Remove CSP entirely for RDP pages

- Removed Content Security Policy header for RDP pages
- CSP was blocking WebAssembly eval() and other required functionality
- RDP pages now load without CSP restrictions
- WebAssembly and RDP client can now execute properly
parent 254810cc
...@@ -2444,9 +2444,8 @@ static int handle_request(int client_fd, const http_request_t *req) { ...@@ -2444,9 +2444,8 @@ static int handle_request(int client_fd, const http_request_t *req) {
char html[32768]; char html[32768];
int len = snprintf(html, sizeof(html), rdp_page_html, int len = snprintf(html, sizeof(html), rdp_page_html,
client_id, client_id, client_id, client_id, client_id); client_id, client_id, client_id, client_id, client_id);
// Add comprehensive CSP header for RDP functionality // No CSP header for RDP pages to avoid blocking WebAssembly
const char *csp_header = "Content-Security-Policy: default-src 'self'; script-src 'self' 'unsafe-eval' 'unsafe-inline' https://*; style-src 'self' 'unsafe-inline' https://*; font-src 'self' https://*; img-src 'self' data: https://*; connect-src 'self' ws: wss:; object-src 'none';"; send_response(client_fd, 200, "OK", "text/html", html, len, NULL, NULL);
send_response(client_fd, 200, "OK", "text/html", html, len, NULL, csp_header);
} else { } else {
// Handle RDP actions (connect, disconnect) // Handle RDP actions (connect, disconnect)
// Check if client exists // Check if client exists
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment