Fix security headers

This commit is contained in:
Fijxu 2022-12-04 17:39:23 -03:00
parent bb1205f4ea
commit e72c482e75
1 changed files with 4 additions and 3 deletions

View File

@ -4,8 +4,6 @@ server {
server_name search.zzls.xyz;
include configs/general.conf;
include configs/securityheaders.conf;
if ($server_protocol ~* "HTTP/1.0") {
return 444;
@ -37,7 +35,10 @@ server {
# QUIC
add_header Alt-Svc 'h3=":443"; ma=86400';
# CSP
# CSP + Security Headers
# include configs/securityheaders.conf;
add_header Permissions-Policy "interest-cohort=()" always;
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always;
add_header Content-Security-Policy "default-src 'none'; script-src 'self'; style-src 'self' 'unsafe-inline'; form-action 'self' https://github.com/tiekoetter/searxng/issues/new; font-src 'self'; frame-ancestors 'self'; base-uri 'self'; connect-src 'self' https://overpass-api.de; img-src 'self' data: https://*.tile.openstreetmap.org; frame-src 'self' https://www.youtube-nocookie.com https://invidious.tiekoetter.com https://player.vimeo.com https://www.dailymotion.com https://www.deezer.com https://www.mixcloud.com https://w.soundcloud.com https://embed.spotify.com https://open.spotify.com/" always;
quic_retry on;