CSP issues with validation using oidc-client.js

I am creating a SPA using oidc-client for login IDP created using Identity Server 4.

The login redirect seems to work fine, but in Firefox I get the following CSP issues

enter image description here

Content Security Policy: Ignoring "'unsafe-inline'" within script-src or style-src: nonce-source or hash-source specified  (unknown)
Content Security Policy: The page settings blocked the loading of a resource at self ("script-src 'unsafe-inline' 'sha256-VDXN0nOpFPQ102CIVz+eimHA5e+wTeoUUQj5ZYbtn8w='"). Source: !function(t){function __webpack_require_....  checksession:1
Content Security Policy: The page settings blocked the loading of a resource at self ("script-src 'unsafe-inline' 'sha256-VDXN0nOpFPQ102CIVz+eimHA5e+wTeoUUQj5ZYbtn8w='"). Source: window.devToolsOptions = Object.assign(w....  checksession:1
Load denied by X-Frame-Options: http://localhost:5007/home/error?errorId=a74accc61bb821ee1f42f7013a306e90 does not permit cross-origin framing.  (unknown)

      

I am not setting CSP meta tags in my SPA and I am wondering if I need to do this. Digging around a bit, it seems that the oidc client is adding an iframe to my application that points to the checkout page in Identity Server (which includes the CSP header "default-src" none "; script -src 'unsafe-inline' 'sha256-VDXN0nOpFPQ102CIVz + eimHA5e + wTeoUUQj5ZYbtn8w = '")

Can anyone help me solve this or lead me in the right direction? My knowledge of CSP is very simple.

+3


source to share


1 answer


It was a Redux devtools addon trying to inject its code into the page.



0


source







All Articles