import { NextResponse } from 'next/server' const referrerRegex = /(\/.*)?\/r\/([\w_]+)/ function referrerMiddleware (request) { const m = referrerRegex.exec(request.nextUrl.pathname) const url = new URL(m[1] || '/', request.url) url.search = request.nextUrl.search url.hash = request.nextUrl.hash const resp = NextResponse.redirect(url) resp.cookies.set('sn_referrer', m[2]) return resp } export function middleware (request) { let resp = NextResponse.next() if (referrerRegex.test(request.nextUrl.pathname)) { resp = referrerMiddleware(request) } const isDev = process.env.NODE_ENV === 'development' const nonce = Buffer.from(crypto.randomUUID()).toString('base64') // we want to load media from other localhost ports during development const devSrc = isDev ? ' localhost:* http: ws:' : '' // unsafe-eval is required during development due to react-refresh.js // see https://github.com/vercel/next.js/issues/14221 const devScriptSrc = isDev ? " 'unsafe-eval'" : '' const cspHeader = [ // if something is not explicitly allowed, we don't allow it. "default-src 'none'", "font-src 'self' a.stacker.news", // we want to load images from everywhere but we can limit to HTTPS at least "img-src 'self' a.stacker.news m.stacker.news https: data: blob:" + devSrc, "media-src 'self' a.stacker.news m.stacker.news" + devSrc, // Using nonces and strict-dynamic deploys a strict CSP. // see https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html#strict-policy. // Old browsers will ignore nonce and strict-dynamic and fallback to host-based matching and unsafe-inline `script-src 'self' 'unsafe-inline' 'nonce-${nonce}' 'strict-dynamic' https:` + devScriptSrc, // unsafe-inline for styles is not ideal but okay if script-src is using nonces "style-src 'self' a.stacker.news 'unsafe-inline'", "manifest-src 'self'", 'frame-src www.youtube.com platform.twitter.com rumble.com', "connect-src 'self' https: wss:" + devSrc, // disable dangerous plugins like Flash "object-src 'none'", // blocks injection of tags "base-uri 'none'", // tell user agents to replace HTTP with HTTPS isDev ? '' : 'upgrade-insecure-requests', // prevents any domain from framing the content (defense against clickjacking attacks) "frame-ancestors 'none'" ].join('; ') resp.headers.set('Content-Security-Policy', cspHeader) // for browsers that don't support CSP resp.headers.set('X-Frame-Options', 'DENY') // more useful headers resp.headers.set('X-Content-Type-Options', 'nosniff') resp.headers.set('Referrer-Policy', 'origin-when-cross-origin') resp.headers.set('Strict-Transport-Security', 'max-age=31536000; includeSubDomains') return resp } export const config = { matcher: [ // NextJS recommends to not add the CSP header to prefetches and static assets // See https://nextjs.org/docs/app/building-your-application/configuring/content-security-policy { source: '/((?!api|_next/static|_error|404|500|offline|_next/image|_next/webpack-hmr|favicon.ico).*)', missing: [ { type: 'header', key: 'next-router-prefetch' }, { type: 'header', key: 'purpose', value: 'prefetch' } ] } ] }