Conversation
|
No actionable comments were generated in the recent review. 🎉 ℹ️ Recent review info⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (1)
📝 WalkthroughWalkthroughThe Content-Security-Policy Changes
Estimated code review effort🎯 1 (Trivial) | ⏱️ ~3 minutes Poem
🚥 Pre-merge checks | ✅ 1✅ Passed checks (1 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
…lowed Commit fa1da39 ("Fix Connect src csp LycheeOrg#4161") corrected the connect-src config format from a flat array to a structured array, which caused the secure-headers library to actually emit the directive. However, it omitted 'self' => true, so all XHR/fetch requests to the site's own origin (e.g. /api/v2/*) were blocked by the Content Security Policy. Co-Authored-By: Claude Opus 4.6 <[email protected]>
…lowed Commit fa1da39 ("Fix Connect src csp LycheeOrg#4161") corrected the connect-src config format from a flat array to a structured array, which caused the secure-headers library to actually emit the directive. However, it omitted 'self' => true, so all XHR/fetch requests to the site's own origin (e.g. /api/v2/*) were blocked by the Content Security Policy. Co-Authored-By: Claude Opus 4.6 <[email protected]>
Summary by CodeRabbit