Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
iv
gitlab-ce
Commits
c2fe22f8
Commit
c2fe22f8
authored
Jul 18, 2016
by
Connor Shea
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Minor policy refinements.
parent
460fc6c4
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
12 additions
and
8 deletions
+12
-8
config/initializers/secure_headers.rb
config/initializers/secure_headers.rb
+12
-8
No files found.
config/initializers/secure_headers.rb
View file @
c2fe22f8
# CSP headers have to have single quotes, so failures relating to quotes
# inside Ruby string arrays are irrelevant.
# rubocop:disable Lint/PercentStringArray
require
'gitlab/current_settings'
include
Gitlab
::
CurrentSettings
...
...
@@ -23,8 +26,6 @@ SecureHeaders::Configuration.default do |config|
strict:
true
}
}
# Disallow iframes.
config
.
x_frame_options
=
"DENY"
config
.
x_content_type_options
=
"nosniff"
config
.
x_xss_protection
=
"1; mode=block"
config
.
x_download_options
=
"noopen"
...
...
@@ -45,13 +46,13 @@ SecureHeaders::Configuration.default do |config|
# Only load local fonts.
font_src:
%w('self')
,
# Load local images, any external image available over HTTPS.
img_src:
%w(
'self' https
:)
,
img_src:
%w(
* 'self' data
:)
,
# Audio and video can't be played on GitLab currently, so it's disabled.
media_src:
%w('none')
,
# Don't allow <object>, <embed>, or <applet> elements.
object_src:
%w('none')
,
# Allow local scripts and inline scripts.
script_src:
%w('unsafe-inline' 'self')
,
script_src:
%w('unsafe-inline' '
unsafe-eval' '
self')
,
# Allow local stylesheets and inline styles.
style_src:
%w('unsafe-inline' 'self')
,
# The URIs that a user agent may use as the document base URL.
...
...
@@ -63,15 +64,18 @@ SecureHeaders::Configuration.default do |config|
# Disallow any parents from embedding a page in an iframe.
frame_ancestors:
%w('none')
,
# Don't allow any plugins (Flash, Shockwave, etc.)
plugin_types:
%w(
'none'
)
,
plugin_types:
%w()
,
# Blocks all mixed (HTTP) content.
block_all_mixed_content:
true
,
# Upgrades insecure requests to HTTPS when possible.
upgrade_insecure_requests:
true
,
# Reports are sent to Sentry if it's enabled, nowhere otherwise.
report_uri:
%W(
#{
CSP_REPORT_URI
}
)
upgrade_insecure_requests:
true
}
# Reports are sent to Sentry if it's enabled.
if
current_application_settings
.
sentry_enabled
config
.
csp
[
:report_uri
]
=
%W(
#{
CSP_REPORT_URI
}
)
end
# Allow Bootstrap Linter in development mode.
if
Rails
.
env
.
development?
config
.
csp
[
:script_src
]
<<
"maxcdn.bootstrapcdn.com"
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment