2019-06-13 18:10:44 +08:00
|
|
|
# Be sure to restart your server when you modify this file.
|
|
|
|
|
|
|
|
# Define an application-wide content security policy
|
|
|
|
# For further information see the following documentation
|
|
|
|
# https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
|
|
|
|
|
2023-06-21 20:13:20 +08:00
|
|
|
ActiveSupport::Reloader.to_prepare do
|
|
|
|
Rails.application.config.content_security_policy do |policy|
|
|
|
|
policy.default_src :self, :https
|
|
|
|
policy.base_uri :self
|
|
|
|
policy.font_src :self, :https, :data
|
|
|
|
policy.img_src :self, :https, :data, :blob
|
|
|
|
policy.object_src :none
|
2024-04-05 18:12:35 +08:00
|
|
|
policy.script_src :self, :unsafe_eval, *Extends::EXTERNAL_SCRIPT_SERVICES
|
2023-06-21 20:13:20 +08:00
|
|
|
policy.style_src :self, :https, :unsafe_inline, :data
|
2024-04-05 18:12:35 +08:00
|
|
|
policy.connect_src :self, :data, *Extends::EXTERNAL_CONNECT_SERVICES
|
2019-06-13 18:10:44 +08:00
|
|
|
|
2023-06-21 20:13:20 +08:00
|
|
|
# Specify URI for violation reports
|
|
|
|
# policy.report_uri "/csp-violation-report-endpoint"
|
|
|
|
end
|
2023-03-09 18:38:47 +08:00
|
|
|
end
|
2019-06-13 18:10:44 +08:00
|
|
|
|
2023-05-31 21:28:16 +08:00
|
|
|
# https://discuss.rubyonrails.org/t/turbolinks-broken-by-default-with-a-secure-csp/74790
|
2023-06-21 20:13:20 +08:00
|
|
|
Rails.application.config.content_security_policy_nonce_generator = -> (request) do
|
2023-05-31 21:28:16 +08:00
|
|
|
# use the same csp nonce for turbolinks requests
|
|
|
|
if request.env['HTTP_TURBOLINKS_REFERRER'].present?
|
|
|
|
request.env['HTTP_X_TURBOLINKS_NONCE']
|
|
|
|
else
|
2023-08-04 17:22:33 +08:00
|
|
|
return request.session.id.to_s if request&.session&.id.present?
|
|
|
|
|
|
|
|
SecureRandom.base64(16)
|
2023-05-31 21:28:16 +08:00
|
|
|
end
|
|
|
|
end
|
2019-06-13 18:10:44 +08:00
|
|
|
|
2019-09-12 23:21:48 +08:00
|
|
|
# Set the nonce only to specific directives
|
2023-07-17 17:26:41 +08:00
|
|
|
Rails.application.config.content_security_policy_nonce_directives = %w(script-src)
|
2019-09-12 23:21:48 +08:00
|
|
|
|
2019-06-13 18:10:44 +08:00
|
|
|
# Report CSP violations to a specified URI
|
|
|
|
# For further information see the following documentation:
|
|
|
|
# https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only
|
|
|
|
# Rails.application.config.content_security_policy_report_only = true
|
2023-05-22 17:43:19 +08:00
|
|
|
|
|
|
|
# Whitelist AWS buckets
|
|
|
|
Rails.application.configure do
|
|
|
|
config.after_initialize do
|
2023-05-22 19:04:13 +08:00
|
|
|
if ActiveStorage::Blob.service.name == :amazon
|
2024-04-05 18:12:35 +08:00
|
|
|
Extends::EXTERNAL_CONNECT_SERVICES += [ActiveStorage::Blob.service.bucket.url]
|
|
|
|
Rails.application.config.content_security_policy.connect_src :self, :data, *Extends::EXTERNAL_CONNECT_SERVICES
|
2023-05-22 19:04:13 +08:00
|
|
|
end
|
2023-05-22 17:43:19 +08:00
|
|
|
end
|
|
|
|
end
|