# Be sure to restart your server when you modify this file. # Define an application-wide content security policy # For further information see the following documentation # https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy Rails.application.config.content_security_policy do |policy| policy.default_src :self, :https policy.base_uri :self policy.font_src :self, :https, :data policy.img_src :self, :https, :data policy.object_src :none policy.script_src :self, :https, :unsafe_eval policy.style_src :self, :https, :unsafe_inline, :data policy.connect_src :self, :data, *Extends::EXTERNAL_SERVICES # Specify URI for violation reports # policy.report_uri "/csp-violation-report-endpoint" end # If you are using UJS then enable automatic nonce generation Rails.application.config.content_security_policy_nonce_generator = ->_request { SecureRandom.base64(16) } # Set the nonce only to specific directives Rails.application.config.content_security_policy_nonce_directives = %w(script-src) # Report CSP violations to a specified URI # For further information see the following documentation: # https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy-Report-Only # Rails.application.config.content_security_policy_report_only = true # Whitelist AWS buckets Rails.application.configure do config.after_initialize do if ActiveStorage::Blob.service.name == :amazon Extends::EXTERNAL_SERVICES += [ActiveStorage::Blob.service.bucket.url] Rails.application.config.content_security_policy.connect_src :self, :data, *Extends::EXTERNAL_SERVICES end end end