Skip to content

Commit 7c96327

Browse files
author
Lennart Betz
authored
Merge pull request #428 from UiP9AV6Y/feature_use_strict_csp
add support for the Content Security Policy (CSP) security config
2 parents 559e210 + 343d882 commit 7c96327

File tree

4 files changed

+58
-0
lines changed

4 files changed

+58
-0
lines changed

REFERENCE.md

+9
Original file line numberDiff line numberDiff line change
@@ -218,6 +218,7 @@ The following parameters are available in the `icingaweb2` class:
218218
* [`conf_group`](#-icingaweb2--conf_group)
219219
* [`default_domain`](#-icingaweb2--default_domain)
220220
* [`cookie_path`](#-icingaweb2--cookie_path)
221+
* [`use_strict_csp`](#-icingaweb2--use_strict_csp)
221222
* [`admin_role`](#-icingaweb2--admin_role)
222223
* [`default_admin_username`](#-icingaweb2--default_admin_username)
223224
* [`default_admin_password`](#-icingaweb2--default_admin_password)
@@ -476,6 +477,14 @@ Path to where cookies are stored.
476477

477478
Default value: `undef`
478479

480+
##### <a name="-icingaweb2--use_strict_csp"></a>`use_strict_csp`
481+
482+
Data type: `Optional[Boolean]`
483+
484+
Enable the inclusion of Content Security Policy (CSP) headers in application responses.
485+
486+
Default value: `undef`
487+
479488
##### <a name="-icingaweb2--admin_role"></a>`admin_role`
480489

481490
Data type: `Variant[Icingaweb2::AdminRole, Boolean[false]]`

manifests/config.pp

+12
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,8 @@
2121

2222
$cookie_path = $icingaweb2::cookie_path
2323

24+
$use_strict_csp = $icingaweb2::use_strict_csp
25+
2426
$resources = $icingaweb2::resources
2527
$default_auth_backend = $icingaweb2::default_auth_backend
2628
$user_backends = $icingaweb2::user_backends
@@ -103,6 +105,16 @@
103105
}
104106
}
105107

108+
if $use_strict_csp =~ NotUndef {
109+
icingaweb2::inisection { 'config-security':
110+
section_name => 'security',
111+
target => "${conf_dir}/config.ini",
112+
settings => {
113+
'use_strict_csp' => $use_strict_csp,
114+
},
115+
}
116+
}
117+
106118
# Additional resources
107119
$resources.each |String $res, Hash $cfg| {
108120
case $cfg['type'] {

manifests/init.pp

+4
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,9 @@
110110
# @param cookie_path
111111
# Path to where cookies are stored.
112112
#
113+
# @param use_strict_csp
114+
# Enable the inclusion of Content Security Policy (CSP) headers in application responses.
115+
#
113116
# @param admin_role
114117
# Manage a role for admin access.
115118
#
@@ -255,6 +258,7 @@
255258
Optional[Array[String[1]]] $extra_packages = undef,
256259
Optional[String[1]] $default_domain = undef,
257260
Optional[Stdlib::Absolutepath] $cookie_path = undef,
261+
Optional[Boolean] $use_strict_csp = undef,
258262
) {
259263
require icingaweb2::globals
260264

spec/classes/icingaweb2_spec.rb

+33
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,7 @@
6868
)
6969
}
7070
it { is_expected.not_to contain_icingaweb2__inisection('config-authentication') }
71+
it { is_expected.not_to contain_icingaweb2__inisection('config-security') }
7172
it { is_expected.not_to contain_icingaweb2__inisection('config-cookie') }
7273
it {
7374
is_expected.to contain_icingaweb2__resource__database('icingaweb2')
@@ -120,6 +121,38 @@
120121
}
121122
end
122123

124+
context "#{os} with use_strict_csp 'true'" do
125+
let(:params) do
126+
{
127+
use_strict_csp: true,
128+
db_type: 'mysql',
129+
}
130+
end
131+
132+
it {
133+
is_expected.to contain_icingaweb2__inisection('config-security')
134+
.with_section_name('security')
135+
.with_target('/etc/icingaweb2/config.ini')
136+
.with_settings({ 'use_strict_csp' => true })
137+
}
138+
end
139+
140+
context "#{os} with use_strict_csp 'false'" do
141+
let(:params) do
142+
{
143+
use_strict_csp: false,
144+
db_type: 'mysql',
145+
}
146+
end
147+
148+
it {
149+
is_expected.to contain_icingaweb2__inisection('config-security')
150+
.with_section_name('security')
151+
.with_target('/etc/icingaweb2/config.ini')
152+
.with_settings({ 'use_strict_csp' => false })
153+
}
154+
end
155+
123156
context "#{os} with default_auth_backend 'false', additional resources, user and group backend" do
124157
let(:params) do
125158
{

0 commit comments

Comments
 (0)