You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/doc/book/security/csp.adoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ifdef::backend-html5[]
6
6
:toc: left
7
7
endif::[]
8
8
9
-
This page describes the restrictions that can be applied to the general Jenkins UI since Jenkins 2.TODO.
9
+
This page describes the restrictions that can be applied to the general Jenkins UI since Jenkins 2.539.
10
10
11
11
== Motivation
12
12
@@ -17,7 +17,7 @@ Using CSP, the impact of web vulnerabilities like link:/security/vulnerabilities
17
17
NOTE: This page discusses configuration and customization of Content Security Policy for the general Jenkins UI.
18
18
See link:/doc/book/security/configuring-content-security-policy/[Content Security Policy] for documentation on Content Security Policy for user generated files, like files in workspaces, archived artifacts, or file parameters, on controllers not using the link:/redirect/resource-root-url[Resource Root URL] feature.
19
19
20
-
NOTE: Using Jenkins older than 2.TODO?
20
+
NOTE: Using Jenkins older than 2.539?
21
21
plugin:csp[Content Security Policy Plugin] 1.x provides similar functionality.
22
22
23
23
// TODO Remove this once LTS with this is in common use.
@@ -34,7 +34,7 @@ See the section link:#identifying[Identifying incompatibilities in your setup] b
34
34
Among the more than 2000 Jenkins plugins distributed by the Jenkins project, many use features that are prohibited by the default CSP rule set.
35
35
As a result, the UI provided by these plugins would break.
36
36
37
-
To give plugin maintainers time to adapt their plugins, and Jenkins administrators time to migrate away from unmaintained, incompatible plugins, CSP protection is disabled by default as of Jenkins 2.TODO.
37
+
To give plugin maintainers time to adapt their plugins, and Jenkins administrators time to migrate away from unmaintained, incompatible plugins, CSP protection is disabled by default as of Jenkins 2.539.
Copy file name to clipboardExpand all lines: content/doc/developer/security/csp.adoc
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,14 +45,14 @@ Resources should be hosted by Jenkins.
45
45
46
46
When running Jenkins, you can use the following techniques to identify broken features and the component that defines them:
47
47
48
-
=== Built-in CSP protection in Jenkins 2.TODO+
48
+
=== Built-in CSP protection in Jenkins 2.539+
49
49
50
-
Running Jenkins 2.TODO or newer in development mode (e.g., `mvn hpi:run`) will have Content Security Policy protections enabled by default.
50
+
Running Jenkins 2.539 or newer in development mode (e.g., `mvn hpi:run`) will have Content Security Policy protections enabled by default.
51
51
link:/doc/book/security/csp/[Learn more.]
52
52
53
53
=== Content Security Policy Plugin 1.x
54
54
55
-
In Jenkins before version 2.TODO, link:https://plugins.jenkins.io/csp/[Content Security Policy Plugin] (1.x) lets you define a Content-Security-Policy that gets applied to the Jenkins web UI.
55
+
In Jenkins before version 2.539, link:https://plugins.jenkins.io/csp/[Content Security Policy Plugin] (1.x) lets you define a Content-Security-Policy that gets applied to the Jenkins web UI.
56
56
It can operate both as enforcing and to only gather reports.
57
57
Both modes can be useful with identifying broken functionality.
58
58
@@ -199,16 +199,16 @@ Any dynamically determined images (e.g., "avatar" images based on user configura
199
199
200
200
* Have Jenkins request (and possibly cache) these images, serving them through a local URL.
201
201
Be careful to not allow parameterization of the URL serving this image such that it accepts arbitrary parameter values, resulting in arbitrary URLs being proxied.
202
-
* For compatibility with Content Security Policy in Jenkins 2.TODO and newer, implement `jenkins.security.csp.Contributor` (or `jenkins.security.csp.SimpleContributor` in simple cases).
202
+
* For compatibility with Content Security Policy in Jenkins 2.539 and newer, implement `jenkins.security.csp.Contributor` (or `jenkins.security.csp.SimpleContributor` in simple cases).
203
203
This will allow Jenkins users' browsers to load images from a known safe domain.
204
204
In this case, make sure that only administrators can ultimately configure the domains that images can be loaded from.
205
205
For example, regular Jenkins users should not be able to, e.g., edit their user profile or configure a job in a certain way to allow a domain of their choice.
206
206
207
207
== Testing
208
208
209
-
=== In Jenkins 2.TODO and newer
209
+
=== In Jenkins 2.539 and newer
210
210
211
-
Jenkins 2.TODO and newer supports Content Security Policy out of the box.
211
+
Jenkins 2.539 and newer supports Content Security Policy out of the box.
212
212
See the link:/doc/book/security/csp/[documentation] for information how to set it up.
213
213
214
214
NOTE: Running Jenkins in development mode will by default enforce Content Security Policy, so plugin maintainers will likely encounter incompatibilities in their own testing.
0 commit comments