Skip to content

Commit 3846fb4

Browse files
fix: update CSP to allow any HTTPS external scripts, styles, fonts, and connections
1 parent 1ddf329 commit 3846fb4

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

frontend/nginx.conf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ http {
5454
add_header X-Frame-Options "DENY" always;
5555
add_header X-Content-Type-Options "nosniff" always;
5656
add_header Referrer-Policy "strict-origin-when-cross-origin" always;
57-
add_header Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https:; font-src 'self' data:; connect-src 'self' wss: ws:; object-src 'none'; base-uri 'self'; frame-ancestors 'none';" always;
57+
add_header Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https:; style-src 'self' 'unsafe-inline' https:; img-src 'self' data: https:; font-src 'self' data: https:; connect-src 'self' wss: ws: https:; object-src 'none'; base-uri 'self'; frame-ancestors 'none';" always;
5858

5959
# If a react app URI is directly accessed we will get 404
6060
# since there will be no file representing that path.

0 commit comments

Comments
 (0)