Releases: GetPageSpeed/ngx_security_headers
Releases · GetPageSpeed/ngx_security_headers
v0.2.0: Cross-Origin Security Headers
What's New
This release adds support for three Cross-Origin HTTP security headers as requested in #17:
New Directives
| Directive | Values | Default |
|---|---|---|
security_headers_corp |
same-site, same-origin, cross-origin, omit | same-site |
security_headers_coop |
same-origin, same-origin-allow-popups, unsafe-none, omit | omit |
security_headers_coep |
require-corp, credentialless, unsafe-none, omit | omit |
Design Decisions
- CORP defaults to
same-site- Safe opt-out default that only affects how YOUR resources are embedded elsewhere - COOP/COEP default to
omit- Opt-in because they can break popup communication and third-party resources - COEP includes
credentialless- Provides a middle ground for cross-origin isolation
Cross-Origin Isolation
To enable full cross-origin isolation (required for SharedArrayBuffer):
security_headers on;
security_headers_corp same-origin;
security_headers_coop same-origin;
security_headers_coep require-corp;References
- MDN: Cross-Origin-Resource-Policy
- MDN: Cross-Origin-Opener-Policy
- MDN: Cross-Origin-Embedder-Policy
- web.dev: Cross-Origin Isolation Guide
Fixes #17
v0.1.2
What's Changed
- More headers to hide, more tests, if replaced by switch by @novashdima in #23
New Contributors
- @novashdima made their first contribution in #23
Full Changelog: 0.1.1...0.1.2
v0.1.1
Fixed issue with scheme extraction (#22), thanks to @kosmas-valianos for the contribution.
v0.1.0
v0.0.11
v0.0.10
v0.0.9
- Hide more server tokens
- Optimization (e.g. don't send X-Frame-Options for non-HTML)
v0.0.8
Added security_headers_referrer_policy directive
v0.0.7
- Reliable header replacement
- Added HSTS
v0.0.4
Overwrites existing security headers, instead of duplicating them