Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[security] Slightly improve CSP header #3757

Merged
merged 5 commits into from
Jul 6, 2024

Conversation

oliviertassinari
Copy link
Member

@oliviertassinari oliviertassinari commented Jul 4, 2024

A starting point for a CSP rule with permissive rules that we can narrow down overtime: https://stackoverflow.com/questions/35978863/allow-all-content-security-policy

Context: https://groups.google.com/a/mui.com/g/team-store/c/6tkWMOQ2ho0.

@oliviertassinari oliviertassinari added security Pull requests that address a security vulnerability scope: toolpad-studio Abbreviated to "studio" labels Jul 5, 2024
@Janpot
Copy link
Member

Janpot commented Jul 6, 2024

The problem seems to be that the iframe lives on about:blank which likely has some elevated policies being a chromium internal page. I didn't investigate deeper, just changed the test to go to https://example.com first and now it seems to pass.

@Janpot Janpot merged commit 0321eb8 into mui:master Jul 6, 2024
14 checks passed
@oliviertassinari oliviertassinari deleted the csp-baseline branch July 6, 2024 14:36
@oliviertassinari
Copy link
Member Author

Oh, I didn't think about this. You nailed it 👍, thanks

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
scope: toolpad-studio Abbreviated to "studio" security Pull requests that address a security vulnerability
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants