kibana/packages/kbn-interpreter
Court Ewing 7a87f03ec7
Introduce content security policy (CSP) (#29545)
* csp: nonce and unsafe-eval for scripts

To kick things off, a rudimentary CSP implementation only allows
dynamically loading new JavaScript if it includes an associated nonce
that is generated on every load of the app.

A more sophisticated content security policy is necessary, particularly
one that bans eval for scripts, but one step at a time.

* img-src is not necessary if the goal is not to restrict

* configurable CSP owned by security team

* smoke test

* remove x-content-security-policy

* document csp.rules

* fix tsconfig for test

* switch integration test back to regular js

* stop looking for tsconfig in test

* grrr, linting errors not caught by precommit

* docs: people -> you for consistency sake

Co-Authored-By: epixa <court@epixa.com>
2019-02-01 17:11:38 -05:00
..
common [@kbn/interpreter] improve build/packaging (#26096) 2018-11-23 14:16:38 -07:00
public [@kbn/interpreter] improve build/packaging (#26096) 2018-11-23 14:16:38 -07:00
scripts [@kbn/interpreter] improve build/packaging (#26096) 2018-11-23 14:16:38 -07:00
server [@kbn/interpreter] improve build/packaging (#26096) 2018-11-23 14:16:38 -07:00
src Introduce content security policy (CSP) (#29545) 2019-02-01 17:11:38 -05:00
tasks/build moving state out of kbn-interpreter (#27317) 2019-01-17 07:23:29 +01:00
.babelrc [@kbn/interpreter] improve build/packaging (#26096) 2018-11-23 14:16:38 -07:00
.npmignore [@kbn/interpreter] improve build/packaging (#26096) 2018-11-23 14:16:38 -07:00
package.json Introduce content security policy (CSP) (#29545) 2019-02-01 17:11:38 -05:00