Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

PT-10550: adds the security headers to all responses #2680

Merged
merged 2 commits into from
Aug 1, 2023

Conversation

OlegoO
Copy link
Contributor

@OlegoO OlegoO commented Jul 31, 2023

Description

feat: Adds the following security headers to all responses:

  • X-Content-Type-Options: nosniff
    Strict-Transport-Security: max-age=31536000; includeSubDomains - only applied to HTTPS responses
  • X-Frame-Options: Deny - only applied to "document" responses
  • X-XSS-Protection: 1; mode=block - only applied to "document" responses
  • Referrer-Policy: strict-origin-when-cross-origin - only applied to "document" responses
  • Content-Security-Policy: object-src 'none'; form-action 'self'; frame-ancestors 'none' - only applied to "document" responses

by using https://github.com/andrewlock/NetEscapades.AspNetCore.SecurityHeaders

References

QA-test:

Jira-link:

Artifact URL:

* X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=31536000; includeSubDomains - only applied to HTTPS responses
* X-Frame-Options: Deny - only applied to "document" responses
* X-XSS-Protection: 1; mode=block - only applied to "document" responses
* Referrer-Policy: strict-origin-when-cross-origin - only applied to "document" responses
* Content-Security-Policy: object-src 'none'; form-action 'self'; frame-ancestors 'none' - only applied to "document" responses
@sonarcloud
Copy link

sonarcloud bot commented Jul 31, 2023

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
No Duplication information No Duplication information

@OlegoO OlegoO merged commit a3327ca into dev Aug 1, 2023
10 checks passed
@OlegoO OlegoO deleted the feat/PT-10550-Content-Security-Policy branch August 1, 2023 16:20
OlegoO added a commit that referenced this pull request Aug 23, 2023
feat:  adds the security headers to all responses (#2680)
* X-Content-Type-Options: nosniff
* Strict-Transport-Security: max-age=31536000; includeSubDomains - only applied to HTTPS responses
* X-Frame-Options: Deny - only applied to "document" responses
* X-XSS-Protection: 1; mode=block - only applied to "document" responses
* Referrer-Policy: strict-origin-when-cross-origin - only applied to "document" responses
* Content-Security-Policy: object-src 'none'; form-action 'self'; frame-ancestors 'none' - only applied to "document" responses
OlegoO added a commit that referenced this pull request Aug 23, 2023
feat:  adds the security headers to all responses (#2680)
* X-Content-Type-Options: nosniff
* Strict-Transport-Security: max-age=31536000; includeSubDomains - only applied to HTTPS responses
* X-Frame-Options: Deny - only applied to "document" responses
* X-XSS-Protection: 1; mode=block - only applied to "document" responses
* Referrer-Policy: strict-origin-when-cross-origin - only applied to "document" responses
* Content-Security-Policy: object-src 'none'; form-action 'self'; frame-ancestors 'none' - only applied to "document" responses
OlegoO added a commit that referenced this pull request Sep 26, 2023
feat:  adds the security headers to all responses (#2680)
* X-Content-Type-Options: nosniff
* Strict-Transport-Security: max-age=31536000; includeSubDomains - only applied to HTTPS responses
* X-Frame-Options: Deny - only applied to "document" responses
* X-XSS-Protection: 1; mode=block - only applied to "document" responses
* Referrer-Policy: strict-origin-when-cross-origin - only applied to "document" responses
* Content-Security-Policy: object-src 'none'; form-action 'self'; frame-ancestors 'none' - only applied to "document" responses
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants