commit: d838d1990bf23d452c1cc830629e42e51dbd7047
parent 2a07411b0cb14ea26966659605d95074b02a8538
Author: Haelwenn <contact+git.pleroma.social@hacktivis.me>
Date: Wed, 16 Aug 2023 13:34:32 +0000
Apply lanodan's suggestion(s) to 1 file(s)
Diffstat:
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/lib/pleroma/web/plugs/http_security_plug.ex b/lib/pleroma/web/plugs/http_security_plug.ex
@@ -93,7 +93,7 @@ defmodule Pleroma.Web.Plugs.HTTPSecurityPlug do
img_src = "img-src 'self' data: blob:"
media_src = "media-src 'self'"
- connect_src = ["connect-src 'self' blob: ", ?\s, websocket_url]
+ connect_src = ["connect-src 'self' blob: ", static_url, ?\s, websocket_url]
# Strict multimedia CSP enforcement only when MediaProxy is enabled
{img_src, media_src, connect_src} =