-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmiddleware.ts
62 lines (56 loc) · 1.69 KB
/
middleware.ts
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
import { NextRequest, NextResponse } from "next/server";
import { dev } from "./constants";
export function middleware(request: NextRequest) {
const nonce = Buffer.from(crypto.randomUUID()).toString("base64");
const cspHeader = `
default-src 'self';
script-src 'self' ${
dev ? "'unsafe-eval'" : "'strict-dynamic'"
} 'nonce-${nonce}';
style-src 'self' '${dev ? "unsafe-inline" : "nonce-${nonce}"}' ;
img-src 'self' blob: data: https:;
font-src 'self';
object-src 'none';
base-uri 'self';
form-action 'self';
frame-ancestors 'none';
block-all-mixed-content;
${dev ? "" : "upgrade-insecure-requests"};
`;
const hostname = request.headers.get("host")!;
const { pathname } = request.nextUrl;
request.headers.set("x-pathname", pathname);
// share nonce with the downstream code
request.headers.set("x-nonce", nonce);
const resp = NextResponse.rewrite(
new URL(`/${hostname}${pathname}`, request.url),
);
// resp.headers.delete('x-pathname');
// add CSP header if not already present
if (!resp.headers.has("Content-Security-Policy")) {
resp.headers.set(
"Content-Security-Policy",
// Replace newline characters and spaces
cspHeader.replace(/\s{2,}/g, " ").trim(),
);
}
return resp;
}
export const config = {
matcher: [
/*
* Match all request paths except for the ones starting with:
* - api (API routes)
* - _next/static (static files)
* - _next/image (image optimization files)
* - favicon.ico (favicon file)
*/
{
source: "/((?!api|_next/static|_next/image|favicon.ico).*)",
missing: [
{ type: "header", key: "next-router-prefetch" },
{ type: "header", key: "purpose", value: "prefetch" },
],
},
],
};