aboutsummaryrefslogtreecommitdiffhomepage
path: root/server/middlewares/csp.ts
blob: d11d7079006658cffe03a5b6f9988cbca08c92e9 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
import * as helmet from 'helmet'
import { CONFIG } from '../initializers/config'

const baseDirectives = Object.assign({},
  {
    defaultSrc: ["'none'"], // by default, not specifying default-src = '*'
    connectSrc: ['*', 'data:'],
    mediaSrc: ["'self'", 'https:', 'blob:'],
    fontSrc: ["'self'", 'data:'],
    imgSrc: ["'self'", 'data:', 'blob:'],
    scriptSrc: ["'self' 'unsafe-inline' 'unsafe-eval'", 'blob:'],
    styleSrc: ["'self' 'unsafe-inline'"],
    objectSrc: ["'none'"], // only define to allow plugins, else let defaultSrc 'none' block it
    formAction: ["'self'"],
    frameAncestors: ["'none'"],
    baseUri: ["'self'"],
    manifestSrc: ["'self'"],
    frameSrc: ["'self'"], // instead of deprecated child-src / self because of test-embed
    workerSrc: ["'self'", 'blob:'] // instead of deprecated child-src
  },
  CONFIG.CSP.REPORT_URI ? { reportUri: CONFIG.CSP.REPORT_URI } : {},
  CONFIG.WEBSERVER.SCHEME === 'https' ? { upgradeInsecureRequests: true } : {}
)

const baseCSP = helmet.contentSecurityPolicy({
  directives: baseDirectives,
  browserSniff: false,
  reportOnly: CONFIG.CSP.REPORT_ONLY
})

const embedCSP = helmet.contentSecurityPolicy({
  directives: Object.assign({}, baseDirectives, { frameAncestors: ['*'] }),
  browserSniff: false, // assumes a modern browser, but allows CDN in front
  reportOnly: CONFIG.CSP.REPORT_ONLY
})

// ---------------------------------------------------------------------------

export {
  baseCSP,
  embedCSP
}