|
| 1 | +<?php |
| 2 | + |
| 3 | +namespace CSlant\Blog\Api\Http\Middlewares; |
| 4 | + |
| 5 | +use Closure; |
| 6 | +use Illuminate\Http\Request; |
| 7 | +use Symfony\Component\HttpFoundation\Response; |
| 8 | + |
| 9 | +class CorsMiddleware |
| 10 | +{ |
| 11 | + /** |
| 12 | + * Handle an incoming request. |
| 13 | + * |
| 14 | + * @param \Closure(\Illuminate\Http\Request): (\Symfony\Component\HttpFoundation\Response) $next |
| 15 | + */ |
| 16 | + public function handle(Request $request, Closure $next): Response |
| 17 | + { |
| 18 | + // Handle preflight OPTIONS request |
| 19 | + if ($request->getMethod() === 'OPTIONS') { |
| 20 | + return response('', 200) |
| 21 | + ->header('Access-Control-Allow-Origin', $this->getAllowedOrigin($request)) |
| 22 | + ->header('Access-Control-Allow-Methods', 'GET, POST, PUT, DELETE, OPTIONS, PATCH') |
| 23 | + ->header('Access-Control-Allow-Headers', 'Accept, Authorization, Content-Type, X-Requested-With, X-CSRF-TOKEN, X-XSRF-TOKEN, Origin, Cache-Control, Pragma') |
| 24 | + ->header('Access-Control-Allow-Credentials', 'true') |
| 25 | + ->header('Access-Control-Max-Age', '86400'); |
| 26 | + } |
| 27 | + |
| 28 | + $response = $next($request); |
| 29 | + |
| 30 | + // Add CORS headers to response |
| 31 | + $response->headers->set('Access-Control-Allow-Origin', $this->getAllowedOrigin($request)); |
| 32 | + $response->headers->set('Access-Control-Allow-Methods', 'GET, POST, PUT, DELETE, OPTIONS, PATCH'); |
| 33 | + $response->headers->set('Access-Control-Allow-Headers', 'Accept, Authorization, Content-Type, X-Requested-With, X-CSRF-TOKEN, X-XSRF-TOKEN, Origin, Cache-Control, Pragma'); |
| 34 | + $response->headers->set('Access-Control-Allow-Credentials', 'true'); |
| 35 | + $response->headers->set('Access-Control-Expose-Headers', 'Cache-Control, Content-Language, Content-Type, Expires, Last-Modified, Pragma'); |
| 36 | + |
| 37 | + return $response; |
| 38 | + } |
| 39 | + |
| 40 | + /** |
| 41 | + * Get allowed origin for the request. |
| 42 | + */ |
| 43 | + private function getAllowedOrigin(Request $request): string |
| 44 | + { |
| 45 | + $origin = $request->headers->get('Origin'); |
| 46 | + |
| 47 | + // Get environment-specific configurations |
| 48 | + $allowedOrigins = $this->getAllowedOrigins(); |
| 49 | + |
| 50 | + // Check if origin is in allowed list |
| 51 | + if (in_array($origin, $allowedOrigins)) { |
| 52 | + return $origin; |
| 53 | + } |
| 54 | + |
| 55 | + // Check against patterns |
| 56 | + $allowedPatterns = $this->getAllowedPatterns(); |
| 57 | + |
| 58 | + foreach ($allowedPatterns as $pattern) { |
| 59 | + if (preg_match($pattern, $origin)) { |
| 60 | + return $origin; |
| 61 | + } |
| 62 | + } |
| 63 | + |
| 64 | + // Default to first allowed origin or the origin itself if it matches basic security rules |
| 65 | + if ($this->isSecureOrigin($origin)) { |
| 66 | + return $origin; |
| 67 | + } |
| 68 | + |
| 69 | + return $allowedOrigins[0] ?? '*'; |
| 70 | + } |
| 71 | + |
| 72 | + /** |
| 73 | + * Get all allowed origins based on environment. |
| 74 | + */ |
| 75 | + private function getAllowedOrigins(): array |
| 76 | + { |
| 77 | + $baseOrigins = [ |
| 78 | + // Environment-specific URLs from .env |
| 79 | + env('BLOG_FE_URL'), |
| 80 | + env('BLOG_ADMIN_URL'), |
| 81 | + env('BLOG_API_URL'), |
| 82 | + env('APP_URL'), |
