vin01 commented on issue #18696:
URL: https://github.com/apache/superset/issues/18696#issuecomment-2042152942

   I believe (not-a-)problem here is the [CSP policy from 
Talisman](https://github.com/apache/superset/blob/master/superset/config.py#L1447)
 which does not allow `unsafe-eval` which is required for this feature and gets 
blocked by browser
   
   following talisman config works:
   
   ```
   TALISMAN_CONFIG = {
       "content_security_policy": {
           "base-uri": ["'self'"],
           "default-src": ["'self'"],
           "img-src": [
               "'self'",
               "blob:",
               "data:",
               "https://apachesuperset.gateway.scarf.sh";,
               "https://static.scarf.sh/";,
           ],
           "worker-src": ["'self'", "blob:"],
           "connect-src": [
               "'self'",
               "https://api.mapbox.com";,
               "https://events.mapbox.com";,
           ],
           "object-src": "'none'",
           "style-src": [
               "'self'",
               "'unsafe-inline'",
           ],
           "script-src": ["'self'", "'strict-dynamic'", "'unsafe-eval'"],
       },
       "content_security_policy_nonce_in": ["script-src"],
       "force_https": False,
       "session_cookie_secure": False,
   }
   ```
   
   Given the nature of this issue, it would be ideal to have an alternative way 
to templatize tooltips. However in some cases this could be acceptable risk 
where users can be trusted with customized JS, we could document it, at least 
until a better way is possible.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to