You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| alloworigin |`['localhost']`| domain name whitelist |
173
173
| usessl |`true` or `false`| set to use ssl server (if true will auto turn on `protocolusessl`) |
174
-
| hsts |`{"enable": "true", "maxAgeSeconds": "31536000", "includeSubdomains": "true", "preload": "true"}`|[HSTS](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) options to use with HTTPS (default is the example value, max age is a year) |
175
-
| csp |`{"enable": "true", "directives": {"scriptSrc": "trustwodthy-scripts.example.com"}, "upgradeInsecureRequests": "auto", "addDefaults": "true"}`| Configures [Content Security Policy](https://helmetjs.github.io/docs/csp/). Directives are directly passed to Helmet, so [their format](https://helmetjs.github.io/docs/csp/)applies. Further, some defaults are added so that the application doesn't break. To disable adding these defaults, set `addDefaults` to `false`. If `usecdn` is on, default CDN locations are allowed too. By default (`auto`), insecure (HTTP) requests are upgraded to HTTPS via CSP if `usessl` is on. To change this behaviour, set `upgradeInsecureRequests` to either `true` or `false`. |
174
+
| hsts |`{"enable": true, "maxAgeSeconds": 31536000, "includeSubdomains": true, "preload": true}`|[HSTS](https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) options to use with HTTPS (default is the example value, max age is a year) |
175
+
| csp |`{"enable": true, "directives": {"scriptSrc": "trustworthy-scripts.example.com"}, "upgradeInsecureRequests": "auto", "addDefaults": true}`| Configures [Content Security Policy](https://helmetjs.github.io/docs/csp/). Directives are passed to Helmet - see [their documentation](https://helmetjs.github.io/docs/csp/)for more information on the format. Some defaults are added to the configured values so that the application doesn't break. To disable this behaviour, set `addDefaults` to `false`. Further, if `usecdn` is on, some CDN locations are allowed too. By default (`auto`), insecure (HTTP) requests are upgraded to HTTPS via CSP if `usessl` is on. To change this behaviour, set `upgradeInsecureRequests` to either `true` or `false`. |
176
176
| protocolusessl |`true` or `false`| set to use ssl protocol for resources path (only applied when domain is set) |
177
177
| urladdport |`true` or `false`| set to add port on callback url (port 80 or 443 won't applied) (only applied when domain is set) |
178
178
| usecdn |`true` or `false`| set to use CDN resources or not (default is `true`) |
0 commit comments