t.Errorf("Expected Access-Control-Allow-Origin: https://example.com, got: %s", got)
|
||||
}
|
||||
|
||||
// Verify credentials header is NOT present (security fix)
|
||||
if got := rr.Header().Get("Access-Control-Allow-Credentials"); got != "" {
|
||||
t.Errorf("Expected no Access-Control-Allow-Credentials header with wildcard origin, got: %s", got)
|
||||
}
|
||||
|
||||
// Test actual GET request
|
||||
req = httptest.NewRequest("GET", "/", nil)
|
||||
req.Header.Set("Origin", "https://example.com")
|
||||
|
||||
rr = httptest.NewRecorder()
|
||||
corsWrappedHandler.ServeHTTP(rr, req)
|
||||
|
||||
// Verify specific origin is echoed back (rs/cors library behavior)
|
||||
if got := rr.Header().Get("Access-Control-Allow-Origin"); got != "https://example.com" {
|
||||
t.Errorf("Expected Access-Control-Allow-Origin: https://example.com, got: %s", got)
|
||||
}
|
||||
|
||||
// Verify credentials header is NOT present
|
||||
if got := rr.Header().Get("Access-Control-Allow-Credentials"); got != "" {
|
||||
t.Errorf("Expected no Access-Control-Allow-Credentials header with wildcard origin, got: %s", got)
|
||||
}
|
||||
}
|
||||
|
||||
// Test that CORS credentials are allowed for specific origins
|
||||
func TestCORSCredentialsWithSpecificOrigin(t *testing.T) {
|
||||
// Save original config and restore after test
|
||||
originalOrigins := globalAPIConfig.getCorsAllowOrigins()
|
||||
defer func() {
|
||||
globalAPIConfig.mu.Lock()
|
||||
globalAPIConfig.corsAllowOrigins = originalOrigins
|
||||
globalAPIConfig.mu.Unlock()
|
||||
}()
|
||||
|
||||
// Setup specific origin CORS config
|
||||
allowedOrigin := "https://myapp.com"
|
||||
globalAPIConfig.mu.Lock()
|
||||
globalAPIConfig.corsAllowOrigins = []string{allowedOrigin}
|
||||
globalAPIConfig.mu.Unlock()
|
||||
|
||||
// Create a simple handler
|
||||
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
})
|
||||
|
||||
// Wrap with CORS handler
|
||||
corsWrappedHandler := corsHandler(handler)
|
||||
|
||||
// Test preflight request
|
||||
req := httptest.NewRequest("OPTIONS", "/", nil)
|
||||
req.Header.Set("Origin", allowedOrigin)
|
||||
req.Header.Set("Access-Control-Request-Method", "GET")
|
||||
|
||||
rr := httptest.NewRecorder()
|
||||
corsWrappedHandler.ServeHTTP(rr, req)
|
||||
|
||||
// Verify specific origin is echoed back
|
||||
if got := rr.Header().Get("Access-Control-Allow-Origin"); got != allowedOrigin {
|
||||
t.Errorf("Expected Access-Control-Allow-Origin: %s, got: %s", allowedOrigin, got)
|
||||
}
|
||||
|
||||
// Verify credentials header IS present for specific origins
|
||||
if got := rr.Header().Get("Access-Control-Allow-Credentials"); got != "true" {
|
||||
t.Errorf("Expected Access-Control-Allow-Credentials: true with specific origin, got: %s", got)
|
||||
}
|
||||
|
||||
// Test actual GET request
|
||||
req = httptest.NewRequest("GET", "/", nil)
|
||||
req.Header.Set("Origin", allowedOrigin)
|
||||
|
||||
rr = httptest.NewRecorder()
|
||||
corsWrappedHandler.ServeHTTP(rr, req)
|
||||
|
||||
// Verify specific origin is echoed back
|
||||
if got := rr.Header().Get("Access-Control-Allow-Origin"); got != allowedOrigin {
|
||||
t.Errorf("Expected Access-Control-Allow-Origin: %s, got: %s", allowedOrigin, got)
|
||||
}
|
||||
|
||||
// Verify credentials header IS present
|
||||
if got := rr.Header().Get("Access-Control-Allow-Credentials"); got != "true" {
|
||||
t.Errorf("Expected Access-Control-Allow-Credentials: true with specific origin, got: %s", got)
