Mitigate CSRF attacks (#206)
This commit is contained in:
committed by
GitHub
parent
97652be545
commit
031d2cb7e8
19
handler/middlewares.go
Normal file
19
handler/middlewares.go
Normal file
@@ -0,0 +1,19 @@
|
||||
package handler
|
||||
|
||||
import (
|
||||
"github.com/labstack/echo/v4"
|
||||
"net/http"
|
||||
)
|
||||
|
||||
// ContentTypeJson checks that the requests have the Content-Type header set to "application/json".
|
||||
// This helps against CSRF attacks.
|
||||
func ContentTypeJson(next echo.HandlerFunc) echo.HandlerFunc {
|
||||
return func(c echo.Context) error {
|
||||
contentType := c.Request().Header.Get("Content-Type")
|
||||
if contentType != "application/json" {
|
||||
return c.JSON(http.StatusBadRequest, jsonHTTPResponse{false, "Only JSON allowed"})
|
||||
}
|
||||
|
||||
return next(c)
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user