mirror of
https://github.com/grafana/grafana.git
synced 2025-02-25 18:55:37 -06:00
Chore: Disable angular support by default (#84738)
* Flipping angular support to disabled by default
This commit is contained in:
parent
86a2a1a19b
commit
e9db9106c1
@ -382,8 +382,8 @@ content_security_policy_report_only = false
|
|||||||
# $ROOT_PATH is server.root_url without the protocol.
|
# $ROOT_PATH is server.root_url without the protocol.
|
||||||
content_security_policy_report_only_template = """script-src 'self' 'unsafe-eval' 'unsafe-inline' 'strict-dynamic' $NONCE;object-src 'none';font-src 'self';style-src 'self' 'unsafe-inline' blob:;img-src * data:;base-uri 'self';connect-src 'self' grafana.com ws://$ROOT_PATH wss://$ROOT_PATH;manifest-src 'self';media-src 'none';form-action 'self';"""
|
content_security_policy_report_only_template = """script-src 'self' 'unsafe-eval' 'unsafe-inline' 'strict-dynamic' $NONCE;object-src 'none';font-src 'self';style-src 'self' 'unsafe-inline' blob:;img-src * data:;base-uri 'self';connect-src 'self' grafana.com ws://$ROOT_PATH wss://$ROOT_PATH;manifest-src 'self';media-src 'none';form-action 'self';"""
|
||||||
|
|
||||||
# Controls if old angular plugins are supported or not. This will be disabled by default in future release
|
# Controls if old angular plugins are supported or not.
|
||||||
angular_support_enabled = true
|
angular_support_enabled = false
|
||||||
|
|
||||||
# The CSRF check will be executed even if the request has no login cookie.
|
# The CSRF check will be executed even if the request has no login cookie.
|
||||||
csrf_always_check = false
|
csrf_always_check = false
|
||||||
|
@ -378,8 +378,8 @@
|
|||||||
# $NONCE in the template includes a random nonce.
|
# $NONCE in the template includes a random nonce.
|
||||||
# $ROOT_PATH is server.root_url without the protocol.
|
# $ROOT_PATH is server.root_url without the protocol.
|
||||||
;content_security_policy_report_only_template = """script-src 'self' 'unsafe-eval' 'unsafe-inline' 'strict-dynamic' $NONCE;object-src 'none';font-src 'self';style-src 'self' 'unsafe-inline' blob:;img-src * data:;base-uri 'self';connect-src 'self' grafana.com ws://$ROOT_PATH wss://$ROOT_PATH;manifest-src 'self';media-src 'none';form-action 'self';"""
|
;content_security_policy_report_only_template = """script-src 'self' 'unsafe-eval' 'unsafe-inline' 'strict-dynamic' $NONCE;object-src 'none';font-src 'self';style-src 'self' 'unsafe-inline' blob:;img-src * data:;base-uri 'self';connect-src 'self' grafana.com ws://$ROOT_PATH wss://$ROOT_PATH;manifest-src 'self';media-src 'none';form-action 'self';"""
|
||||||
# Controls if old angular plugins are supported or not. This will be disabled by default in future release
|
# Controls if old angular plugins are supported or not.
|
||||||
;angular_support_enabled = true
|
;angular_support_enabled = false
|
||||||
|
|
||||||
# List of additional allowed URLs to pass by the CSRF check, separated by spaces. Suggested when authentication comes from an IdP.
|
# List of additional allowed URLs to pass by the CSRF check, separated by spaces. Suggested when authentication comes from an IdP.
|
||||||
;csrf_trusted_origins = example.com
|
;csrf_trusted_origins = example.com
|
||||||
|
@ -16,7 +16,7 @@ describe('Dashboard time zone support', () => {
|
|||||||
e2e.flows.login(Cypress.env('USERNAME'), Cypress.env('PASSWORD'));
|
e2e.flows.login(Cypress.env('USERNAME'), Cypress.env('PASSWORD'));
|
||||||
});
|
});
|
||||||
|
|
||||||
it('Tests dashboard time zone scenarios', () => {
|
it.skip('Tests dashboard time zone scenarios', () => {
|
||||||
e2e.flows.openDashboard({ uid: '5SdHCasdf' });
|
e2e.flows.openDashboard({ uid: '5SdHCasdf' });
|
||||||
|
|
||||||
const fromTimeZone = 'UTC';
|
const fromTimeZone = 'UTC';
|
||||||
|
@ -1494,7 +1494,7 @@ func readSecuritySettings(iniFile *ini.File, cfg *Cfg) error {
|
|||||||
cfg.StrictTransportSecurityMaxAge = security.Key("strict_transport_security_max_age_seconds").MustInt(86400)
|
cfg.StrictTransportSecurityMaxAge = security.Key("strict_transport_security_max_age_seconds").MustInt(86400)
|
||||||
cfg.StrictTransportSecurityPreload = security.Key("strict_transport_security_preload").MustBool(false)
|
cfg.StrictTransportSecurityPreload = security.Key("strict_transport_security_preload").MustBool(false)
|
||||||
cfg.StrictTransportSecuritySubDomains = security.Key("strict_transport_security_subdomains").MustBool(false)
|
cfg.StrictTransportSecuritySubDomains = security.Key("strict_transport_security_subdomains").MustBool(false)
|
||||||
cfg.AngularSupportEnabled = security.Key("angular_support_enabled").MustBool(true)
|
cfg.AngularSupportEnabled = security.Key("angular_support_enabled").MustBool(false)
|
||||||
cfg.CSPEnabled = security.Key("content_security_policy").MustBool(false)
|
cfg.CSPEnabled = security.Key("content_security_policy").MustBool(false)
|
||||||
cfg.CSPTemplate = security.Key("content_security_policy_template").MustString("")
|
cfg.CSPTemplate = security.Key("content_security_policy_template").MustString("")
|
||||||
cfg.CSPReportOnlyEnabled = security.Key("content_security_policy_report_only").MustBool(false)
|
cfg.CSPReportOnlyEnabled = security.Key("content_security_policy_report_only").MustBool(false)
|
||||||
|
Loading…
Reference in New Issue
Block a user