-
Notifications
You must be signed in to change notification settings - Fork 183
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
duplicated CSP frame-ancestors policy #10042
Comments
This additional header probably originates here: ocis/services/web/pkg/middleware/silentrefresh.go Lines 7 to 13 in a7a10f8
|
And what it actually does: it takes precedence over the |
Escalating it to P2 |
As far as I know, the CSP is fully handled by the proxy service (through the csp.yaml file), and no other service should try to set the CSP. The easiest solution is to remove that header from the web service and let the proxy service to handle it; we might need to document that the Alternatively, we could implement a way for any service to overwrite the CSP in the proxy service. In this case, the web service would require the proxy service to set, at least, the |
Yes. That should do it for now. |
#10146 should fix the double CSP header. |
PR merged. Closing. |
Describe the bug
On the root path of oCIS, we get two
content-security-policy
headers. One has a staticframe-ancestors 'self'
configSteps to reproduce
Expected behavior
Have one header
content-security-policy
reflecting my oCIS csp configuration.Actual behavior
Further context
The second header seems to be statically set to
frame-ancestors 'self'
and always there, even if I have a more sophisticated CSP configThe text was updated successfully, but these errors were encountered: