Important: #105856 - Allow site-specific Content-Security-Policy endpoints
See forge#105856
Description
The way Content-Security-Policy reporting endpoints are configured has been enhanced. Administrators can now disable the reporting endpoint globally or configure it per site as needed.
The global scope-specific setting content can
be set to zero ('0') to disable the CSP reporting endpoint:
[TYPO3_CONF_ VARS] [FE] [content Security Policy Reporting Url] = '0' [TYPO3_CONF_ VARS] [BE] [content Security Policy Reporting Url] = '0' 
Additionally, the behavior of the reporting endpoint can also be
configured per site via sites/<my-.
The new disposition-specific property reporting can either be:
reportingto enable the reporting endpointUrl (true) reportingto disable the reporting endpointUrl (false) reportingto use the given value as external reporting endpointUrl (string) 
If defined, the site-specific configuration takes precedence over the global configuration.
In case the explicitly disabled endpoint still would be called, the server-side process responds with a 403 HTTP error message.
Example: Disabling the reporting endpoint
enforce:
  inheritDefault: true
  mutations: {}
  reportingUrl: false
    Example: Using custom external reporting endpoint
enforce:
  inheritDefault: true
  mutations: {}
  reportingUrl: https://example.org/csp-report