Skip to content

Commit

Permalink
Revert "miscweb:grunt: add necessary exceptions to CSP headers"
Browse files Browse the repository at this point in the history
This reverts commit 0bb2e32.
  • Loading branch information
timmywil committed Nov 16, 2024
1 parent 5176f47 commit e80f7ec
Show file tree
Hide file tree
Showing 3 changed files with 3 additions and 34 deletions.
10 changes: 1 addition & 9 deletions modules/profile/templates/contentorigin/site.nginx.erb
Original file line number Diff line number Diff line change
Expand Up @@ -15,15 +15,7 @@ server {

# Add Content Security Policy headers
add_header Reporting-Endpoints "csp-endpoint='https://csp-report-api.openjs-foundation.workers.dev/'";
add_header Content-Security-Policy-Report-Only "
default-src 'self';
script-src 'self' code.jquery.com;
connect-src 'self';
img-src 'self';
style-src 'self';
report-uri https://csp-report-api.openjs-foundation.workers.dev/;
report-to csp-endpoint
";
add_header Content-Security-Policy-Report-Only "default-src 'self'; script-src 'self' code.jquery.com; connect-src 'self'; img-src 'self'; style-src 'self'; report-uri https://csp-report-api.openjs-foundation.workers.dev/; report-to csp-endpoint";

location / {
root /srv/www/content.jquery.com;
Expand Down
12 changes: 1 addition & 11 deletions modules/profile/templates/gruntjscom/site.nginx.erb
Original file line number Diff line number Diff line change
Expand Up @@ -19,17 +19,7 @@ server {

# Add Content Security Policy headers
add_header Reporting-Endpoints "csp-endpoint='https://csp-report-api.openjs-foundation.workers.dev/'";
# script-src: add 'unsafe-eval' for the search functionality on gruntjs.com/plugins
# Search will need to be reimplemented to remove this exception.
add_header Content-Security-Policy-Report-Only "
default-src 'self';
script-src 'self' 'unsafe-eval';
connect-src 'self';
img-src 'self';
style-src 'self';
report-uri https://csp-report-api.openjs-foundation.workers.dev/;
report-to csp-endpoint
" always;
add_header Content-Security-Policy-Report-Only "default-src 'self'; script-src 'self'; connect-src 'self'; img-src 'self'; style-src 'self'; report-uri https://csp-report-api.openjs-foundation.workers.dev/; report-to csp-endpoint;" always;
}

location /.well-known/acme-challenge {
Expand Down
15 changes: 1 addition & 14 deletions modules/profile/templates/miscweb/site.nginx.erb
Original file line number Diff line number Diff line change
Expand Up @@ -20,20 +20,7 @@ server {

# Add Content Security Policy headers
add_header Reporting-Endpoints "csp-endpoint='https://csp-report-api.openjs-foundation.workers.dev/'";
# script-src: add 'wasm-unsafe-eval' for WebAssembly-driven search on
# bugs.jquery.com, bugs.jqueryui.com, and plugins.jquery.com
# img-src: allow secure.gravatar.com images on plugins.jquery.com
# media-src: allow content.jquery.com media on podcast.jquery.com
add_header Content-Security-Policy-Report-Only "
default-src 'self';
script-src 'self' 'wasm-unsafe-eval' code.jquery.com;
connect-src 'self';
img-src 'self' secure.gravatar.com;
style-src 'self';
media-src 'self' content.jquery.com;
report-uri https://csp-report-api.openjs-foundation.workers.dev/;
report-to csp-endpoint
";
add_header Content-Security-Policy-Report-Only "default-src 'self'; script-src 'self' code.jquery.com; connect-src 'self'; img-src 'self'; style-src 'self'; report-uri https://csp-report-api.openjs-foundation.workers.dev/; report-to csp-endpoint";

<%- if @site['allow_php'] -%>
index index.php index.html;
Expand Down

0 comments on commit e80f7ec

Please sign in to comment.