diff --git a/config/initializers/content_security_policy.rb b/config/initializers/content_security_policy.rb index 73d7177a4..17aa4aef0 100644 --- a/config/initializers/content_security_policy.rb +++ b/config/initializers/content_security_policy.rb @@ -4,45 +4,30 @@ # For further information see the following documentation # https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy +# rubocop:disable DS/ApplicationName Rails.application.config.content_security_policy do |policy| # Whitelist image - images_whitelist = ["*.openstreetmap.org", "*.cloud.ovh.net", "*"] - images_whitelist << URI(FOG_OPENSTACK_URL).host if FOG_OPENSTACK_URL.present? - images_whitelist << URI(MATOMO_IFRAME_URL).host if MATOMO_IFRAME_URL.present? - policy.img_src(:self, :data, :blob, *images_whitelist) - + policy.img_src :self, "*.openstreetmap.org", "static.demarches-simplifiees.fr", "*.cloud.ovh.net", "stats.data.gouv.fr", "*", :data, :blob # Whitelist JS: nous, sendinblue et matomo # miniprofiler et nous avons quelques boutons inline :( - scripts_whitelist = ["*.sendinblue.com", "*.crisp.chat", "crisp.chat", "*.sibautomation.com", "sibautomation.com", "cdn.jsdelivr.net", "maxcdn.bootstrapcdn.com", "code.jquery.com"] - scripts_whitelist << URI(MATOMO_IFRAME_URL).host if MATOMO_IFRAME_URL.present? - policy.script_src(:self, :unsafe_eval, :unsafe_inline, :blob, *scripts_whitelist) - + policy.script_src :self, "stats.data.gouv.fr", "*.sendinblue.com", "*.crisp.chat", "crisp.chat", "*.sibautomation.com", "sibautomation.com", 'cdn.jsdelivr.net', 'maxcdn.bootstrapcdn.com', 'code.jquery.com', :unsafe_eval, :unsafe_inline, :blob # Pour les CSS, on a beaucoup de style inline et quelques balises