Skip to content

Commit

Permalink
Update Content-Security-Policy header usage explanation (vercel#33833)
Browse files Browse the repository at this point in the history
This PR improves the Content-Security-Policy header usage explanation in the `next.config.js` file.



## Bug

- [x] Related issues linked using fixes vercel#33598 
- [ ] Integration tests added
- [ ] Errors have helpful link attached, see `contributing.md`

## Feature

- [ ] Implements an existing feature request or RFC. Make sure the feature request has been accepted for implementation before opening a PR.
- [ ] Related issues linked using `fixes #number`
- [ ] Integration tests added
- [x] Documentation added
- [ ] Telemetry added. In case of a feature if it's used or not.
- [ ] Errors have helpful link attached, see `contributing.md`

## Documentation / Examples

- [x] Make sure the linting passes by running `yarn lint`
  • Loading branch information
amandeepmittal authored and natew committed Feb 16, 2022
1 parent 12c52ed commit 9695780
Showing 1 changed file with 20 additions and 1 deletion.
21 changes: 20 additions & 1 deletion docs/advanced-features/security-headers.md
Expand Up @@ -113,10 +113,29 @@ This header helps prevent cross-site scripting (XSS), clickjacking and other cod

You can read about the many different CSP options [here](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP).

You can add Content Security Policy directives using a template string.

```jsx
// Before defining your Security Headers
// add Content Security Policy directives using a template string.

const ContentSecurityPolicy = `
default-src 'self';
script-src 'self';
child-src example.com;
style-src 'self' example.com;
font-src 'self';
`
```

When a directive uses a keyword such as `self`, wrap it in single quotes `''`.

In the header's value, replace the new line with an empty string.

```jsx
{
key: 'Content-Security-Policy',
value: // Your CSP Policy
value: ContentSecurityPolicy.replace(/\s{2,}/g, ' ').trim()
}
```

Expand Down

0 comments on commit 9695780

Please sign in to comment.