Open jhadvig opened 4 days ago
@jhadvig: This pull request references CONSOLE-4265 which is a valid jira issue.
Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.18.0" version, but no target version was set.
Hello @jhadvig! Some important instructions when contributing to openshift/api: API design plays an important part in the user experience of OpenShift and as such API PRs are subject to a high level of scrutiny to ensure they follow our best practices. If you haven't already done so, please review the OpenShift API Conventions and ensure that your proposed changes are compliant. Following these conventions will help expedite the api review process for your PR.
[APPROVALNOTIFIER] This PR is NOT APPROVED
This pull-request has been approved by: jhadvig Once this PR has been reviewed and has the lgtm label, please ask for approval from spadgett. For more information see the Kubernetes Code Review Process.
The full list of commands accepted by this bot can be found here.
@spadgett thank you for the review. I've address the comments. PTAL
@jhadvig: The following test failed, say /retest
to rerun all failed tests or /retest-required
to rerun all mandatory failed tests:
Test name | Commit | Details | Required | Rerun command |
---|---|---|---|---|
ci/prow/verify | 5521582500c52f49c975a993e38b9482c1d4610f | link | true | /test verify |
Full PR test history. Your PR dashboard.
When serving Console HTML index page, we generate the policy that includes allowed (trustworthy) sources. It may be necessary for some dynamic plugins to add new sources in order to avoid CSP violations at Console runtime. We need to extend the ConsolePlugin CRD, in order to give the plugin creators a mechanism how to specify these source.
We discussed with @vojtechszocs two possible implementation:
Add a new field to spec for specifying an array of sources which would apply for all the CSP directives -
spec.csp.allowedSources
. This implementation is pretty straight-forward but automatically applying the same source across different directives could unintentionally block legitimate content or reduce security.Example:
(Proposed solution) Add a new field to spec for specifying an array of sources for each of the directives. Letting users manage different whitelists for different types of content, gives them more flexibility in controlling security settings.
Example:
Note: The PR is missing some descriptions and validation and unit tests. Will address those once we align on the API structure.
/assign @spadgett @vojtechszocs
Story: https://issues.redhat.com/browse/CONSOLE-4265