Skip to content

Commit a6d2d9f

Browse files
committed
Drop X-Content-Security-Policy header from samples #449
1 parent 13440a4 commit a6d2d9f

File tree

31 files changed

+31
-220
lines changed

31 files changed

+31
-220
lines changed

BFF/v2/TokenExchange/TokenExchange.IdentityServer/Pages/SecurityHeadersAttribute.cs

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -29,20 +29,14 @@ public override void OnResultExecuting(ResultExecutingContext context)
2929
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
3030
var csp = "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';";
3131
// also consider adding upgrade-insecure-requests once you have HTTPS in place for production
32-
//csp += "upgrade-insecure-requests;";
32+
// csp += "upgrade-insecure-requests;";
3333
// also an example if you need client images to be displayed from twitter
3434
// csp += "img-src 'self' https://pbs.twimg.com;";
3535

36-
// once for standards compliant browsers
3736
if (!context.HttpContext.Response.Headers.ContainsKey("Content-Security-Policy"))
3837
{
3938
context.HttpContext.Response.Headers.Append("Content-Security-Policy", csp);
4039
}
41-
// and once again for IE
42-
if (!context.HttpContext.Response.Headers.ContainsKey("X-Content-Security-Policy"))
43-
{
44-
context.HttpContext.Response.Headers.Append("X-Content-Security-Policy", csp);
45-
}
4640

4741
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
4842
var referrer_policy = "no-referrer";

BFF/v3/TokenExchange/TokenExchange.IdentityServer/Pages/SecurityHeadersAttribute.cs

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -29,20 +29,14 @@ public override void OnResultExecuting(ResultExecutingContext context)
2929
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
3030
var csp = "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';";
3131
// also consider adding upgrade-insecure-requests once you have HTTPS in place for production
32-
//csp += "upgrade-insecure-requests;";
32+
// csp += "upgrade-insecure-requests;";
3333
// also an example if you need client images to be displayed from twitter
3434
// csp += "img-src 'self' https://pbs.twimg.com;";
3535

36-
// once for standards compliant browsers
3736
if (!context.HttpContext.Response.Headers.ContainsKey("Content-Security-Policy"))
3837
{
3938
context.HttpContext.Response.Headers["Content-Security-Policy"] = csp;
4039
}
41-
// and once again for IE
42-
if (!context.HttpContext.Response.Headers.ContainsKey("X-Content-Security-Policy"))
43-
{
44-
context.HttpContext.Response.Headers["X-Content-Security-Policy"] = csp;
45-
}
4640

4741
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
4842
var referrer_policy = "no-referrer";

BFF/v3/docker/ContainerizedIdentityServer/Pages/SecurityHeadersAttribute.cs

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -30,20 +30,14 @@ public override void OnResultExecuting(ResultExecutingContext context)
3030
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
3131
var csp = "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';";
3232
// also consider adding upgrade-insecure-requests once you have HTTPS in place for production
33-
//csp += "upgrade-insecure-requests;";
33+
// csp += "upgrade-insecure-requests;";
3434
// also an example if you need client images to be displayed from twitter
3535
// csp += "img-src 'self' https://pbs.twimg.com;";
3636

37-
// once for standards compliant browsers
3837
if (!context.HttpContext.Response.Headers.ContainsKey("Content-Security-Policy"))
3938
{
4039
context.HttpContext.Response.Headers.Append("Content-Security-Policy", csp);
4140
}
42-
// and once again for IE
43-
if (!context.HttpContext.Response.Headers.ContainsKey("X-Content-Security-Policy"))
44-
{
45-
context.HttpContext.Response.Headers.Append("X-Content-Security-Policy", csp);
46-
}
4741

4842
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
4943
var referrer_policy = "no-referrer";

BFF/v4/MultiFrontendSSO/MultiFrontendSSO.IdentityServer/Pages/SecurityHeadersAttribute.cs

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -31,22 +31,15 @@ public override void OnResultExecuting(ResultExecutingContext context)
3131
var csp =
3232
"default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';";
3333
// also consider adding upgrade-insecure-requests once you have HTTPS in place for production
34-
//csp += "upgrade-insecure-requests;";
34+
// csp += "upgrade-insecure-requests;";
3535
// also an example if you need client images to be displayed from twitter
3636
// csp += "img-src 'self' https://pbs.twimg.com;";
3737