|
||||
}
|
||||
}
|
||||
|
||||
// Test that unauthorized origins are rejected properly
|
||||
func TestCORSUnauthorizedOrigin(t *testing.T) {
|
||||
// Save original config and restore after test
|
||||
originalOrigins := globalAPIConfig.getCorsAllowOrigins()
|
||||
defer func() {
|
||||
globalAPIConfig.mu.Lock()
|
||||
globalAPIConfig.corsAllowOrigins = originalOrigins
|
||||
globalAPIConfig.mu.Unlock()
|
||||
}()
|
||||
|
||||
// Setup specific origin CORS config (no wildcard)
|
||||
allowedOrigin := "https://myapp.com"
|
||||
globalAPIConfig.mu.Lock()
|
||||
globalAPIConfig.corsAllowOrigins = []string{allowedOrigin}
|
||||
globalAPIConfig.mu.Unlock()
|
||||
|
||||
// Create a simple handler
|
||||
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
})
|
||||
|
||||
// Wrap with CORS handler
|
||||
corsWrappedHandler := corsHandler(handler)
|
||||
|
||||
// Test preflight request from unauthorized origin
|
||||
req := httptest.NewRequest("OPTIONS", "/", nil)
|
||||
req.Header.Set("Origin", "https://example.com")
|
||||
req.Header.Set("Access-Control-Request-Method", "GET")
|
||||
|
||||
rr := httptest.NewRecorder()
|
||||
corsWrappedHandler.ServeHTTP(rr, req)
|
||||
|
||||
// Verify no CORS headers are set for unauthorized origin
|
||||
if got := rr.Header().Get("Access-Control-Allow-Origin"); got != "" {
|
||||
t.Errorf("Expected no Access-Control-Allow-Origin header for unauthorized origin, got: %s", got)
|
||||
}
|
||||
|
||||
if got := rr.Header().Get("Access-Control-Allow-Credentials"); got != "" {
|
||||
t.Errorf("Expected no Access-Control-Allow-Credentials header for unauthorized origin, got: %s", got)
|
||||
}
|
||||
}
|
||||
|
||||
// Test mixed configuration with both wildcard and specific origins
|
||||
func TestCORSMixedConfiguration(t *testing.T) {
|
||||
// Save original config and restore after test
|
||||
originalOrigins := globalAPIConfig.getCorsAllowOrigins()
|
||||
defer func() {
|
||||
globalAPIConfig.mu.Lock()
|
||||
globalAPIConfig.corsAllowOrigins = originalOrigins
|
||||
globalAPIConfig.mu.Unlock()
|
||||
}()
|
||||
|
||||
// Setup mixed CORS config (wildcard + specific origins)
|
||||
globalAPIConfig.mu.Lock()
|
||||
globalAPIConfig.corsAllowOrigins = []string{"*", "https://e-corp.com"}
|
||||
globalAPIConfig.mu.Unlock()
|
||||
|
||||
// Create a simple handler
|
||||
handler := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
})
|
||||
|
||||
// Wrap with CORS handler
|
||||
corsWrappedHandler := corsHandler(handler)
|
||||
|
||||
// Test request that should match wildcard
|
||||
req := httptest.NewRequest("OPTIONS", "/", nil)
|
||||
req.Header.Set("Origin", "https://random-site.com")
|
||||
req.Header.Set("Access-Control-Request-Method", "GET")
|
||||
|
||||
rr := httptest.NewRecorder()
|
||||
corsWrappedHandler.ServeHTTP(rr, req)
|
||||
|
||||
// The rs/cors library echoes back the specific origin even with wildcard config
|
||||
if got := rr.Header().Get("Access-Control-Allow-Origin"); got != "https://random-site.com" {
|
||||
t.Errorf("Expected Access-Control-Allow-Origin: https://random-site.com, got: %s", got)
|
||||
}
|
||||
|
||||
// Verify credentials header is NOT present due to wildcard in config
|
||||
if got := rr.Header().Get("Access-Control-Allow-Credentials"); got != "" {
|
||||
t.Errorf("Expected no Access-Control-Allow-Credentials header with wildcard in config, got: %s", got)
|
||||
}
|
||||
}
|
||||
Loading…
Reference in New Issue