-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Incorrect Content Security Policy when AWS SSO is active #13712
Comments
I am a bit lost in your setup. Is |
@nijel Sorry for a confusion, you're right. Again my apologies. We made a change in the configuration, just for trying to fix the issue somehow, because it doesn't work even with the default setting. Added this to try to solve it:
Reverted the changes I made to show that it fails even with the default settings. ![]() Our configuration for AWS SSO is as following:
Again, my apologies for a confusion. |
Can you please look into individual requests to see where the problematic one is coming from? SAML is doing many redirects on the way a the browsers are not really good in identifing the cause of this error (basically all chain has to be allowed in the CSP for all the redirects). |
@nijel So looks like it works now. It needs ![]() So adding:
The CSP header is now:
Maybe would be worth to add something related to the documentation, if it's not possible to add that header by default. |
It should be possible to add automatically. What is your IDP_URL? Would what is implemented in #13753 work for you? |
Thank you for your report; the issue you have reported has just been fixed.
|
1 similar comment
Thank you for your report; the issue you have reported has just been fixed.
|
Describe the issue
On the
/accounts/login
page, the CSP header sets form-action to 'self *.superdomain.com portal.sso.eu-central-1.amazonaws.com', if external aws auth provider is configured.But if trying to sign in with the aws external provider, it's ending with the error:
I already tried
Steps to reproduce the behavior
Expected behavior
The browser should always follow the redirect to continue the login process with the external provider.
Screenshots
Exception traceback
How do you run Weblate?
Docker container
Weblate versions
Weblate deploy checks
Additional context
https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP
The text was updated successfully, but these errors were encountered: