Skip to content

Conversation

@stephanwlee
Copy link
Contributor

As part of our security hardening and CSP support, we decided to
introduce script checksum as part of the Vulcanization that gets used at
the serving time using http_util.py. We understand that this imposes
a bit too stringent requirements for all and we decided to relax the CSP
comformance a little by trusting JavaScript from our server
(effectively, default-src 'self').

Note that we do not yet remove shasum related code from http_util
because it is being used by the Plugin HTML endpoint in application.py.
For that, we may want to use nonce or separate JavaScript file approach.

@wchargin
Copy link
Contributor

Cancelled build to unblock #2947, without which this build would fail
anyway.

@stephanwlee stephanwlee force-pushed the vulc-clean branch 4 times, most recently from 24aeac5 to 388d147 Compare November 20, 2019 15:51
@stephanwlee stephanwlee requested a review from nfelt November 20, 2019 15:52
As part of our security hardening and CSP support, we decided to
introduce script checksum as part of the Vulcanization that gets used at
the serving time using http_util.py. We understand that this imposes
a bit too stringent requirements for all and we decided to relax the CSP
comformance a little by trusting JavaScript from our server
(effectively, default-src 'self').

Note that we do not yet remove shasum related code from http_util
because it is being used by the Plugin HTML endpoint in application.py.
For that, we may want to use nonce or separate JavaScript file approach.
@stephanwlee stephanwlee merged commit 56e4bf4 into tensorflow:master Nov 22, 2019
@stephanwlee stephanwlee deleted the vulc-clean branch November 22, 2019 06:13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants