Please open an INFRA JIRA. On Sunday, April 24, 2016, Uwe Schindler <uschind...@apache.org> wrote:
> Hi, > > We have the same problem with our Lucene documentation. Some Lucene > classes refer to JDK documentation. The links just result in a white page > and the mentioned security warning in browser logs. > > For other Jenkins servers outside ASF the setting to disable this checks > were added to prevent the javadocs problem. > > Unless Java 9 with the new Javadocs style comes, it is impossible to > display Javadocs of previous versions with the frame security issues. > Please disable this as described in Jenkins Wiki. Our build servers are > under full control by infrastructure and comitters. Nobody from the outside > can inject custom pages loaded in frames. > > Uwe > > Am 24. April 2016 16:34:16 MESZ, schrieb Rick Hillegas < > rick.hille...@gmail.com <javascript:;>>: > >Hi Infrastructure experts, > > > >The Derby project uses Jenkins to build the latest version of our user > >documentation. The resulting documents are linked from the Derby > >website > >here: http://db.apache.org/derby/manuals/index.html#latest. Some of the > > > >Jenkins-built documentation is in html format and it uses frames. The > >Jenkins machines serve up those web pages as blank frames and my > >Firefox > >browser's error console reports the following: > > > ><consoleOutput> > >Content Security Policy: Couldn't process unknown directive 'sandbox' > ><unknown> > >Content Security Policy: The page's settings blocked the loading of a > >resource at > > > https://builds.apache.org/job/Derby-docs/lastSuccessfulBuild/artifact/trunk/out/ref/toc.html > >("default-src 'none'"). > ></consoleOutput> > > > >The frames seem to have been intercepted in order to frustrate a > >possible Cross Frame Scripting attack, as described by the default > >Jenkins Content Security Policy: > > > https://wiki.jenkins-ci.org/display/JENKINS/Configuring+Content+Security+Policy#ConfiguringContentSecurityPolicy-Considerations > > > >The default Jenkins Content Security Policy assumes that Apache > >continuous-integration builds are exposed to the two risks listed here: > > > > > https://wiki.jenkins-ci.org/display/JENKINS/Configuring+Content+Security+Policy#ConfiguringContentSecurityPolicy-Considerations > > > >. I don't believe that Apache's Jenkins builds suffer from the first > >risk ("Are less trusted users allowed to create or modify files in > >Jenkins workspaces?"). That is because only trusted Apache committers > >can trigger Jenkins builds. Do Apache continuous-integration builds > >suffer from the second risk ("Are some slaves not fully trusted?"). > > > >The Derby developers have begun discussing this problem at > > > http://apache-database.10148.n7.nabble.com/alpha-docs-not-being-generated-td145918.html > > > >. I would appreciate your advice about how we can stop html frames from > > > >being intercepted and blanked out when readers link to the > >Jenkins-built > >documentation. > > > >Thanks, > >-Rick >