Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Configure Content Security Policy with CspHtmlWebpackPlugin #59

Draft
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

warnyul
Copy link
Owner

@warnyul warnyul commented Nov 29, 2024

Set up CSP using CspHtmlWebpackPlugin to enhance security by restricting sources for scripts, styles, images, fonts, and connections.

Copy link

github-actions bot commented Nov 29, 2024

Visit the preview URL for this PR (updated for commit 8d23046):

https://bvarga-fe600--pr59-csp-m690t8vi.web.app

(expires Mon, 09 Dec 2024 16:57:31 GMT)

🔥 via Firebase Hosting GitHub Action 🌎

Sign: a3b1098a9eaf0750a134a339972f1df2a3969a8d

@warnyul warnyul added the do not merge Indicates the pull request is not ready to be merged due to pending reviews, testing, or blockers. label Nov 29, 2024
@warnyul warnyul marked this pull request as draft November 30, 2024 14:09
@warnyul
Copy link
Owner Author

warnyul commented Dec 1, 2024

Set up CSP using CspHtmlWebpackPlugin to enhance security by restricting sources for scripts, styles, images, fonts, and connections.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
do not merge Indicates the pull request is not ready to be merged due to pending reviews, testing, or blockers.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant