1
0
Fork 0
peertube/server/core/middlewares/csp.ts

48 lines
1.5 KiB
TypeScript
Raw Normal View History

2021-08-27 08:32:44 -04:00
import { contentSecurityPolicy } from 'helmet'
import { CONFIG } from '../initializers/config.js'
const baseDirectives = Object.assign({},
{
2020-01-31 10:56:52 -05:00
defaultSrc: [ '\'none\'' ], // by default, not specifying default-src = '*'
connectSrc: [ '*', 'data:' ],
mediaSrc: [ '\'self\'', 'https:', 'blob:' ],
fontSrc: [ '\'self\'', 'data:' ],
imgSrc: [ '\'self\'', 'data:', 'blob:' ],
scriptSrc: [ '\'self\' \'unsafe-inline\' \'unsafe-eval\'', 'blob:' ],
2024-02-27 05:18:19 -05:00
scriptSrcAttr: [ '\'unsafe-inline\'' ],
2020-01-31 10:56:52 -05:00
styleSrc: [ '\'self\' \'unsafe-inline\'' ],
objectSrc: [ '\'none\'' ], // only define to allow plugins, else let defaultSrc 'none' block it
formAction: [ '\'self\'' ],
frameAncestors: [ '\'none\'' ],
baseUri: [ '\'self\'' ],
manifestSrc: [ '\'self\'' ],
frameSrc: [ '\'self\'' ], // instead of deprecated child-src / self because of test-embed
workerSrc: [ '\'self\'', 'blob:' ] // instead of deprecated child-src
},
2024-02-27 05:18:19 -05:00
CONFIG.CSP.REPORT_URI
? { reportUri: CONFIG.CSP.REPORT_URI }
: {},
CONFIG.WEBSERVER.SCHEME === 'https'
? { upgradeInsecureRequests: [] }
: {}
)
2021-08-27 08:32:44 -04:00
const baseCSP = contentSecurityPolicy({
directives: baseDirectives,
reportOnly: CONFIG.CSP.REPORT_ONLY
})
2021-08-27 08:32:44 -04:00
const embedCSP = contentSecurityPolicy({
2020-01-31 10:56:52 -05:00
directives: Object.assign({}, baseDirectives, { frameAncestors: [ '*' ] }),
reportOnly: CONFIG.CSP.REPORT_ONLY
})
// ---------------------------------------------------------------------------
export {
baseCSP,
embedCSP
}