38-
// once for standards compliant browsers
3938
if (!context.HttpContext.Response.Headers.ContainsKey("Content-Security-Policy"))
4039
{
4140
context.HttpContext.Response.Headers.Append("Content-Security-Policy", csp);
4241
}
4342

44-
// and once again for IE
45-
if (!context.HttpContext.Response.Headers.ContainsKey("X-Content-Security-Policy"))
46-
{
47-
context.HttpContext.Response.Headers.Append("X-Content-Security-Policy", csp);
48-
}
49-
5043
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
5144
var referrer_policy = "no-referrer";
5245
if (!context.HttpContext.Response.Headers.ContainsKey("Referrer-Policy"))

IdentityServer/v7/AspNetIdentityPasskeys/IdentityServerAspNetIdentityPasskeys/Pages/SecurityHeadersAttribute.cs

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -31,22 +31,15 @@ public override void OnResultExecuting(ResultExecutingContext context)
3131
var csp =
3232
"default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';";
3333
// also consider adding upgrade-insecure-requests once you have HTTPS in place for production
34-
//csp += "upgrade-insecure-requests;";
34+
// csp += "upgrade-insecure-requests;";
3535
// also an example if you need client images to be displayed from twitter
3636
// csp += "img-src 'self' https://pbs.twimg.com;";
3737

38-
// once for standards compliant browsers
3938
if (!context.HttpContext.Response.Headers.ContainsKey("Content-Security-Policy"))
4039
{
4140
context.HttpContext.Response.Headers.Append("Content-Security-Policy", csp);
4241
}
4342

44-
// and once again for IE
45-
if (!context.HttpContext.Response.Headers.ContainsKey("X-Content-Security-Policy"))
46-
{
47-
context.HttpContext.Response.Headers.Append("X-Content-Security-Policy", csp);
48-
}
49-
5043
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
5144
var referrer_policy = "no-referrer";
5245
if (!context.HttpContext.Response.Headers.ContainsKey("Referrer-Policy"))

IdentityServer/v7/Configuration/Permissions/IdentityServer/Pages/SecurityHeadersAttribute.cs

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -34,20 +34,14 @@ public override void OnResultExecuting(ResultExecutingContext context)
3434
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
3535
var csp = "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';";
3636
// also consider adding upgrade-insecure-requests once you have HTTPS in place for production
37-
//csp += "upgrade-insecure-requests;";
37+
// csp += "upgrade-insecure-requests;";
3838
// also an example if you need client images to be displayed from twitter
3939
// csp += "img-src 'self' https://pbs.twimg.com;";
4040

41-
// once for standards compliant browsers
4241
if (!context.HttpContext.Response.Headers.ContainsKey("Content-Security-Policy"))
4342
{
4443
context.HttpContext.Response.Headers.Append("Content-Security-Policy", csp);
4544
}
46-
// and once again for IE
47-
if (!context.HttpContext.Response.Headers.ContainsKey("X-Content-Security-Policy"))
48-
{
49-
context.HttpContext.Response.Headers.Append("X-Content-Security-Policy", csp);
50-
}
5145

5246
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
5347
var referrer_policy = "no-referrer";

IdentityServer/v7/Configuration/PipelineRegistration/IdentityServer/Pages/SecurityHeadersAttribute.cs

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -34,20 +34,14 @@ public override void OnResultExecuting(ResultExecutingContext context)
3434
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
3535
var csp = "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';";
3636
// also consider adding upgrade-insecure-requests once you have HTTPS in place for production
37-
//csp += "upgrade-insecure-requests;";
37+
// csp += "upgrade-insecure-requests;";
3838
// also an example if you need client images to be displayed from twitter
3939
// csp += "img-src 'self' https://pbs.twimg.com;";
4040

