##// END OF EJS Templates
hgweb: allow Content-Security-Policy header on 304 responses (issue5844)...
Gregory Szorc -
r37847:3e3acf5d stable
parent child Browse files
Show More
@@ -473,6 +473,7 class wsgiresponse(object):
473 if k.lower() not in ('date', 'etag', 'expires',
473 if k.lower() not in ('date', 'etag', 'expires',
474 'cache-control',
474 'cache-control',
475 'content-location',
475 'content-location',
476 'content-security-policy',
476 'vary')}
477 'vary')}
477 if badheaders:
478 if badheaders:
478 raise error.ProgrammingError(
479 raise error.ProgrammingError(
@@ -57,8 +57,8 static page should send CSP when enabled
57 $ get-with-headers.py --twice --headeronly localhost:$HGPORT repo1/static/style.css content-security-policy
57 $ get-with-headers.py --twice --headeronly localhost:$HGPORT repo1/static/style.css content-security-policy
58 200 Script output follows
58 200 Script output follows
59 content-security-policy: script-src https://example.com/ 'unsafe-inline'
59 content-security-policy: script-src https://example.com/ 'unsafe-inline'
60 500 Internal Server Error
60 304 Not Modified
61 [1]
61 content-security-policy: script-src https://example.com/ 'unsafe-inline'
62
62
63 repo page should send CSP by default, include etag w/o nonce
63 repo page should send CSP by default, include etag w/o nonce
64
64
General Comments 0
You need to be logged in to leave comments. Login now