Commit graph

7 commits

Author SHA1 Message Date
senke
a1000ce7fb style(backend): gofmt -w on 85 files (whitespace only)
backend-ci.yml's `test -z "$(gofmt -l .)"` strict gate (added in
13c21ac11) failed on a backlog of unformatted files. None of the
85 files in this commit had been edited since the gate was added
because no push touched veza-backend-api/** in between, so the
gate never fired until today's CI fixes triggered it.

The diff is exclusively whitespace alignment in struct literals
and trailing-space comments. `go build ./...` and the full test
suite (with VEZA_SKIP_INTEGRATION=1 -short) pass identically.
2026-04-14 12:22:14 +02:00
senke
c0e2fe2e12 fix(v0.12.6.1): remediate remaining 15 MEDIUM + LOW pentest findings
MEDIUM-002: Remove manual X-Forwarded-For parsing in metrics_protection.go,
  use c.ClientIP() only (respects SetTrustedProxies)
MEDIUM-003: Pin ClamAV Docker image to 1.4 across all compose files
MEDIUM-004: Add clampLimit(100) to 15+ handlers that parsed limit directly
MEDIUM-006: Remove unsafe-eval from CSP script-src on Swagger routes
MEDIUM-007: Pin all GitHub Actions to SHA in 11 workflow files
MEDIUM-008: Replace rabbitmq:3-management-alpine with rabbitmq:3-alpine in prod
MEDIUM-009: Add trial-already-used check in subscription service
MEDIUM-010: Add 60s periodic token re-validation to WebSocket connections
MEDIUM-011: Mask email in auth handler logs with maskEmail() helper
MEDIUM-012: Add k-anonymity threshold (k=5) to playback analytics stats
LOW-001: Align frontend password policy to 12 chars (matching backend)
LOW-003: Replace deprecated dotenv with dotenvy crate in Rust stream server
LOW-004: Enable xpack.security in Elasticsearch dev/local compose files
LOW-005: Accept context.Context in CleanupExpiredSessions instead of Background()
LOW-002: Noted — Hyperswitch version update deferred (requires payment integration tests)

29/30 findings remediated. 1 noted (LOW-002).

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-12 06:13:38 +01:00
senke
8e3b59c0f5 fix: Make development mode detection more explicit for Swagger CSP
- Explicitly check APP_ENV instead of relying on isProduction() helper
- Default to development mode (allow localhost origins) if APP_ENV is not set
- Ensures Swagger UI can be embedded from localhost:5173 in development
- Fixes issue where frame-ancestors was still 'self' even in development
2026-01-18 14:12:11 +01:00
senke
ff16982d7f fix: Allow localhost origins for Swagger UI iframe embedding in development
- Update frame-ancestors CSP to include common localhost origins in development
- Allows embedding from localhost:5173 (Vite dev server) and localhost:3000
- Production remains restricted to same-origin only
- Fixes CSP violation when frontend (localhost:5173) embeds backend Swagger UI (localhost:8080)
2026-01-18 14:08:15 +01:00
senke
f5e278df7e fix: Allow Swagger UI to be embedded in iframe
- Modify SecurityHeaders middleware to detect Swagger routes
- Set X-Frame-Options to SAMEORIGIN for Swagger routes (instead of DENY)
- Update CSP to allow embedding (frame-ancestors 'self') for Swagger routes
- Relax Cross-Origin policies for Swagger routes to enable iframe embedding
- Allow necessary resources (scripts, styles, images) for Swagger UI
- Fixes Content-Security-Policy frame-ancestors violation blocking Swagger documentation
2026-01-18 14:06:41 +01:00
senke
0366b87d94 [BE-SEC-011] be-sec: Implement security headers
- Enhanced security headers middleware with additional headers
- Added X-Permitted-Cross-Domain-Policies: none
- Added Cross-Origin-Embedder-Policy: require-corp
- Added Cross-Origin-Opener-Policy: same-origin
- Added Cross-Origin-Resource-Policy: same-origin
- Enhanced Permissions-Policy with additional restrictions
- Enhanced CSP with frame-ancestors directive
- HSTS now only set in production (not in development)
- Updated tests to verify all new headers
2025-12-24 12:24:54 +01:00
senke
2dfde29f7d refonte: backend-api go first; phase 1 2025-12-12 21:34:34 -05:00