[core] Include Content Security Policy HTTP headers.
See <https://wiki.mozilla.org/Security/CSP/Specification> for more details. I hope current rule is flexible enough to avoid impact on existing functionality.
This commit is contained in:
@@ -80,6 +80,7 @@ $Id$
|
||||
+ rfe #2983207, patch #2988715 [interface] Use jQuery calendar dialog, thanks
|
||||
to Muhammad Adnan.
|
||||
+ [doc] Incorporate synchronisation docs into main document.
|
||||
+ [core] Include Content Security Policy HTTP headers.
|
||||
|
||||
3.3.3.0 (not yet released)
|
||||
- patch #2982480 [navi] Do not group if there would be one table in group,
|
||||
|
@@ -23,6 +23,7 @@ $GLOBALS['now'] = gmdate('D, d M Y H:i:s') . ' GMT';
|
||||
/* Prevent against ClickJacking by allowing frames only from same origin */
|
||||
if (!$GLOBALS['cfg']['AllowThirdPartyFraming']) {
|
||||
header('X-Frame-Options: SAMEORIGIN');
|
||||
header('X-Content-Security-Policy: allow \'self\'; options inline-script eval-script; frame-ancestors \'self\'');
|
||||
}
|
||||
header('Expires: ' . $GLOBALS['now']); // rfc2616 - Section 14.21
|
||||
header('Last-Modified: ' . $GLOBALS['now']);
|
||||
|
Reference in New Issue
Block a user