Skip to content

Commit 3622c1b

Browse files
committed
3.0.3 version bump
1 parent 082f6c8 commit 3622c1b

File tree

2 files changed

+20
-1
lines changed

2 files changed

+20
-1
lines changed

CHANGELOG.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,22 @@
1+
## 3.0.3
2+
3+
Bug fix for handling policy merges where appending a non-default source value (report-uri, plugin-types, frame-ancestors, base-uri, and form-action) would be combined with the default-src value. Appending a directive that doesn't exist in the current policy combines the new value with `default-src` to mimic the actual behavior of the addition. However, this does not make sense for non-default-src values (a.k.a. "fetch directives") and can lead to unexpected behavior like a `report-uri` value of `*`. Previously, this config:
4+
5+
```
6+
{
7+
default_src => %w(*)
8+
}
9+
```
10+
11+
When appending:
12+
13+
```
14+
{
15+
report_uri => %w(https://report-uri.io/asdf)
16+
}
17+
18+
Would result in `default-src *; report-uri *` which doesn't make any sense at all.
19+
120
## 3.0.2
221
322
Bug fix for handling CSP configs that supply a frozen hash. If a directive value is `nil`, then appending to a config with a frozen hash would cause an error since we're trying to modify a frozen hash. See https://github.com/twitter/secureheaders/pull/223.

secure_headers.gemspec

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# -*- encoding: utf-8 -*-
22
Gem::Specification.new do |gem|
33
gem.name = "secure_headers"
4-
gem.version = "3.0.2"
4+
gem.version = "3.0.3"
55
gem.authors = ["Neil Matatall"]
66
gem.email = ["[email protected]"]
77
gem.description = 'Security related headers all in one gem.'

0 commit comments

Comments
 (0)