Mercurial > zeropaste
comparison config/initializers/content_security_policy.rb @ 485:6cac8fcf8164
Update to rails 7 (and ruby 3.1)
author | nanaya <me@nanaya.pro> |
---|---|
date | Sat, 15 Jan 2022 02:07:02 +0900 |
parents | fd3078b4d355 |
children | 92929378413e |
comparison
equal
deleted
inserted
replaced
484:84ca55a0568e | 485:6cac8fcf8164 |
---|---|
2 | 2 |
3 # Define an application-wide content security policy | 3 # Define an application-wide content security policy |
4 # For further information see the following documentation | 4 # For further information see the following documentation |
5 # https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy | 5 # https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy |
6 | 6 |
7 # Rails.application.config.content_security_policy do |policy| | 7 # Rails.application.configure do |
8 # policy.default_src :self, :https | 8 # config.content_security_policy do |policy| |
9 # policy.font_src :self, :https, :data | 9 # policy.default_src :self, :https |
10 # policy.img_src :self, :https, :data | 10 # policy.font_src :self, :https, :data |
11 # policy.object_src :none | 11 # policy.img_src :self, :https, :data |
12 # policy.script_src :self, :https | 12 # policy.object_src :none |
13 # policy.style_src :self, :https | 13 # policy.script_src :self, :https |
14 # # If you are using webpack-dev-server then specify webpack-dev-server host | 14 # policy.style_src :self, :https |
15 # policy.connect_src :self, :https, "http://localhost:3035", "ws://localhost:3035" if Rails.env.development? | 15 # # Specify URI for violation reports |
16 | 16 # # policy.report_uri "/csp-violation-report-endpoint" |
17 # # Specify URI for violation reports | 17 # end |
18 # # policy.report_uri "/csp-violation-report-endpoint" | 18 # |
19 # # Generate session nonces for permitted importmap and inline scripts | |
20 # config.content_security_policy_nonce_generator = ->(request) { request.session.id.to_s } | |
21 # config.content_security_policy_nonce_directives = %w(script-src) | |
22 # | |
23 # # Report CSP violations to a specified URI. See: | |
24 # # https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only | |
25 # # config.content_security_policy_report_only = true | |
19 # end | 26 # end |
20 | |
21 # If you are using UJS then enable automatic nonce generation | |
22 # Rails.application.config.content_security_policy_nonce_generator = -> request { SecureRandom.base64(16) } | |
23 | |
24 # Set the nonce only to specific directives | |
25 # Rails.application.config.content_security_policy_nonce_directives = %w(script-src) | |
26 | |
27 # Report CSP violations to a specified URI | |
28 # For further information see the following documentation: | |
29 # https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only | |
30 # Rails.application.config.content_security_policy_report_only = true |