Class: ActionDispatch::ContentSecurityPolicy
- Inherits:
 - 
      Object
      
        
- Object
 - ActionDispatch::ContentSecurityPolicy
 
 
- Defined in:
 - lib/action_dispatch/http/content_security_policy.rb
 
Overview
Action Dispatch Content Security Policy
Configures the HTTP Content-Security-Policy response header to help protect against XSS and injection attacks.
Example global policy:
Rails.application.config.content_security_policy do |policy|
  policy.default_src :self, :https
  policy.font_src    :self, :https, :data
  policy.img_src     :self, :https, :data
  policy.object_src  :none
  policy.script_src  :self, :https
  policy.style_src   :self, :https
  # Specify URI for violation reports
  policy.report_uri "/csp-violation-report-endpoint"
end
  Defined Under Namespace
Modules: Request Classes: Middleware
Instance Attribute Summary collapse
- 
  
    
      #directives  ⇒ Object 
    
    
  
  
  
  
    
      readonly
    
    
  
  
  
  
  
  
    
Returns the value of attribute directives.
 
Instance Method Summary collapse
- 
  
    
      #block_all_mixed_content(enabled = true)  ⇒ Object 
    
    
  
  
  
  
  
  
  
  
  
    
Specify whether to prevent the user agent from loading any assets over HTTP when the page uses HTTPS:.
 - #build(context = nil, nonce = nil, nonce_directives = nil) ⇒ Object
 - 
  
    
      #initialize {|_self| ... } ⇒ ContentSecurityPolicy 
    
    
  
  
  
    constructor
  
  
  
  
  
  
  
    
A new instance of ContentSecurityPolicy.
 - #initialize_copy(other) ⇒ Object
 - 
  
    
      #plugin_types(*types)  ⇒ Object 
    
    
  
  
  
  
  
  
  
  
  
    
Restricts the set of plugins that can be embedded:.
 - 
  
    
      #report_uri(uri)  ⇒ Object 
    
    
  
  
  
  
  
  
  
  
  
    
Enable the report-uri directive.
 - 
  
    
      #require_sri_for(*types)  ⇒ Object 
    
    
  
  
  
  
  
  
  
  
  
    
Specify asset types for which Subresource Integrity is required:.
 - 
  
    
      #sandbox(*values)  ⇒ Object 
    
    
  
  
  
  
  
  
  
  
  
    
Specify whether a sandbox should be enabled for the requested resource:.
 - 
  
    
      #upgrade_insecure_requests(enabled = true)  ⇒ Object 
    
    
  
  
  
  
  
  
  
  
  
    
Specify whether user agents should treat any assets over HTTP as HTTPS:.
 
Constructor Details
#initialize {|_self| ... } ⇒ ContentSecurityPolicy
Returns a new instance of ContentSecurityPolicy.
      174 175 176 177  | 
    
      # File 'lib/action_dispatch/http/content_security_policy.rb', line 174 def initialize @directives = {} yield self if block_given? end  | 
  
Instance Attribute Details
#directives ⇒ Object (readonly)
Returns the value of attribute directives.
      172 173 174  | 
    
      # File 'lib/action_dispatch/http/content_security_policy.rb', line 172 def directives @directives end  | 
  
Instance Method Details
#block_all_mixed_content(enabled = true) ⇒ Object
Specify whether to prevent the user agent from loading any assets over HTTP when the page uses HTTPS:
policy.block_all_mixed_content
Pass false to allow it again:
policy.block_all_mixed_content false
  
      202 203 204 205 206 207 208  | 
    
      # File 'lib/action_dispatch/http/content_security_policy.rb', line 202 def block_all_mixed_content(enabled = true) if enabled @directives["block-all-mixed-content"] = true else @directives.delete("block-all-mixed-content") end end  | 
  
#build(context = nil, nonce = nil, nonce_directives = nil) ⇒ Object
      291 292 293 294  | 
    
      # File 'lib/action_dispatch/http/content_security_policy.rb', line 291 def build(context = nil, nonce = nil, nonce_directives = nil) nonce_directives = DEFAULT_NONCE_DIRECTIVES if nonce_directives.nil? build_directives(context, nonce, nonce_directives).compact.join("; ") end  | 
  
#initialize_copy(other) ⇒ Object
      179 180 181  | 
    
      # File 'lib/action_dispatch/http/content_security_policy.rb', line 179 def initialize_copy(other) @directives = other.directives.deep_dup end  | 
  
#plugin_types(*types) ⇒ Object
Restricts the set of plugins that can be embedded:
policy.plugin_types "application/x-shockwave-flash"
Leave empty to allow all plugins:
policy.plugin_types
  
      218 219 220 221 222 223 224  | 
    
      # File 'lib/action_dispatch/http/content_security_policy.rb', line 218 def plugin_types(*types) if types.first @directives["plugin-types"] = types else @directives.delete("plugin-types") end end  | 
  
#report_uri(uri) ⇒ Object
Enable the report-uri directive. Violation reports will be sent to the specified URI:
policy.report_uri "/csp-violation-report-endpoint"
  
      231 232 233  | 
    
      # File 'lib/action_dispatch/http/content_security_policy.rb', line 231 def report_uri(uri) @directives["report-uri"] = [uri] end  | 
  
#require_sri_for(*types) ⇒ Object
Specify asset types for which Subresource Integrity is required:
policy.require_sri_for :script, :style
Leave empty to not require Subresource Integrity:
policy.require_sri_for
  
      244 245 246 247 248 249 250  | 
    
      # File 'lib/action_dispatch/http/content_security_policy.rb', line 244 def require_sri_for(*types) if types.first @directives["require-sri-for"] = types else @directives.delete("require-sri-for") end end  | 
  
#sandbox(*values) ⇒ Object
Specify whether a sandbox should be enabled for the requested resource:
policy.sandbox
Values can be passed as arguments:
policy.sandbox "allow-scripts", "allow-modals"
Pass false to disable the sandbox:
policy.sandbox false
  
      265 266 267 268 269 270 271 272 273  | 
    
      # File 'lib/action_dispatch/http/content_security_policy.rb', line 265 def sandbox(*values) if values.empty? @directives["sandbox"] = true elsif values.first @directives["sandbox"] = values else @directives.delete("sandbox") end end  | 
  
#upgrade_insecure_requests(enabled = true) ⇒ Object
Specify whether user agents should treat any assets over HTTP as HTTPS:
policy.upgrade_insecure_requests
Pass false to disable it:
policy.upgrade_insecure_requests false
  
      283 284 285 286 287 288 289  | 
    
      # File 'lib/action_dispatch/http/content_security_policy.rb', line 283 def upgrade_insecure_requests(enabled = true) if enabled @directives["upgrade-insecure-requests"] = true else @directives.delete("upgrade-insecure-requests") end end  |