summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorPaulo Schneider <paulo.schneider@gmail.com>2016-02-19 21:13:47 +0000
committerPaulo Schneider <paulo.schneider@gmail.com>2016-02-20 09:45:33 +0000
commit0b2461a655684c6d706d30a081350e59601eab33 (patch)
treef5b8598f5afbb0005486795c66577dbbd9f41718
parentf1b338e5564a8458c906f903ee7e0383dae86287 (diff)
Add recommended security headers from #618
-rw-r--r--service/pixelated/config/site.py11
-rw-r--r--service/test/unit/config/test_site.py11
2 files changed, 14 insertions, 8 deletions
diff --git a/service/pixelated/config/site.py b/service/pixelated/config/site.py
index 8806366a..6a29c478 100644
--- a/service/pixelated/config/site.py
+++ b/service/pixelated/config/site.py
@@ -2,12 +2,15 @@ from twisted.web.server import Site, Request
class AddCSPHeaderRequest(Request):
- HEADER_VALUES = "default-src 'self'; style-src 'self' 'unsafe-inline'"
+ CSP_HEADER_VALUES = "default-src 'self'; style-src 'self' 'unsafe-inline'"
def process(self):
- self.setHeader("Content-Security-Policy", self.HEADER_VALUES)
- self.setHeader("X-Content-Security-Policy", self.HEADER_VALUES)
- self.setHeader("X-Webkit-CSP", self.HEADER_VALUES)
+ self.setHeader('Content-Security-Policy', self.CSP_HEADER_VALUES)
+ self.setHeader('X-Content-Security-Policy', self.CSP_HEADER_VALUES)
+ self.setHeader('X-Webkit-CSP', self.CSP_HEADER_VALUES)
+ self.setHeader('X-Frame-Options', 'SAMEORIGIN')
+ self.setHeader('X-XSS-Protection', '1; mode=block')
+ self.setHeader('X-Content-Type-Options', 'nosniff')
if self.isSecure():
self.setHeader('Strict-Transport-Security', 'max-age=31536000; includeSubDomains')
diff --git a/service/test/unit/config/test_site.py b/service/test/unit/config/test_site.py
index 83464e89..7c381449 100644
--- a/service/test/unit/config/test_site.py
+++ b/service/test/unit/config/test_site.py
@@ -5,15 +5,18 @@ from twisted.protocols.basic import LineReceiver
class TestPixelatedSite(unittest.TestCase):
- def test_add_csp_header_request(self):
+ def test_add_security_headers(self):
request = self.create_request()
request.process()
headers = request.headers
header_value = "default-src 'self'; style-src 'self' 'unsafe-inline'"
- self.assertEqual(headers.get("Content-Security-Policy"), header_value)
- self.assertEqual(headers.get("X-Content-Security-Policy"), header_value)
- self.assertEqual(headers.get("X-Webkit-CSP"), header_value)
+ self.assertEqual(headers.get('Content-Security-Policy'), header_value)
+ self.assertEqual(headers.get('X-Content-Security-Policy'), header_value)
+ self.assertEqual(headers.get('X-Webkit-CSP'), header_value)
+ self.assertEqual(headers.get('X-Frame-Options'), 'SAMEORIGIN')
+ self.assertEqual(headers.get('X-XSS-Protection'), '1; mode=block')
+ self.assertEqual(headers.get('X-Content-Type-Options'), 'nosniff')
def test_add_strict_transport_security_header_if_secure(self):
request = self.create_request()