Implement security hardening across frontend, backend, and infrastructure

- nginx: add X-Content-Type-Options, X-Frame-Options, X-XSS-Protection,
  and Referrer-Policy headers on all responses; rate limit /api/auth/login
  to 5 req/min per IP (burst 3) to prevent brute force
- frontend: add escHtml() utility to api.js; use it on all notes fields
  across dashboard, log, history, flock, and budget pages to prevent XSS
- log.js: fix broken loadRecent() call referencing removed #recent-body
  element; replaced with loadHistory() from history.js
- schemas.py: raise minimum password length from 6 to 10 characters
- admin.py: add audit logging for password reset, disable, delete, and
  impersonate actions; fix impersonate to use named admin param for logging
- main.py: add startup env validation — exits with clear error if any
  required env var is missing; configure structured logging to stdout
- docker-compose.yml: add log rotation (10 MB / 3 files) to all services

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
This commit is contained in:
2026-03-17 23:55:08 -07:00
parent b660263f30
commit 37f19a83ed
11 changed files with 100 additions and 42 deletions

View File

@@ -16,10 +16,10 @@ class TokenResponse(BaseModel):
class ChangePasswordRequest(BaseModel):
current_password: str
new_password: str = Field(min_length=6)
new_password: str = Field(min_length=10)
class ResetPasswordRequest(BaseModel):
new_password: str = Field(min_length=6)
new_password: str = Field(min_length=10)
class TimezoneUpdate(BaseModel):
timezone: str = Field(min_length=1, max_length=64)
@@ -29,7 +29,7 @@ class TimezoneUpdate(BaseModel):
class UserCreate(BaseModel):
username: str = Field(min_length=2, max_length=64)
password: str = Field(min_length=6)
password: str = Field(min_length=10)
class UserOut(BaseModel):
id: int