41-
// once for standards compliant browsers
4241
if (!context.HttpContext.Response.Headers.ContainsKey("Content-Security-Policy"))
4342
{
4443
context.HttpContext.Response.Headers.Append("Content-Security-Policy", csp);
4544
}
46-
// and once again for IE
47-
if (!context.HttpContext.Response.Headers.ContainsKey("X-Content-Security-Policy"))
48-
{
49-
context.HttpContext.Response.Headers.Append("X-Content-Security-Policy", csp);
50-
}
5145

5246
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
5347
var referrer_policy = "no-referrer";

IdentityServer/v7/Configuration/SimpleDcr/IdentityServer/Pages/SecurityHeadersAttribute.cs

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -34,20 +34,14 @@ public override void OnResultExecuting(ResultExecutingContext context)
3434
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
3535
var csp = "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';";
3636
// also consider adding upgrade-insecure-requests once you have HTTPS in place for production
37-
//csp += "upgrade-insecure-requests;";
37+
// csp += "upgrade-insecure-requests;";
3838
// also an example if you need client images to be displayed from twitter
3939
// csp += "img-src 'self' https://pbs.twimg.com;";
4040

41-
// once for standards compliant browsers
4241
if (!context.HttpContext.Response.Headers.ContainsKey("Content-Security-Policy"))
4342
{
4443
context.HttpContext.Response.Headers.Append("Content-Security-Policy", csp);
4544
}
46-
// and once again for IE
47-
if (!context.HttpContext.Response.Headers.ContainsKey("X-Content-Security-Policy"))
48-
{
49-
context.HttpContext.Response.Headers.Append("X-Content-Security-Policy", csp);
50-
}
5145

5246
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
5347
var referrer_policy = "no-referrer";

IdentityServer/v7/Configuration/SoftwareStatement/IdentityServer/Pages/SecurityHeadersAttribute.cs

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -34,20 +34,14 @@ public override void OnResultExecuting(ResultExecutingContext context)
3434
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
3535
var csp = "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';";
3636
// also consider adding upgrade-insecure-requests once you have HTTPS in place for production
37-
//csp += "upgrade-insecure-requests;";
37+
// csp += "upgrade-insecure-requests;";
3838
// also an example if you need client images to be displayed from twitter
3939
// csp += "img-src 'self' https://pbs.twimg.com;";
4040

41-
// once for standards compliant browsers
4241
if (!context.HttpContext.Response.Headers.ContainsKey("Content-Security-Policy"))
4342
{
4443
context.HttpContext.Response.Headers.Append("Content-Security-Policy", csp);
4544
}
46-
// and once again for IE
47-
if (!context.HttpContext.Response.Headers.ContainsKey("X-Content-Security-Policy"))
48-
{
49-
context.HttpContext.Response.Headers.Append("X-Content-Security-Policy", csp);
50-
}
5145

5246
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
5347
var referrer_policy = "no-referrer";

IdentityServer/v7/Diagnostics/Aspire/IdentityServer/Pages/SecurityHeadersAttribute.cs

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -30,20 +30,14 @@ public override void OnResultExecuting(ResultExecutingContext context)
3030
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy
3131
var csp = "default-src 'self'; object-src 'none'; frame-ancestors 'none'; sandbox allow-forms allow-same-origin allow-scripts; base-uri 'self';";
3232
// also consider adding upgrade-insecure-requests once you have HTTPS in place for production
33-
//csp += "upgrade-insecure-requests;";
33+
// csp += "upgrade-insecure-requests;";
3434
// also an example if you need client images to be displayed from twitter
3535
// csp += "img-src 'self' https://pbs.twimg.com;";
3636

37-
// once for standards compliant browsers
3837
if (!context.HttpContext.Response.Headers.ContainsKey("Content-Security-Policy"))
3938
{
4039
context.HttpContext.Response.Headers.Append("Content-Security-Policy", csp);
4140
}
42-
// and once again for IE
43-
if (!context.HttpContext.Response.Headers.ContainsKey("X-Content-Security-Policy"))
44-
{
45-
context.HttpContext.Response.Headers.Append("X-Content-Security-Policy", csp);
46-
}
4741

4842
// https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy
4943
var referrer_policy = "no-referrer";

0 commit comments

Comments
 (0)