File tree 2 files changed +10
-3
lines changed
2 files changed +10
-3
lines changed Original file line number Diff line number Diff line change 20
20
include :
21
21
- name : " Server Config Tests"
22
22
install :
23
- - curl -sSL https://github.com/h5bp/server-configs-test/releases/download/1.0.6 /server-configs-test.tar.gz | tar -xz -C test/
23
+ - curl -sSL https://github.com/h5bp/server-configs-test/releases/download/1.2.0 /server-configs-test.tar.gz | tar -xz -C test/
24
24
- ./bin/build.sh test/fixtures/.htaccess test/build/htaccess_fixture.conf
25
25
before_script :
26
26
- docker pull httpd
Original file line number Diff line number Diff line change 54
54
# website itself to be loaded over HTTPS you must include the
55
55
# `Strict-Transport-Security` header.
56
56
#
57
+ # (6) The `Content-Security-Policy` header is included in all responses
58
+ # that are able to execute scripting. This includes the commonly used
59
+ # file types: HTML, XML and PDF documents. Although Javascript files
60
+ # can not execute script in a "browsing context", they are still included
61
+ # to target workers:
62
+ # https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy#CSP_in_workers
63
+ #
57
64
# To make your CSP implementation easier, you can use an online CSP header
58
65
# generator such as:
59
66
# https://report-uri.com/home/generate/
68
75
# https://www.w3.org/TR/CSP/
69
76
70
77
<IfModule mod_headers.c>
71
- # (1) (2) (3) (4) (5)
72
- Header set Content-Security-Policy "default-src 'self'; base-uri 'none'; form-action 'self'; frame-ancestors 'none'; upgrade-insecure-requests" "expr=%{CONTENT_TYPE} =~ m#text/ html#i"
78
+ # (1) (2) (3) (4) (5) (6)
79
+ Header set Content-Security-Policy "default-src 'self'; base-uri 'none'; form-action 'self'; frame-ancestors 'none'; upgrade-insecure-requests" "expr=%{CONTENT_TYPE} =~ m#text\/( html|javascript)|application\/pdf|xml #i"
73
80
</IfModule>
You can’t perform that action at this time.
0 commit comments