points!!!
	
		
			
	
		
	
	
		
			
				
	
				ci/woodpecker/push/woodpecker Pipeline was successful
				
					Details
				
			
		
	
				
					
				
			
				
	
				ci/woodpecker/push/woodpecker Pipeline was successful
				
					Details
				
			
		
	This commit is contained in:
		
							parent
							
								
									ece6fc2577
								
							
						
					
					
						commit
						143228b112
					
				| 
						 | 
					@ -1,7 +1,4 @@
 | 
				
			||||||
# Use $request_id as a pseudo-nonce for Content Security Policy (CSP)
 | 
					# Use $request_id as a pseudo-nonce for Content Security Policy (CSP)
 | 
				
			||||||
# $request_id is unique per request and will serve as a nonce value here.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# Map $request_id to a variable named $nonce
 | 
					 | 
				
			||||||
map $request_id $nonce {
 | 
					map $request_id $nonce {
 | 
				
			||||||
    default "$request_id";
 | 
					    default "$request_id";
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
| 
						 | 
					@ -19,7 +16,6 @@ server {
 | 
				
			||||||
    add_header Permissions-Policy "camera=(), microphone=(), geolocation=(), accelerometer=(), gyroscope=(), magnetometer=(), payment=(), usb=()" always;
 | 
					    add_header Permissions-Policy "camera=(), microphone=(), geolocation=(), accelerometer=(), gyroscope=(), magnetometer=(), payment=(), usb=()" always;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    # Content Security Policy (CSP) with injected $nonce for script-src
 | 
					    # Content Security Policy (CSP) with injected $nonce for script-src
 | 
				
			||||||
    # Allows inline scripts that match the nonce generated for each request
 | 
					 | 
				
			||||||
    add_header Content-Security-Policy "default-src 'none'; script-src 'self' 'nonce-$nonce' https://matomo.nixc.us; style-src 'self' 'unsafe-inline' https://colinknapp.com; img-src 'self' https://matomo.nixc.us https://colinknapp.com https://hedgedoc.nixc.us; font-src 'self' data:; frame-ancestors 'self'; base-uri 'self'; form-action 'self';" always;
 | 
					    add_header Content-Security-Policy "default-src 'none'; script-src 'self' 'nonce-$nonce' https://matomo.nixc.us; style-src 'self' 'unsafe-inline' https://colinknapp.com; img-src 'self' https://matomo.nixc.us https://colinknapp.com https://hedgedoc.nixc.us; font-src 'self' data:; frame-ancestors 'self'; base-uri 'self'; form-action 'self';" always;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    # Cross-origin isolation headers
 | 
					    # Cross-origin isolation headers
 | 
				
			||||||
| 
						 | 
					@ -27,16 +23,21 @@ server {
 | 
				
			||||||
    add_header Cross-Origin-Resource-Policy "same-origin" always;
 | 
					    add_header Cross-Origin-Resource-Policy "same-origin" always;
 | 
				
			||||||
    add_header Cross-Origin-Opener-Policy "same-origin" always;
 | 
					    add_header Cross-Origin-Opener-Policy "same-origin" always;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    # Use sub_filter to inject the nonce into inline <script> tags automatically
 | 
					    # Subresource Integrity (SRI) requires modifying HTML for each script link to include integrity hashes
 | 
				
			||||||
    # This works for HTML responses where <script> tags are inline in the HTML
 | 
					    # Set up sub_filter to add nonce to inline scripts
 | 
				
			||||||
    sub_filter '<script>' '<script nonce="$nonce">';
 | 
					    sub_filter '<script>' '<script nonce="$nonce">';
 | 
				
			||||||
    sub_filter_once off; # Apply the replacement to all instances of <script> tags
 | 
					    sub_filter_once off;
 | 
				
			||||||
    sub_filter_types text/html; # Only apply the sub_filter to HTML content
 | 
					    sub_filter_types text/html;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    # Redirect demo.hedgedoc.org resources to hedgedoc.nixc.us for compatibility
 | 
					    # Redirect demo.hedgedoc.org resources to hedgedoc.nixc.us
 | 
				
			||||||
    sub_filter "https://demo.hedgedoc.org" "https://hedgedoc.nixc.us";
 | 
					    sub_filter "https://demo.hedgedoc.org" "https://hedgedoc.nixc.us";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    # Expect-CT Header
 | 
				
			||||||
 | 
					    add_header Expect-CT "max-age=86400, enforce" always;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    # Cache-Control for dynamic pages
 | 
				
			||||||
    location / {
 | 
					    location / {
 | 
				
			||||||
 | 
					        add_header Cache-Control "no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0";
 | 
				
			||||||
        try_files $uri $uri/ =404;
 | 
					        try_files $uri $uri/ =404;
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in New Issue