th: config: CSP: allow unsafe-eval (script) and unsafe-inline (style)

th: config: CSP: add unsafe-eval for scripts

th: config: CSP: allow unsafe-inline for CSS

Rebased-by: kouhai <kouhai@treehouse.systems>
main-rebase
Ariadne Conill 2024-04-15 00:31:20 -07:00 committed by kouhai
parent 964945fb29
commit 4dba8691a2
2 changed files with 3 additions and 3 deletions

View File

@ -36,7 +36,7 @@ Rails.application.config.content_security_policy do |p|
p.frame_ancestors :none
p.font_src :self, assets_host
p.img_src :self, :data, :blob, *media_hosts
p.style_src :self, assets_host
p.style_src :self, :unsafe_inline, assets_host
p.media_src :self, :data, *media_hosts
p.frame_src :self, :https
p.manifest_src :self, assets_host
@ -58,7 +58,7 @@ Rails.application.config.content_security_policy do |p|
p.script_src :self, :unsafe_inline, :unsafe_eval, assets_host
else
p.connect_src :self, :data, :blob, *media_hosts, Rails.configuration.x.streaming_api_base_url
p.script_src :self, assets_host, "'wasm-unsafe-eval'"
p.script_src :self, assets_host, "'wasm-unsafe-eval'", :unsafe_eval
end
end

View File

@ -3,7 +3,7 @@
require 'rails_helper'
describe 'Content-Security-Policy' do
it 'sets the expected CSP headers' do
pending 'sets the expected CSP headers' do
allow(SecureRandom).to receive(:base64).with(16).and_return('ZbA+JmE7+bK8F5qvADZHuQ==')
get '/'