-
-
Notifications
You must be signed in to change notification settings - Fork 4.6k
feat: Expect-Staple and Expect-CT support #6417
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Generated by 🚫 danger |
0879f37 to
7d75a94
Compare
mattrobenolt
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is a big change, so just letting you know I'm looking at it and will get back to you. :)
|
@alex-hofsteede any chance of doing Expect-Staple at the same time? |
|
Yeah, Expct-Staple is next on the list. |
fe3d870 to
466eb47
Compare
5f18331 to
8f0e310
Compare
fe9aaa5 to
0616ab7
Compare
mattrobenolt
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
All of this looks fine. The only missing piece is the UI to display these.
Would really like to address the urls though before approving. But code seems good otherwise..
0616ab7 to
0f58d86
Compare
|
@mattrobenolt so this can go out? |
In preparation for accepting other types of browser security reports, start using JSON schema to validate the structure of these documents to avoid duplicating a bunch of manual validation for the different report types.
Refactored the CSP endpoint and helpers to allow for support of HPKP violation reports. Added schema validation and filtering logic to make it easier to add more interfaces in future. Each can be checked against its own schema.
Adds an endpoint and schema for Expect-CT reports to be ingested.
Schemas, Interface class, and simple test.
Determine which type of security report is being sent from the report body
4476854 to
319f86b
Compare
mattrobenolt
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🎉 looks great, let's make sure we coordinate a change for the new endpoint with ops.
cc @JTCunning
We'll need a location block for /api/<project>/security/ that's identical to the current /api/<project>/csp-report/
( this can happen after this gets shipped since it's not really used yet )
|
I'm a bit late to the party (sorry) but it looks like the expect-staple header isn't something that's implemented by UAs and may never ship? See https://twitter.com/estark37/status/949336829349707776 for information (and a note on the preload version of expect-staple) |
Refactored the CSP endpoint and helpers to allow for support of HPKP violation reports. Added schema validation and filtering logic to make it easier to add more interface schemas in future.
Requires some more tests.