mirror of
https://github.com/openfoodfoundation/openfoodnetwork
synced 2026-02-24 01:13:21 +00:00
We really need to remove all those Angular templates as soon as possible, and then revert this commit...
31 lines
1.4 KiB
Ruby
31 lines
1.4 KiB
Ruby
# Be sure to restart your server when you modify this file.
|
|
|
|
# Define an application-wide content security policy
|
|
# For further information see the following documentation
|
|
# https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
|
|
|
|
Rails.application.config.content_security_policy do |policy|
|
|
policy.default_src :self, :https
|
|
policy.font_src :self, :https, :data, 'fonts.gstatic.com'
|
|
policy.img_src :self, :https, :data, '*.s3.amazonaws.com'
|
|
policy.object_src :none
|
|
policy.frame_ancestors :none
|
|
policy.script_src :self, :https, :unsafe_inline, :unsafe_eval, "*.stripe.com", "openfoodnetwork.innocraft.cloud"
|
|
policy.style_src :self, :https, :unsafe_inline
|
|
policy.connect_src :self, :https, "http://localhost:3035", "ws://localhost:3035" if Rails.env.development?
|
|
|
|
# Specify URI for violation reports
|
|
# policy.report_uri "/csp-violation-report-endpoint"
|
|
end
|
|
|
|
# If you are using UJS then enable automatic nonce generation
|
|
# Rails.application.config.content_security_policy_nonce_generator = -> request { SecureRandom.base64(16) }
|
|
|
|
# Set the nonce only to specific directives
|
|
# Rails.application.config.content_security_policy_nonce_directives = %w(script-src)
|
|
|
|
# Report CSP violations to a specified URI
|
|
# For further information see the following documentation:
|
|
# https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
|
|
# Rails.application.config.content_security_policy_report_only = true
|