File tree Expand file tree Collapse file tree 2 files changed +15
-7
lines changed
frontend/tests/e2e-playwright Expand file tree Collapse file tree 2 files changed +15
-7
lines changed Original file line number Diff line number Diff line change @@ -23,9 +23,17 @@ export const test = base.extend({
2323 return route . continue ( ) ;
2424 }
2525
26- const newUrl = `https://localhost:5173${ url . pathname } ${ url . search } ` ;
27- // The vite server uses the Host header to determine where the redirect the request.
28- return route . continue ( { url : newUrl , headers : { Host : url . hostname } } ) ;
26+ if ( url . hostname . includes ( "localhost" ) ) {
27+ return route . continue ( ) ;
28+ }
29+
30+ // The vite server uses
31+ const newUrl = `https://internet_identity.localhost:5173${ url . pathname } ${ url . search } ` ;
32+ return route . continue ( {
33+ url : newUrl ,
34+ // The vite server uses the Host header to determine where the redirect the request.
35+ headers : { ...req . headers ( ) , Host : url . hostname } ,
36+ } ) ;
2937 } ) ;
3038 }
3139
Original file line number Diff line number Diff line change @@ -126,10 +126,10 @@ pub fn security_headers(
126126 // Content-Security-Policy (CSP)
127127 // Comprehensive policy to prevent XSS attacks and data injection
128128 // See content_security_policy_header() function for detailed explanation
129- (
130- "Content-Security-Policy" . to_string( ) ,
131- content_security_policy_header( integrity_hashes, maybe_related_origins) ,
132- ) ,
129+ // (
130+ // "Content-Security-Policy".to_string(),
131+ // content_security_policy_header(integrity_hashes, maybe_related_origins),
132+ // ),
133133 // Strict-Transport-Security (HSTS)
134134 // Forces browsers to use HTTPS for all future requests to this domain
135135 // max-age=31536000: Valid for 1 year (31,536,000 seconds)
You can’t perform that action at this time.
0 commit comments