RFC Content Security Policy Changes #2114
Replies: 1 comment 1 reply
-
I assume this will dedupe any repeated directives and the configs it passes but this does gets more complicated than we think. Take Google's products as an example https://developers.google.com/tag-platform/security/guides/csp . Say we have the following CSP setup: createContentSecurityPolicy({
presets: [
shopifyCSP(),
googleGA4(),
googleAdsConversion(),
googleFloodlight('<FLOODLIGHT-CONFIG-ID>'),
],
}); In this case, Don't forget that for some endpoints, if we are running localhost, we may need to swap or add the CSP config to a http protocol as well. There is a need to limit CSP declaration as it does impact on the maximum header size which is a limitation set by the servers themselves |
Beta Was this translation helpful? Give feedback.
-
We find a lot of developers struggle with content security policies (CSP) and often disable it altogether rather than working through the challenges. We propose the following changes to make using Content Security Policies easier:
Third party vendors can easily provide their own preset. We probably can even provide presets for major vendors like Google tag manager:
Our CSP abstraction will combine all presets together, deduping entries.
Questions
Beta Was this translation helpful? Give feedback.
All reactions