Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[WIP] Update secure-headers align with best current practice #2543

Open
wants to merge 5 commits into
base: main
Choose a base branch
from

Commits on Apr 23, 2024

  1. Referrer-Policy to strict-origin-when-cross-origin. it's default on m…

    …odern browser but set it explicitly is fine
    Jxck committed Apr 23, 2024
    Configuration menu
    Copy the full SHA
    ad6c950 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    0bf6827 View commit details
    Browse the repository at this point in the history
  3. x-xss-protection is not fully standardized, deprecated, not recommend…

    …ed header. xss filter is depreacted on all browser so there are no reason to serve it even if it intends to disable since there is no guarantee `0` behaves as expected. use in CSP
    Jxck committed Apr 23, 2024
    Configuration menu
    Copy the full SHA
    e436489 View commit details
    Browse the repository at this point in the history
  4. X-Frame-Options are replaced by frame-ancestors in CSP. it's suppoted…

    … with compatible status among browsers and allow more appropriate directive to customise
    Jxck committed Apr 23, 2024
    Configuration menu
    Copy the full SHA
    3ecbc94 View commit details
    Browse the repository at this point in the history
  5. sort

    Jxck committed Apr 23, 2024
    Configuration menu
    Copy the full SHA
    8ae7718 View commit details
    Browse the repository at this point in the history