please set additional response headers in balrog admin nginx
Categories
(Cloud Services :: Operations: Product Delivery, task)
Tracking
(Not tracked)
People
(Reporter: bhearsum, Assigned: oremj)
References
Details
Comment 1•7 years ago
|
||
Reporter | ||
Comment 2•7 years ago
|
||
Comment 3•7 years ago
|
||
Assignee | ||
Updated•6 years ago
|
Assignee | ||
Comment 4•6 years ago
|
||
Assignee | ||
Comment 5•6 years ago
|
||
Merged. Will go out in the next GCP deployment. Do you want these in AWS as well?
Reporter | ||
Comment 6•6 years ago
|
||
(In reply to Jeremy Orem [:oremj] from comment #5)
Merged. Will go out in the next GCP deployment. Do you want these in AWS as
well?
I think it's probably fine not to worry about AWS, it's going away soon enough.
Also, it looks like this CSP busts the site, because the js and css can't load :(. We need this change applied to fix it AFAICT. Sorry for the churn.
diff --git a/projects/balrog/k8s/charts/admin/templates/nginx-configmap.yaml b/projects/balrog/k8s/charts/admin/templates/nginx-configmap.yaml
index ae6efa18..8fb96fbc 100644
--- a/projects/balrog/k8s/charts/admin/templates/nginx-configmap.yaml
+++ b/projects/balrog/k8s/charts/admin/templates/nginx-configmap.yaml
@@ -77,17 +77,17 @@ data:
client_max_body_size 5M;
# Health checks don't send an x-forwarded-proto header and we need to make sure they don't get infinite redirects
if ($http_x_forwarded_proto = 'http') {
return 302 {{ .Values.baseUrl }}$request_uri;
}
add_header Strict-Transport-Security "max-age=31536000" always;
-
add_header Content-Security-Policy "default-src 'none'; frame-ancestors 'none'" always;
-
add_header Content-Security-Policy "default-src 'self'; frame-ancestors 'none'" always; add_header X-Content-Type-Options "nosniff" always; add_header X-Frame-Options "DENY" always; location / { proxy_set_header x-forwarded-proto $http_x_forwarded_proto; proxy_set_header x-forwarded-for $proxy_add_x_forwarded_for; proxy_set_header Host $http_host; proxy_redirect off;
Assignee | ||
Comment 7•6 years ago
|
||
Merged that change.
Reporter | ||
Comment 8•6 years ago
|
||
(In reply to Jeremy Orem [:oremj] from comment #7)
Merged that change.
With apologies for the churn, can we get rid of the Content-Security-Policy from nginx? I discovered that I can set it in a <meta> tag, which should be easier for everyone.
Assignee | ||
Comment 9•6 years ago
|
||
Assignee | ||
Updated•6 years ago
|
Description
•