Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[6.7] Content security policy strict mode (#29856) #30700

Merged
merged 1 commit into from
Feb 11, 2019

Conversation

epixa
Copy link
Contributor

@epixa epixa commented Feb 11, 2019

Backports the following commits to 6.7:

A content security policy is a great addition to the protections built
into Kibana, but it's not effective in older browsers (like IE11) that
do not enforce the policy.

When CSP strict mode is enabled, right before the Kibana app is
bootstrapped, a basic safety check is performed to see if "naked" inline
scripts are rejected. If inline scripting is allowed by the browser,
then an error message is presented to the user and Kibana never attempts
to bootstrap.
@epixa epixa added the backport label Feb 11, 2019
@elasticmachine
Copy link
Contributor

💚 Build Succeeded

@epixa epixa merged commit 652f4bb into elastic:6.7 Feb 11, 2019
@epixa epixa deleted the backport/6.7/pr-29856 branch February 11, 2019 20:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants