This commit is contained in:
siyuniu-ms 2024-09-11 16:18:43 -07:00 коммит произвёл GitHub
Родитель fe5c933874
Коммит 11f7029d66
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: B5690EEEBB952194
4 изменённых файлов: 118 добавлений и 10 удалений

Различия файлов скрыты, потому что одна или несколько строк слишком длинны

Просмотреть файл

@ -342,6 +342,10 @@ declare var cfg:ISnippetConfig;
} else { } else {
(scriptElement as any)["src"] = src; (scriptElement as any)["src"] = src;
} }
if (cfg.nt) {
(scriptElement as any).setAttribute("nonce", cfg.nt);
}
if (integrity){ if (integrity){
// Set the integrity attribute to the script tag if integrity is provided // Set the integrity attribute to the script tag if integrity is provided

Просмотреть файл

@ -47,6 +47,10 @@ export interface ISnippetConfig {
* Custom optional value to specify the trusted type policy that would be applied on the snippet src * Custom optional value to specify the trusted type policy that would be applied on the snippet src
*/ */
ttp?: TrustedTypePolicy; ttp?: TrustedTypePolicy;
/**
* Custom optional value to specify the nounce tag value that would be applied on the script when we drop it on the page
*/
nt?: string;
} }
export interface Fields { export interface Fields {

Просмотреть файл

@ -1,9 +1,10 @@
# Trust Type Support # Trusted Type Policy Support
We offer two methods for implementing Trusted Type policy checks. Choose the one that best suits your needs. We provide two methods for implementing Trusted Type policy checks. Choose the one that best aligns with your application's security requirements.
## Case 1: Enforcing Trusted Types with require-trusted-types-for 'script'
If your page enforces script injection policies using the require-trusted-types-for 'script' directive, configure the snippet with the following options.
## Method 1: Using require-trusted-types-for 'script'
If your page utilizes require-trusted-types-for 'script' to enforce script injection policies, configure your snippet as follows:
### Configuration Options ### Configuration Options
```js ```js
/** /**
@ -20,8 +21,8 @@ If your page utilizes require-trusted-types-for 'script' to enforce script injec
ttp?: TrustedTypePolicy; ttp?: TrustedTypePolicy;
``` ```
### Automatic Policy Creation ### Automatic Policy Creation
To have the policy automatically created, set pl to true. You can optionally specify a policy name with pn. To automatically create and apply a Trusted Type policy, set pl to true. Optionally, you can specify a custom policy name using the pn parameter.
Example usage: Example:
```html ```html
<script> <script>
!(function (cfg) ....)({ !(function (cfg) ....)({
@ -35,8 +36,7 @@ Example usage:
</script> </script>
``` ```
### Using a Custom Trusted Type Policy ### Using a Custom Trusted Type Policy
If you prefer to pass your own Trusted Type Policy, create it and then apply it using the ttp option. If you prefer to use your own Trusted Type policy, you can create and pass it using the ttp option.
Example: Example:
```html ```html
<script> <script>
@ -57,6 +57,24 @@ Example:
</script> </script>
``` ```
### Test ### Test
Your could also check our [test](./Tests/manual/cspUsePolicyTest.html) You can test the Trusted Type policy implementation by using our [test example](./Tests/manual/cspUsePolicyTest.html)
## Method 2: Using Nonce Tag and script-src ## Method 2: Enforcing Script Policies with Nonce and script-src
If your page enforces script injection policies via the script-src 'self' directive, you can configure the snippet to use a nonce value.
Example:
```html
<script>
!(function (cfg) ....)({
src: "https://js.monitor.azure.com/scripts/b/ai.3.gbl.min.js",
nt: "randomNonceValue",
cfg: {
connectionString: ""
}
});
</script>
```
When the Application Insights script is added to your page, the provided nonce value will be tagged appropriately.
Notice: Make sure to include the nonce value in your Content Security Policy (CSP) directive as follows:
```html
script-src 'self' 'nonce-randomNonceValue'
```