Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[6.7] Content security policy strict mode (#29856) #30700

Merged
merged 1 commit into from
Feb 11, 2019

Commits on Feb 11, 2019

  1. Content security policy strict mode (elastic#29856)

    A content security policy is a great addition to the protections built
    into Kibana, but it's not effective in older browsers (like IE11) that
    do not enforce the policy.
    
    When CSP strict mode is enabled, right before the Kibana app is
    bootstrapped, a basic safety check is performed to see if "naked" inline
    scripts are rejected. If inline scripting is allowed by the browser,
    then an error message is presented to the user and Kibana never attempts
    to bootstrap.
    epixa committed Feb 11, 2019
    Configuration menu
    Copy the full SHA
    f9b19ba View commit details
    Browse the repository at this point in the history