-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[CSP] Added object-src to Content-Security-Policy-Report-Only header #209306
base: main
Are you sure you want to change the base?
Conversation
It looks like this PR modifies one or more |
A documentation preview will be available soon. Request a new doc build by commenting
If your PR continues to fail for an unknown reason, the doc build pipeline may be broken. Elastic employees can check the pipeline status here. |
🤖 Jobs for this PR can be triggered through checkboxes. 🚧
ℹ️ To trigger the CI, please tick the checkbox below 👇
|
Content-Security-Policy-Report-Only
header
Content-Security-Policy-Report-Only
header07437ee
to
7bab3bf
Compare
It looks like this PR modifies one or more |
💔 Build Failed
Failed CI StepsTest Failures
Metrics [docs]
History
|
Summary
Added support for
object_src
directive in reporting mode.How to test
kibana.dev.yml
.<embed src="https://not-example.com/flash" />
anywhere in the page body insrc/platform/plugins/shared/home/public/application/components/home.tsx
You should be able to see the violation
Note
Hopefully, you should be able to see the violation in the Dev Tools -> Application -> Reporting, but it's sometimes hard to catch. My recent Chrome
132.0.6834.160
shows only CSP reports with dispositionenforce
, notreport
.Checklist
release_note:*
label is applied per the guidelinesRelease Notes
Added
object_src
directive toContent-Security-Policy-Report-Only
header.Closes: #208590