Helmet
Helmet middleware helps secure your apps by setting various HTTP headers.
Signatures
func New(config ...Config) fiber.Handler
Examples
package main
import (
"github.com/gofiber/fiber/v2"
"github.com/gofiber/fiber/v2/middleware/helmet"
)
func main() {
app := fiber.New()
app.Use(helmet.New())
app.Get("/", func(c *fiber.Ctx) error {
return c.SendString("Welcome!")
})
app.Listen(":3000")
}
Test:
curl -I http://localhost:3000
Config
Property | Type | Description | Default |
---|---|---|---|
Next | func(*fiber.Ctx) bool | Next defines a function to skip middleware. | nil |
XSSProtection | string | XSSProtection | "0" |
ContentTypeNosniff | string | ContentTypeNosniff | "nosniff" |
XFrameOptions | string | XFrameOptions | "SAMEORIGIN" |
HSTSMaxAge | int | HSTSMaxAge | 0 |
HSTSExcludeSubdomains | bool | HSTSExcludeSubdomains | false |
ContentSecurityPolicy | string | ContentSecurityPolicy | "" |
CSPReportOnly | bool | CSPReportOnly | false |
HSTSPreloadEnabled | bool | HSTSPreloadEnabled | false |
ReferrerPolicy | string | ReferrerPolicy | "ReferrerPolicy" |
PermissionPolicy | string | Permissions-Policy | "" |
CrossOriginEmbedderPolicy | string | Cross-Origin-Embedder-Policy | "require-corp" |
CrossOriginOpenerPolicy | string | Cross-Origin-Opener-Policy | "same-origin" |
CrossOriginResourcePolicy | string | Cross-Origin-Resource-Policy | "same-origin" |
OriginAgentCluster | string | Origin-Agent-Cluster | "?1" |
XDNSPrefetchControl | string | X-DNS-Prefetch-Control | "off" |
XDownloadOptions | string | X-Download-Options | "noopen" |
XPermittedCrossDomain | string | X-Permitted-Cross-Domain-Policies | "none" |
Default Config
var ConfigDefault = Config{
XSSProtection: "0",
ContentTypeNosniff: "nosniff",
XFrameOptions: "SAMEORIGIN",
ReferrerPolicy: "no-referrer",
CrossOriginEmbedderPolicy: "require-corp",
CrossOriginOpenerPolicy: "same-origin",
CrossOriginResourcePolicy: "same-origin",
OriginAgentCluster: "?1",
XDNSPrefetchControl: "off",
XDownloadOptions: "noopen",
XPermittedCrossDomain: "none",
}