Re: Content Security Policy support

2018-08-01 Thread Maxim Solodovnik
PRs are welcome :))) sources for the guide are located here: https://github.com/apache/wicket/tree/master/wicket-user-guide/src/main/asciidoc Ajax components requires 'unsafe-inline' 'unsafe-eval', not sure how this can be fixed :( On Wed, Aug 1, 2018 at 2:32 PM Major Péter wrote: > > Hi, > >

Re: Content Security Policy support

2018-08-01 Thread Major Péter
Hi, In that case I would suggest default-src 'self' as a better starting point. The problem remains though, if one uses Ajax and/or has placeholder tags for invisible components, one must have at least: Content-Security-Policy: script-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self'

Re: Content Security Policy support

2018-08-01 Thread Maxim Solodovnik
Hello Peter, I also believe the general rule should be: deny All then allow one-by-one but this is general principle, the guide describing some configuration you can start with :) On Mon, Jul 30, 2018 at 3:50 PM Major Péter wrote: > > Hi, > > thanks, I haven't seen that one yet (I'm coming back

Re: Content Security Policy support

2018-07-30 Thread Major Péter
Hi, thanks, I haven't seen that one yet (I'm coming back to Wicket after ~8 years, so I was still thinking that Confluence was the source of truth). Reading through the section I don't feel that the suggestion there is appropriate: * using default-src https: allows to do pretty much anything

Re: Content Security Policy support

2018-07-30 Thread Maxim Solodovnik
Have you already read this part of the guide? https://ci.apache.org/projects/wicket/guide/8.x/single.html#_external_security_checks On Mon, Jul 30, 2018 at 3:18 PM Major Péter wrote: > > Hi, > > I'm trying to write a new Wicket application, and I wanted to use CSP > for added security. It seems