You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/about-administrator_web-console.adoc
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,7 @@
6
6
[id="about-administrator-perspective_{context}"]
7
7
= Administrator role in the web console
8
8
9
+
[role="_abstract"]
9
10
The cluster administrator role enables you to view the cluster inventory, capacity, general and specific utilization information, and the stream of important events, all of which help you to simplify planning and troubleshooting tasks. Both project administrators and cluster administrators can use all features in the web console.
See link:https://docs.openshift.com/container-platform/latest/applications/odc-viewing-application-composition-using-topology-view.html[Viewing application composition using the Topology] view for more information on using the *Topology* view in *Developer* perspective.
36
+
* link:https://docs.openshift.com/container-platform/latest/applications/odc-viewing-application-composition-using-topology-view.html[Viewing application composition using the Topology]
Copy file name to clipboardExpand all lines: modules/adding-tab-pods-page.adoc
+13-8Lines changed: 13 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,7 @@
6
6
[id="adding-tab-to-pods-page_{context}"]
7
7
= Adding a tab to the pods page
8
8
9
+
[role="_abstract"]
9
10
There are different customizations you can make to the {product-title} web console. The following procedure adds a tab to the *Pod details* page as an example extension to your plugin.
10
11
11
12
[NOTE]
@@ -34,10 +35,10 @@ Custom plugin code is not supported by Red Hat. Only link:https://access.redhat.
34
35
35
36
----
36
37
"consolePlugin": {
37
-
"name": "my-plugin", <1>
38
-
"version": "0.0.1", <2>
39
-
"displayName": "My Plugin", <3>
40
-
"description": "Enjoy this shiny, new console plugin!", <4>
38
+
"name": "my-plugin",
39
+
"version": "0.0.1",
40
+
"displayName": "My Plugin",
41
+
"description": "Enjoy this shiny, new console plugin!",
41
42
"exposedModules": {
42
43
"ExamplePage": "./components/ExamplePage"
43
44
},
@@ -46,10 +47,14 @@ Custom plugin code is not supported by Red Hat. Only link:https://access.redhat.
46
47
}
47
48
}
48
49
----
49
-
<1> Update the name of your plugin.
50
-
<2> Update the version.
51
-
<3> Update the display name for your plugin.
52
-
<4> Update the description with a synopsis about your plugin.
50
+
--
51
+
where:
52
+
53
+
`"name": "my-plugin",`:: Update the name of your plugin.
54
+
`"version": "0.0.1",`:: Update the version.
55
+
`"displayName": "My Plugin",`:: Update the display name for your plugin.
56
+
`"description": "Enjoy this shiny, new console plugin!",`:: Update the description with a synopsis about your plugin.
57
+
--
53
58
54
59
. Add the following to the `console-extensions.json` file:
Copy file name to clipboardExpand all lines: modules/csp-overview.adoc
+6-17Lines changed: 6 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,33 +4,22 @@
4
4
5
5
:_mod-docs-content-type: CONCEPT
6
6
[id="content-security-policy-overview_{context}"]
7
-
= Content Security Policy (CSP) overview
7
+
= Key features of `contentSecurityPolicy`(CSP)
8
8
9
+
[role="_abstract"]
9
10
A Content Security Policy (CSP) is delivered to the browser in the `Content-Security-Policy-Report-Only` response header. The policy is specified as a series of directives and values. Each directive type serves a different purpose, and each directive can have a list of values representing allowed sources.
The supported directive types include `DefaultSrc`, `ScriptSrc`, `StyleSrc`, `ImgSrc`, and `FontSrc`. These directives allow you to specify valid sources for loading different types of content for your plugin. Each directive type serves a different purpose. For example, `ScriptSrc` defines valid JavaScript sources, while `ImgSrc` controls where images can be loaded from.
18
14
19
15
//backporting the ConnectSrc directive, but that is tbd - openshift/console#14701 and https://github.com/openshift/api/pull/2164
20
-
21
-
22
-
23
-
=== Values
24
-
16
+
== Values
25
17
Each directive can have a list of values representing allowed sources. For example, `ScriptSrc` can specify multiple external scripts. These values are restricted to 1024 characters and cannot include whitespace, commas, or semicolons. Additionally, single-quoted strings and wildcard characters (`*`) are disallowed.
26
18
27
-
28
-
=== Unified Policy
29
-
19
+
== Unified Policy
30
20
The {product-title} web console aggregates the CSP directives across all enabled `ConsolePlugin` custom resources (CRs) and merges them with its own default policy. The combined policy is then applied with the `Content-Security-Policy-Report-Only` HTTP response header.
31
21
32
-
33
-
=== Validation Rules
22
+
== Validation Rules
34
23
* Each directive can have up to 16 unique values.
35
24
* The total size of all values across directives must not exceed 8192 bytes (8KB).
36
25
* Each value must be unique, and additional validation rules are in place to ensure no quotes, spaces, commas, or wildcard symbols are used.
Copy file name to clipboardExpand all lines: modules/dynamic-plug-in-development.adoc
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,7 @@
6
6
[id="dynamic-plugin-development_{context}"]
7
7
= Dynamic plugin development
8
8
9
+
[role="_abstract"]
9
10
You can run the plugin using a local development environment. The {product-title} web console runs in a container connected to the cluster you have logged into.
0 commit comments