-
Notifications
You must be signed in to change notification settings - Fork 39
/
next.config.js
106 lines (96 loc) · 2.38 KB
/
next.config.js
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
const CSP_ALLOWED_DOMAINS = [
'*.google.com',
'*.googletagmanager.com',
'*.googleapis.com',
'*.gstatic.com',
process.env.NEXT_PUBLIC_FIREBASE_STORAGE_BUCKET,
process.env.NEXT_PUBLIC_FIREBASE_AUTH_DOMAIN,
]
const CSP_ALLOWED_DOMAINS_STRING = CSP_ALLOWED_DOMAINS.filter(Boolean).join(' ')
/**
* Ideally we are not allowing 'unsafe-eval' 'unsafe-inline'
* But since it's too complicated for now, we just allow it for now
*
* TODO: Explore about using "nonce" attribute so we are not using "unsafe-" anymore
* Refs:
* - https://web.dev/strict-csp/
* - https://developers.google.com/tag-platform/tag-manager/csp?hl=id
* - https://dev.to/snaka/securing-your-nextjs-application-with-strict-csp-4lie
*/
const CSP_POLICIES = `script-src 'self' 'unsafe-eval' 'unsafe-inline' ${CSP_ALLOWED_DOMAINS_STRING}; object-src 'self' blob: ${CSP_ALLOWED_DOMAINS_STRING}; worker-src 'self' blob: ${CSP_ALLOWED_DOMAINS_STRING};`
// Refs: https://github.com/w3c/webappsec-permissions-policy/blob/main/features.md
const PERMISSION_FATURES = [
'autoplay',
'clipboard-read',
'clipboard-write',
'fullscreen',
'idle-detection',
'picture-in-picture',
'interest-cohort',
]
const PERMISSION_POLICIES = `${PERMISSION_FATURES.join('=*, ')}=*`
const securityHeaders = [
{
key: 'Content-Security-Policy',
value: CSP_POLICIES,
},
{
key: 'X-DNS-Prefetch-Control',
value: 'on',
},
{
key: 'Strict-Transport-Security',
value: 'max-age=63072000; includeSubDomains; preload',
},
{
key: 'X-Content-Type-Options',
value: 'nosniff',
},
{
key: 'X-Frame-Options',
value: 'sameorigin',
},
{
key: 'X-XSS-Protection',
value: '1; mode=block',
},
{
key: 'Referrer-Policy',
value: 'same-origin',
},
{
key: 'Permissions-Policy',
value: PERMISSION_POLICIES,
},
{
key: 'Service-Worker-Allowed',
value: '/',
},
]
/** @type {import('next').NextConfig} */
const nextConfig = {
swcMinify: true,
poweredByHeader: false,
images: {
unoptimized: true,
},
eslint: {
// Warning: This allows production builds to successfully complete even if
// your project has ESLint errors.
ignoreDuringBuilds: true,
},
logging: {
fetches: {
fullUrl: true,
},
},
async headers() {
return [
{
source: '/(.*)',
headers: securityHeaders,
},
]
},
}
module.exports = nextConfig