Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow additive csp configuration #102059

Merged
merged 30 commits into from
Jun 25, 2021
Merged
Show file tree
Hide file tree
Changes from 22 commits
Commits
Show all changes
30 commits
Select commit Hold shift + click to select a range
80ecded
add additive csp configuration
pgayvallet Jun 14, 2021
73890df
add unit tests for new class
pgayvallet Jun 14, 2021
303d60a
fix types
pgayvallet Jun 14, 2021
b3d60b2
adapt test utils
pgayvallet Jun 14, 2021
ee9f805
fix tests
pgayvallet Jun 14, 2021
c8eccd5
Merge remote-tracking branch 'upstream/master' into kbn-94414-additiv…
pgayvallet Jun 14, 2021
d531ac0
Merge remote-tracking branch 'upstream/master' into kbn-94414-additiv…
pgayvallet Jun 15, 2021
dca375f
more unit tests on config
pgayvallet Jun 15, 2021
4b45111
generated doc
pgayvallet Jun 15, 2021
ca5616d
review comments
pgayvallet Jun 15, 2021
2188b0e
Merge remote-tracking branch 'upstream/master' into kbn-94414-additiv…
pgayvallet Jun 15, 2021
0d3bd2c
update ascii doc
pgayvallet Jun 15, 2021
400b2d1
Merge remote-tracking branch 'upstream/master' into kbn-94414-additiv…
pgayvallet Jun 16, 2021
e1eb1b5
update ascii doc links
pgayvallet Jun 16, 2021
42c81ec
automatically add single quotes for keywords
pgayvallet Jun 16, 2021
227c5b7
Merge remote-tracking branch 'upstream/master' into kbn-94414-additiv…
pgayvallet Jun 22, 2021
592a119
add missing csp directives
pgayvallet Jun 22, 2021
383aa95
add more tests
pgayvallet Jun 22, 2021
ec383c3
add additional settings to asciidoc
pgayvallet Jun 23, 2021
8a28a62
add null-check
pgayvallet Jun 23, 2021
c74ada5
revert test config props
pgayvallet Jun 23, 2021
59303f4
fix usage collection usage
pgayvallet Jun 23, 2021
3d7947c
Merge remote-tracking branch 'upstream/master' into kbn-94414-additiv…
pgayvallet Jun 24, 2021
3609981
some review comments
pgayvallet Jun 24, 2021
966fc55
last review comments
pgayvallet Jun 24, 2021
04a4f59
add kibana-docker variables
pgayvallet Jun 24, 2021
e9590d4
try to fix doc reference
pgayvallet Jun 24, 2021
fff64d8
try to fix doc reference again
pgayvallet Jun 24, 2021
46681a3
Merge remote-tracking branch 'upstream/master' into kbn-94414-additiv…
pgayvallet Jun 25, 2021
596db0d
fix tests
pgayvallet Jun 25, 2021
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
<!-- Do not edit this file. It is automatically generated by API Documenter. -->

[Home](./index.md) &gt; [kibana-plugin-core-server](./kibana-plugin-core-server.md) &gt; [CspConfig](./kibana-plugin-core-server.cspconfig.md) &gt; ["\#private"](./kibana-plugin-core-server.cspconfig.__private_.md)

## CspConfig."\#private" property

<b>Signature:</b>

```typescript
#private;
```
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ The constructor for this class is marked as internal. Third-party code should no
| Property | Modifiers | Type | Description |
| --- | --- | --- | --- |
| ["\#private"](./kibana-plugin-core-server.cspconfig.__private_.md) | | <code></code> | |
| [DEFAULT](./kibana-plugin-core-server.cspconfig.default.md) | <code>static</code> | <code>CspConfig</code> | |
| [disableEmbedding](./kibana-plugin-core-server.cspconfig.disableembedding.md) | | <code>boolean</code> | |
| [header](./kibana-plugin-core-server.cspconfig.header.md) | | <code>string</code> | |
Expand Down
36 changes: 35 additions & 1 deletion docs/setup/settings.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -36,11 +36,45 @@ Set to `false` to disable Console. *Default: `true`*
<<ops-cGroupOverrides-cpuAcctPath, `ops.cGroupOverrides.cpuAcctPath`>>.

| `csp.rules:`
| A https://w3c.github.io/webappsec-csp/[content-security-policy] template
| deprecated:[7.14.0,"In 8.0 and later, this setting will no longer be supported."]
jportner marked this conversation as resolved.
Show resolved Hide resolved
A https://w3c.github.io/webappsec-csp/[Content Security Policy] template
that disables certain unnecessary and potentially insecure capabilities in
the browser. It is strongly recommended that you keep the default CSP rules
that ship with {kib}.

| `csp.script_src:`
| Add sources for the https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src[Content Security Policy `script-src` directive].

| `csp.worker_src:`
| Add sources for the https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/worker-src[Content Security Policy `worker-src` directive].

| `csp.style_src:`
| Add sources for the https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/style-src[Content Security Policy `style-src` directive].

| `csp.connect_src:`
| Add sources for the https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/connect-src[Content Security Policy `connect-src` directive].

| `csp.default_src:`
| Add sources for the https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/default-src[Content Security Policy `default-src` directive].

| `csp.font_src:`
| Add sources for the https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/font-src[Content Security Policy `font-src` directive].

| `csp.frame_src:`
| Add sources for the https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/frame-src[Content Security Policy `frame-src` directive].

| `csp.img_src:`
| Add sources for the https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/img-src[Content Security Policy `img-src` directive].

| `csp.frame_ancestors:`
| Add sources for the https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/frame-ancestors[Content Security Policy `frame-ancestors` directive].

pgayvallet marked this conversation as resolved.
Show resolved Hide resolved
| `csp.report_uri:`
| Add sources for the https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/report-uri[Content Security Policy `report-uri` directive].

| `csp.report_to:`
| Add sources for the https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/report-to[Content Security Policy `report-to` directive].

|[[csp-strict]] `csp.strict:`
| Blocks {kib} access to any browser that
does not enforce even rudimentary CSP rules. In practice, this disables
Expand Down
Loading