This repository has been archived by the owner on Jan 29, 2025. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 45
[tracker] Security checklist #286
Comments
So is this actually the case? BTW: Is this already deployed or still work in progress? |
We don't currently store any user data. I was told that items that don't apply should be checked off. Normandy is currently deployed at (among other places) https://self-repair.mozilla.org and https://normandy-admin.prod.mozaws.net (VPN required). |
Osmose
pushed a commit
to Osmose/normandy
that referenced
this issue
Feb 8, 2017
Osmose
pushed a commit
to Osmose/normandy
that referenced
this issue
Feb 13, 2017
Osmose
pushed a commit
to Osmose/normandy
that referenced
this issue
Feb 14, 2017
Osmose
pushed a commit
to Osmose/normandy
that referenced
this issue
Feb 14, 2017
Osmose
pushed a commit
to Osmose/normandy
that referenced
this issue
Feb 14, 2017
Because CSP prevents the use of eval, we cannot use the eval-based sourcemap support in Webpack. The other alternative, inline-source-map, seems to trigger errors in the Django development server due to URLs that are too long, so the only remaining alternative is to use external source maps, which seem to work fine.
Osmose
pushed a commit
to Osmose/normandy
that referenced
this issue
Feb 15, 2017
Osmose
pushed a commit
to Osmose/normandy
that referenced
this issue
Feb 15, 2017
Because CSP prevents the use of eval, we cannot use the eval-based sourcemap support in Webpack. The other alternative, inline-source-map, seems to trigger errors in the Django development server due to URLs that are too long, so the only remaining alternative is to use external source maps, which seem to work fine.
Osmose
pushed a commit
to Osmose/normandy
that referenced
this issue
Feb 16, 2017
Osmose
pushed a commit
to Osmose/normandy
that referenced
this issue
Feb 16, 2017
Closed
All the items in this checklist are in-progress or not relevant. There's two items from the list that have separate issues filed:
Given that Github is awful for representing the relationship between issues, I think we can call this issue closed and track the remaining work in those two issues. |
Awesome! Thanks a lot for going through it. |
Osmose
pushed a commit
to Osmose/normandy
that referenced
this issue
Feb 23, 2017
Osmose
pushed a commit
to Osmose/normandy
that referenced
this issue
Mar 1, 2017
Osmose
added a commit
that referenced
this issue
Mar 1, 2017
#286: Use subresource integrity for static assets.
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Risk Management
Infrastructure rules
Public-Key-Pins: max-age=5184000; pin-sha256="WoiWRyIOVNa9ihaBciRSC7XHjliYS9VwUGOIud4PB18="; pin-sha256="r/mIkG3eEpVdm+u/ko/cwxzOMo1bk4TyHIlByibiA5E="; pin-sha256="YLh1dUR9y6Kja30RrAn7JKnbQG/uEtLMkBgFF2Fuihg="; pin-sha256="sRHdihwgkaib1P1gxX8HFszlD+7/gTfNvuAybgLPNis=";
services.mozilla.com
, it must be manually added to Firefox's preloaded pins.Coding rules
The following rules apply to all web applications: api and websites.
Additional websites requirements
The following coding rules only apply to websites, not web apis.
/__cspreport__
endpointself
, child-src should benone
or only allow specific originsData rules
The text was updated successfully, but these errors were encountered: