-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
remove CSP customization when we stop publishing ZafiraReport to the jobs #215
Labels
Projects
Comments
vdelendik
changed the title
reuse secure way for browing external static files
reuse secure way for browsing external static files
May 13, 2020
|
vdelendik
changed the title
reuse secure way for browsing external static files
remove CSP customization when we stop publishing ZafiraReport to the jobs
Apr 1, 2021
we need direct link to the zebrunner reporting run and completely destroy publishing of html files as part of build output |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Need to follow jenkins warning and stop using "hudson.model.DirectoryBrowserSupport.CSP" property
The default Content-Security-Policy is currently overridden using the hudson.model.DirectoryBrowserSupport.CSP system property, which is a potential security issue when browsing untrusted files. As an alternative, you can set up a Resource Root URL that Jenkins will use to serve some static files without adding Content-Security-Policy headers.
The text was updated successfully, but these errors were encountered: