diff --git a/airflow-core/src/airflow/ui/src/pages/Security.tsx b/airflow-core/src/airflow/ui/src/pages/Security.tsx
index 3a6061478ebad..9de11fc8771c0 100644
--- a/airflow-core/src/airflow/ui/src/pages/Security.tsx
+++ b/airflow-core/src/airflow/ui/src/pages/Security.tsx
@@ -43,14 +43,15 @@ export const Security = () => {
return ;
}
+ // The following iframe sandbox setting is intentionally less restrictive.
+ // This is considered safe because the framed content originates from the Auth manager,
+ // which is part of the deployment of Airflow and trusted as per our security policy.
+ // https://airflow.apache.org/docs/apache-airflow/stable/security/security_model.html
+ const sandbox = "allow-scripts allow-same-origin allow-forms";
+
return (
-
+
);
};
diff --git a/scripts/ci/pre_commit/ts_compile_lint_ui.py b/scripts/ci/pre_commit/ts_compile_lint_ui.py
index 3e817285e2230..93fdcd149b75b 100755
--- a/scripts/ci/pre_commit/ts_compile_lint_ui.py
+++ b/scripts/ci/pre_commit/ts_compile_lint_ui.py
@@ -47,6 +47,8 @@
all_non_yaml_files = [file for file in files if not file.endswith(".yaml")]
print("All non-YAML files:", all_non_yaml_files)
all_ts_files = [file for file in files if file.endswith(".ts") or file.endswith(".tsx")]
+ if all_ts_files:
+ all_ts_files.append("src/vite-env.d.ts")
print("All TypeScript files:", all_ts_files)
run_command(["pnpm", "config", "set", "store-dir", ".pnpm-store"], cwd=dir)