| 83 | + |
| 84 | + // Development origins |
| 85 | + 'http://localhost', |
| 86 | + 'http://localhost:3000', |
| 87 | + 'http://localhost:5173', // Vite default |
| 88 | + 'http://127.0.0.1', |
| 89 | + 'http://127.0.0.1:3000', |
| 90 | + |
| 91 | + // Development with .local domains |
| 92 | + 'http://cslant.com.local', |
| 93 | + 'http://cslant.com.local:81', |
| 94 | + |
| 95 | + // Production domains (without .local) |
| 96 | + 'https://cslant.com', |
| 97 | + 'https://api-docs.cslant.com', |
| 98 | + |
| 99 | + // Staging domains |
| 100 | + 'https://staging.cslant.com', |
| 101 | + ]; |
| 102 | + |
| 103 | + // Filter out null values and return unique origins |
| 104 | + return array_unique(array_filter($baseOrigins)); |
| 105 | + } |
| 106 | + |
| 107 | + /** |
| 108 | + * Get allowed patterns for dynamic origin matching. |
| 109 | + */ |
| 110 | + private function getAllowedPatterns(): array |
| 111 | + { |
| 112 | + return [ |
| 113 | + // Development patterns (.local domains) |
| 114 | + '/^https?:\/\/[a-zA-Z0-9\-]+\.cslant\.com\.local(:\d+)?$/', |
| 115 | + '/^https?:\/\/[a-zA-Z0-9\-]+\.[a-zA-Z0-9\-]+\.cslant\.com\.local(:\d+)?$/', |
| 116 | + |
| 117 | + // Production patterns (without .local) |
| 118 | + '/^https:\/\/[a-zA-Z0-9\-]+\.cslant\.com$/', |
| 119 | + '/^https:\/\/[a-zA-Z0-9\-]+\.[a-zA-Z0-9\-]+\.cslant\.com$/', |
| 120 | + '/^http:\/\/[a-zA-Z0-9\-]+\.cslant\.com$/', |
| 121 | + '/^http:\/\/[a-zA-Z0-9\-]+\.[a-zA-Z0-9\-]+\.cslant\.com$/', |
| 122 | + |
| 123 | + // Staging patterns |
| 124 | + '/^https?:\/\/[a-zA-Z0-9\-]+\.staging\.cslant\.com$/', |
| 125 | + '/^https?:\/\/[a-zA-Z0-9\-]+\.[a-zA-Z0-9\-]+\.staging\.cslant\.com$/', |
| 126 | + |
| 127 | + // Localhost patterns with any port |
| 128 | + '/^https?:\/\/localhost(:\d+)?$/', |
| 129 | + '/^https?:\/\/127\.0\.0\.1(:\d+)?$/', |
| 130 | + '/^https?:\/\/0\.0\.0\.0(:\d+)?$/', |
| 131 | + |
| 132 | + // Custom domain patterns from environment |
| 133 | + $this->getCustomDomainPattern(), |
| 134 | + ]; |
| 135 | + } |
| 136 | + |
| 137 | + /** |
| 138 | + * Get custom domain pattern from environment. |
| 139 | + */ |
| 140 | + private function getCustomDomainPattern(): string |
| 141 | + { |
| 142 | + $customDomain = env('CORS_CUSTOM_DOMAIN_PATTERN'); |
| 143 | + return $customDomain ?: '/^$/'; // Empty pattern if not set |
| 144 | + } |
| 145 | + |
| 146 | + /** |
| 147 | + * Check if origin is secure (basic security validation). |
| 148 | + */ |
| 149 | + private function isSecureOrigin(?string $origin): bool |
| 150 | + { |
| 151 | + // Allow null origin (for mobile apps, Postman, etc.) |
| 152 | + if (empty($origin)) { |
| 153 | + return true; |
| 154 | + } |
| 155 | + |
| 156 | + // Must be a valid URL |
| 157 | + if (!filter_var($origin, FILTER_VALIDATE_URL)) { |
| 158 | + return false; |
| 159 | + } |
| 160 | + |
| 161 | + $parsed = parse_url($origin); |
| 162 | + |
| 163 | + // Must have valid scheme |
| 164 | + if (!in_array($parsed['scheme'] ?? '', ['http', 'https'])) { |
| 165 | + return false; |
| 166 | + } |
| 167 | + |
| 168 | + // Block dangerous hosts |
| 169 | + $dangerousHosts = ['0.0.0.0', '255.255.255.255']; |
| 170 | + if (in_array($parsed['host'] ?? '', $dangerousHosts)) { |
| 171 | + return false; |
| 172 | + } |
| 173 | + |
| 174 | + return true; |
| 175 | + } |
| 176 | +} |
0 commit comments