-
Notifications
You must be signed in to change notification settings - Fork 8.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Permissions Policy Reporting #186892
Permissions Policy Reporting #186892
Conversation
/ci |
5 similar comments
/ci |
/ci |
/ci |
/ci |
/ci |
/ci |
/ci |
1 similar comment
/ci |
@@ -91,7 +91,7 @@ export const permissionsPolicyViolationReportSchema = schema.object( | |||
/** | |||
* The string identifying the policy-controlled feature whose policy has been violated. This string can be used for grouping and counting related reports. | |||
*/ | |||
featureId: schema.string(), | |||
policyId: schema.string(), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Probably @azasypkin could use your advice here, the spec mentions featureId
, however the report that is sent from Chrome (my version is 126.0.6478.127
) has policyId
, not featureId
. Should we support both?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added support for both ✅
@elasticmachine merge upstream |
/ci |
1 similar comment
/ci |
💛 Build succeeded, but was flaky
Failed CI StepsMetrics [docs]Public APIs missing comments
History
To update your PR or re-run it, just comment with: |
Pinging @elastic/kibana-security (Team:Security) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
kibana-docker
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
rawHttpConfig: HttpConfigType, | ||
rawCspConfig: CspConfigType, | ||
rawExternalUrlConfig: ExternalUrlConfig | ||
rawExternalUrlConfig: ExternalUrlConfig, | ||
rawPermissionsPolicyConfig: PermissionsPolicyConfigType |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(thinking out loud, not directly related to this PR) I feel like this increasing accumulation of config segments we need to build the concrete http config is the sign of us forcing this artificial separation without good reasons. At some point we might want to regroup everything properly under the same server
prefix (or, let's be crazy, a new http
prefix) to break this.
5d9ff91
to
6e10e12
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! Just a question about the Permissions-Policy-Report-Only
link in the settings documentation, as I didn't see this specific header mentioned.
experimental[] Controls whether the https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Permissions-Policy[`Permissions-Policy-Report-Only`] header | ||
is used in all responses to the client from the {kib} server, and specifies what value is used. Allowed values are any text value or `null`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I didn't find any documentation specifically on the Permissions-Policy-Report-Only
header. Is the link incorrect, or is this not explicitly documented?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Unfortunately, it is not explicitly documented on mdn. I can link it to the spec https://w3c.github.io/webappsec-permissions-policy/#permissions-policy-report-only-http-header-field (but this is editor's draft)
Summary
permissionsPolicy
configuration setting.report_to
directive.Permissions-Policy-Report-Only
header to enable reporting mode.featureId
in the reporting body, however the field ispolicyId
in Chromium.How to test
kibana.dev.yml
.navigator.mediaDevices.getUserMedia({ audio: true, video: true }).catch((e) => {});
You should see 2 reports for permissions violation, one with
report
disposition and another withenforce
disposition.Checklist
For maintainers
Related Issue(s)
#175113, #184939
Release Note
Added support for Permissions Policy reporting.