Merge pull request #3838 from Keirua/feat/content-security-policy
Add Content Security Policy test headers
This commit is contained in:
commit
748adfd3d5
5 changed files with 32 additions and 1 deletions
|
@ -19,7 +19,7 @@
|
||||||
= stylesheet_link_tag 'new_design/new_application', media: 'all', 'data-turbolinks-track': 'reload'
|
= stylesheet_link_tag 'new_design/new_application', media: 'all', 'data-turbolinks-track': 'reload'
|
||||||
= stylesheet_link_tag 'new_design/print', media: 'print', 'data-turbolinks-track': 'reload'
|
= stylesheet_link_tag 'new_design/print', media: 'print', 'data-turbolinks-track': 'reload'
|
||||||
|
|
||||||
= Gon::Base.render_data(camel_case: true, init: true)
|
= Gon::Base.render_data(camel_case: true, init: true, nonce: request.content_security_policy_nonce)
|
||||||
|
|
||||||
- if Rails.env.development?
|
- if Rails.env.development?
|
||||||
= stylesheet_link_tag :xray
|
= stylesheet_link_tag :xray
|
||||||
|
|
|
@ -59,6 +59,9 @@ Rails.application.configure do
|
||||||
port: 3000
|
port: 3000
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Use Content-Security-Policy-Report-Only instead of Content-Security-Policy
|
||||||
|
config.content_security_policy_report_only = true
|
||||||
|
|
||||||
# Raises error for missing translations
|
# Raises error for missing translations
|
||||||
# config.action_view.raise_on_missing_translations = true
|
# config.action_view.raise_on_missing_translations = true
|
||||||
|
|
||||||
|
|
|
@ -109,5 +109,7 @@ Rails.application.configure do
|
||||||
host: ENV['APP_HOST']
|
host: ENV['APP_HOST']
|
||||||
}
|
}
|
||||||
|
|
||||||
|
config.content_security_policy_report_only = true
|
||||||
|
|
||||||
config.lograge.enabled = ENV['LOGRAGE_ENABLED'] == 'enabled'
|
config.lograge.enabled = ENV['LOGRAGE_ENABLED'] == 'enabled'
|
||||||
end
|
end
|
||||||
|
|
|
@ -45,6 +45,9 @@ Rails.application.configure do
|
||||||
protocol: :http
|
protocol: :http
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Use Content-Security-Policy-Report-Only instead of Content-Security-Policy
|
||||||
|
config.content_security_policy_report_only = true
|
||||||
|
|
||||||
config.active_job.queue_adapter = :test
|
config.active_job.queue_adapter = :test
|
||||||
config.active_storage.service = :test
|
config.active_storage.service = :test
|
||||||
|
|
||||||
|
|
23
config/initializers/content_security_policy.rb
Normal file
23
config/initializers/content_security_policy.rb
Normal file
|
@ -0,0 +1,23 @@
|
||||||
|
Rails.application.config.content_security_policy do |policy|
|
||||||
|
# En cas de non respect d'une des règles, faire un POST sur cette URL
|
||||||
|
policy.report_uri "https://e30e0ed9c14194254481124271b34a72.report-uri.com/r/d/csp/reportOnly"
|
||||||
|
# Whitelist image
|
||||||
|
policy.img_src :self, "https://*.openstreetmap.org"
|
||||||
|
# Whitelist JS: nous, sendinblue et matomo, et… miniprofiler :(
|
||||||
|
if Rails.env.development?
|
||||||
|
# https://github.com/MiniProfiler/rack-mini-profiler/issues/327
|
||||||
|
policy.script_src :self, "https://sibautomation.com", "//stats.data.gouv.fr", :unsafe_eval, :unsafe_inline
|
||||||
|
else
|
||||||
|
policy.script_src :self, "https://sibautomation.com", "//stats.data.gouv.fr"
|
||||||
|
end
|
||||||
|
# Génération d'un nonce pour les balises script inline qu'on maitrise (Gon)
|
||||||
|
Rails.application.config.content_security_policy_nonce_generator = -> _request { SecureRandom.base64(16) }
|
||||||
|
|
||||||
|
# Pour les CSS, on a beaucoup de style inline et quelques balises <style>
|
||||||
|
# c'est trop compliqué pour être rectifié immédiatement (et sans valeur ajoutée:
|
||||||
|
# c'est hardcodé dans les vues, donc pas injectable).
|
||||||
|
policy.style_src :self, :unsafe_inline
|
||||||
|
# Pour tout le reste, par défaut on accepte uniquement ce qui vient de chez nous
|
||||||
|
# et dans la notification on inclue la source de l'erreur
|
||||||
|
policy.default_src :self, :data, :report_sample
|
||||||
|
end
|
Loading…
Add table
Add a link
Reference in a new issue