Skip to content

Commit e21ffad

Browse files
ljedaljeda
authored andcommitted
Set even more strict CSP header in redirect response
1 parent e2bf828 commit e21ffad

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

index.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -200,7 +200,7 @@ function createRedirectDirectoryListener () {
200200
res.statusCode = 301
201201
res.setHeader('Content-Type', 'text/html; charset=UTF-8')
202202
res.setHeader('Content-Length', Buffer.byteLength(doc))
203-
res.setHeader('Content-Security-Policy', "default-src 'none'")
203+
res.setHeader('Content-Security-Policy', "default-src 'none'; frame-ancestors 'none'; form-action 'none'")
204204
res.setHeader('X-Content-Type-Options', 'nosniff')
205205
res.setHeader('Location', loc)
206206
res.end(doc)

test/test.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -511,7 +511,7 @@ describe('serveStatic()', function () {
511511
it('should respond with default Content-Security-Policy', function (done) {
512512
request(server)
513513
.get('/users')
514-
.expect('Content-Security-Policy', "default-src 'none'")
514+
.expect('Content-Security-Policy', "default-src 'none'; frame-ancestors 'none'; form-action 'none'")
515515
.expect(301, done)
516516
})
517517

0 commit comments

Comments
 (0)