view config/initializers/content_security_policy.rb @ 211:e07f6ea17deb

Less xhtml more escaping It looks like some older tweets aren't quite escaped properly for xhtml. Example (assuming not deleted): https://twitter.com/aaaa/status/169688458900668416
author nanaya <me@nanaya.pro>
date Fri, 11 Dec 2020 03:31:25 +0900
parents f67f3ad50270
children 2335107f35d0
line wrap: on
line source

# Be sure to restart your server when you modify this file.

# Define an application-wide content security policy
# For further information see the following documentation
# https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy

# Rails.application.config.content_security_policy do |policy|
#   policy.default_src :self, :https
#   policy.font_src    :self, :https, :data
#   policy.img_src     :self, :https, :data
#   policy.object_src  :none
#   policy.script_src  :self, :https
#   policy.style_src   :self, :https

#   # Specify URI for violation reports
#   # policy.report_uri "/csp-violation-report-endpoint"
# end

# If you are using UJS then enable automatic nonce generation
# Rails.application.config.content_security_policy_nonce_generator = -> request { SecureRandom.base64(16) }

# Report CSP violations to a specified URI
# For further information see the following documentation:
# https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
# Rails.application.config.content_security_policy_report_only = true