Commit Graph

13 Commits

Author SHA1 Message Date
Emily Stark
a8673d01cd Set X-Content-Type-Options in browser-policy-content 2014-05-08 12:12:45 -07:00
David Glasser
6471dce8fa Merge branch 'devel' into shark 2014-01-27 13:58:11 -08:00
Avital Oliver
ede2e80d48 {{#better_markdown}} -> {{#markdown}} 2014-01-20 00:03:01 -08:00
Emily Stark
189845f1fb Add frame-src to browser-policy-content. 2014-01-11 20:43:36 -08:00
Emily Stark
f89941412a Smooth over some cross-browser CSP differences.
* Adding "foo.com" to your CSP via browser-policy now adds both
  "http://foo.com" and "https://foo.com". This smooths over the fact
  that some browsers interpret "foo.com" as "http://foo.com" and some
  interpret it as http AND https.
* Trim trailing slashes from origins. Firefox does not allow content
  from foo.com if you add "foo.com/" to your CSP.
2014-01-11 20:36:01 -08:00
Emily Stark
18704dccaa Note in the docs that BrowserPolicy can only be used in server code 2013-12-04 10:40:49 -08:00
Emily Stark
9609fa2313 Tweak browser-policy-framing docs 2013-10-03 13:56:03 -07:00
Emily Stark
b5286b941a Separate browser policy functions into two packages.
* browser-policy uses browser-policy-framing and browser-policy-content, both of
  which set default policies when they are used. This way you get a default
  policy when you add a browser policy package, but you can pick and choose
  different packages if you only want to think about one of them.
* The two packages use different namespaces: BrowserPolicy.framing and
  BrowserPolicy.content, which meant some functions got renamed (e.g. not using
  "framing" or "content in the function name when it's already in the
  namespace).
2013-10-03 13:56:03 -07:00
Emily Stark
d5159ae81b Rename BrowserPolicy framing functions.
Orient them around the default policy, which is app can be framed by any origin.
2013-10-03 13:56:03 -07:00
Emily Stark
9d1e3dbd56 Enable CSP differently for tests.
Avoids sending header and using meteor_runtime_config.js on tests. Also tweak
wording on browser-policy docs.
2013-09-28 18:44:31 -07:00
Emily Stark
a102872a96 Rework browser-policy to make API more intuitive.
- Remove starter-browser-policy and replace it with
  BrowserPolicy.enableContentSecurityPolicy(), which gives you the starter
  policy and allows you to use the other BrowserPolicy functions to configure
  it. This is motivated by the fact that the API isn't very intuitive without a
  well-defined starting policy. ex: if the package starts off without a policy,
  and then the user calls allowAllContentSameOrigin(), that will result in
  turning off inline scripts, which is probably not what they wanted.
- AllContent functions do more of what you'd expect now;
  i.e. BrowserPolicy.disallowAllContent() actually disallows all content,
  instead of setting default-src to 'none', which will allow other types of
  content that have previously had srcs set for them.
- Add some tests
2013-09-28 18:44:04 -07:00
Emily Stark
e6300461b1 Reorganize browser-policy docs a bit.
Addressing Nick's suggestions. Haven't decided yet about combining
browser-policy and starter-browser-policy docs.
2013-09-28 18:44:04 -07:00
Emily Stark
4893fe048c Package for security-related http headers. 2013-09-28 18:44:04 -07:00