Document changes of CSP and X_XSS_Protection #8785
Open
+28
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🔩 Description: What code changed, and why?
Document changes of CSP and X-XSS-Protection
Default value of CSP:
content_security_policy = "default-src 'self';frame-ancestors 'self';"
Configuration of CSP:
[load_balancer.v1.sys.ngx.http]
content_security_policy = "default-src 'none'; script-src 'self'; connect-src 'self'; img-src 'self'; style-src 'self';"
Default value of X-XSS-Protection
x_xss_protection = "1; mode=block"
Configuration of X-XSS-Protection
[global.v1.sys.ngx.http]
x_xss_protection = "0"
⛓️ Related Resources
https://progresssoftware.atlassian.net/browse/CHEF-13481
👍 Definition of Done
👟 How to Build and Test the Change
✅ Checklist
All PRs must tick these:
With occasional exceptions, all PRs from Progress employees must tick these:
make spell
in any component directory)All PRs from Progress employees should tick these if appropriate:
Please add a note next to any checkbox above if you are NOT ticking it.
📷 Screenshots, if applicable