feat: Enable CSP with nonce + strict-dynamic #360
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Tryout a content security policy with nonce + strict-dynamic.
Motivation and Context
This is to help mitigate the risk of XSS.
A more in detail (but not exhaustive) description of what should be protected and what not can be found in adobe/helix-html-pipeline#773 .
Note: currently the nonce generation is Helix 5 only.
As far as I can see, da.live is currently using Helix 4, so it would either need an upgrade of DA to Helix 5, or the backport of the feature to Helix 4 to be deployed (adobe/helix-html-pipeline#811)
How Has This Been Tested?
Manually on https://csp--da-live--adobe.aem.live/ .
I did not observe any CSP violations in the navigation or editor.
Would be interesting if there are any additional automated tests that can be executed.
LE.: looks like the playwright tests from the PR are passing. 🙂
Types of changes
Checklist: