[
https://issues.apache.org/jira/browse/WW-5084?focusedWorklogId=830279&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-830279
]
ASF GitHub Bot logged work on WW-5084:
--------------------------------------
Author: ASF GitHub Bot
Created on: 01/Dec/22 09:25
Start Date: 01/Dec/22 09:25
Worklog Time Spent: 10m
Work Description: TheFergus commented on PR #430:
URL: https://github.com/apache/struts/pull/430#issuecomment-1333470726
@lukaszlenart Hi, for <s: script><s:/script>, if the src of the tags needs
variables, what should I do?
<s:script src="${myUrl}"></s:script>
Issue Time Tracking
-------------------
Worklog Id: (was: 830279)
Time Spent: 5h 20m (was: 5h 10m)
> Content Security Policy support
> -------------------------------
>
> Key: WW-5084
> URL: https://issues.apache.org/jira/browse/WW-5084
> Project: Struts 2
> Issue Type: New Feature
> Components: Core Interceptors, Core Tags
> Affects Versions: 6.0.0
> Reporter: Santiago Diaz
> Priority: Major
> Fix For: 6.0.0
>
> Time Spent: 5h 20m
> Remaining Estimate: 0h
>
> We'd like to add built-in Content Security Policy support to Struts2 to
> provide a major security mechanism that developers can use to protect against
> common Cross-Site Scripting vulnerabilities. Developers will have the ability
> to enable CSP in report-only or enforcement mode.
> We will provide an out of the box tag that can be used by developers to
> use/import scripts in their web applications, so that these will
> automatically get nonces that are compatible with their Content Security
> policies.
> Finally, we will provide a built-in handler for CSP violation reports that
> will be used to collect and provide textual explanations of these reports.
> This endpoint will be used by developers to debug CSP violations and locate
> pieces of code that need to be refactored to support strong policies.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)