[jira] [Created] (WW-5280) Cleanup NoParameters interfaces

2023-02-12 Thread Lukasz Lenart (Jira)
Lukasz Lenart created WW-5280:
-

 Summary: Cleanup NoParameters interfaces
 Key: WW-5280
 URL: https://issues.apache.org/jira/browse/WW-5280
 Project: Struts 2
  Issue Type: Improvement
Reporter: Lukasz Lenart
 Fix For: 6.2.0


There are two {{NoParameters}} interfaces:
- {{org.apache.struts2.interceptor.NoParameters}}
- {{com.opensymphony.xwork2.interceptor.NoParameters}}

the former isn't used by the {{ParametersInterceptor}}, just the second one. 
Mark the old XWork interface and just use the new from struts2 package (just 
move it into {{org.apache.struts2.action}} package)



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (WW-5275) Allow to configure more flexible Content-Security-Policy

2023-02-12 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/WW-5275?focusedWorklogId=844956&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-844956
 ]

ASF GitHub Bot logged work on WW-5275:
--

Author: ASF GitHub Bot
Created on: 12/Feb/23 15:37
Start Date: 12/Feb/23 15:37
Worklog Time Spent: 10m 
  Work Description: lukaszlenart opened a new pull request, #658:
URL: https://github.com/apache/struts/pull/658

   Closes [WW-5275](https://issues.apache.org/jira/browse/WW-5275)




Issue Time Tracking
---

Worklog Id: (was: 844956)
Remaining Estimate: 0h
Time Spent: 10m

> Allow to configure more flexible Content-Security-Policy
> 
>
> Key: WW-5275
> URL: https://issues.apache.org/jira/browse/WW-5275
> Project: Struts 2
>  Issue Type: New Feature
>  Components: Core Interceptors
>Reporter: Lukasz Lenart
>Priority: Minor
> Fix For: 6.2.0
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Currently CSP interceptor doesn't allow to change {{script-src}} or 
> {{object-src}} or any other values - it should be possible to customise these 
> to allow users adopt the policy to their specific needs.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (WW-5275) Allow to configure more flexible Content-Security-Policy

2023-02-12 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/WW-5275?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17687587#comment-17687587
 ] 

ASF subversion and git services commented on WW-5275:
-

Commit 6d6a5a14255982812f5f6cc645b1430f7cd512c4 in struts's branch 
refs/heads/WW-5275-custom-csp from Lukasz Lenart
[ https://gitbox.apache.org/repos/asf?p=struts.git;h=6d6a5a142 ]

WW-5275 Allows to provide a custom CspSettings per action


> Allow to configure more flexible Content-Security-Policy
> 
>
> Key: WW-5275
> URL: https://issues.apache.org/jira/browse/WW-5275
> Project: Struts 2
>  Issue Type: New Feature
>  Components: Core Interceptors
>Reporter: Lukasz Lenart
>Priority: Minor
> Fix For: 6.2.0
>
>
> Currently CSP interceptor doesn't allow to change {{script-src}} or 
> {{object-src}} or any other values - it should be possible to customise these 
> to allow users adopt the policy to their specific needs.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (WW-5275) Allow to configure more flexible Content-Security-Policy

2023-02-12 Thread ASF subversion and git services (Jira)


[ 
https://issues.apache.org/jira/browse/WW-5275?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17687594#comment-17687594
 ] 

ASF subversion and git services commented on WW-5275:
-

Commit 68a401aacfbde7ab0210cbc2503b466e08ab6264 in struts's branch 
refs/heads/WW-5275-custom-csp from Lukasz Lenart
[ https://gitbox.apache.org/repos/asf?p=struts.git;h=68a401aac ]

WW-5275 Allows to provide a custom CspSettings per action


> Allow to configure more flexible Content-Security-Policy
> 
>
> Key: WW-5275
> URL: https://issues.apache.org/jira/browse/WW-5275
> Project: Struts 2
>  Issue Type: New Feature
>  Components: Core Interceptors
>Reporter: Lukasz Lenart
>Priority: Minor
> Fix For: 6.2.0
>
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> Currently CSP interceptor doesn't allow to change {{script-src}} or 
> {{object-src}} or any other values - it should be possible to customise these 
> to allow users adopt the policy to their specific needs.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[GitHub] [struts] sonarcloud[bot] commented on pull request #658: [WW-5275] Allows to provide a custom CspSettings per action

2023-02-12 Thread via GitHub


sonarcloud[bot] commented on PR #658:
URL: https://github.com/apache/struts/pull/658#issuecomment-1427069968

   Kudos, SonarCloud Quality Gate passed!    [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_struts&pullRequest=658)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=658&resolved=false&types=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=658&resolved=false&types=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=658&resolved=false&types=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=CODE_SMELL)
   
   
[![92.6%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/90-16px.png
 
'92.6%')](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=658&metric=new_coverage&view=list)
 [92.6% 
Coverage](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=658&metric=new_coverage&view=list)
  
   
[![0.0%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/3-16px.png
 
'0.0%')](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=658&metric=new_duplicated_lines_density&view=list)
 [0.0% 
Duplication](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=658&metric=new_duplicated_lines_density&view=list)
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@struts.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org



[jira] [Work logged] (WW-5275) Allow to configure more flexible Content-Security-Policy

2023-02-12 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/WW-5275?focusedWorklogId=844957&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-844957
 ]

ASF GitHub Bot logged work on WW-5275:
--

Author: ASF GitHub Bot
Created on: 12/Feb/23 16:11
Start Date: 12/Feb/23 16:11
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #658:
URL: https://github.com/apache/struts/pull/658#issuecomment-1427069968

   Kudos, SonarCloud Quality Gate passed!    [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_struts&pullRequest=658)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=658&resolved=false&types=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=658&resolved=false&types=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_struts&pullRequest=658&resolved=false&types=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_struts&pullRequest=658&resolved=false&types=CODE_SMELL)
   
   
[![92.6%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/90-16px.png
 
'92.6%')](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=658&metric=new_coverage&view=list)
 [92.6% 
Coverage](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=658&metric=new_coverage&view=list)
  
   
[![0.0%](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/3-16px.png
 
'0.0%')](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=658&metric=new_duplicated_lines_density&view=list)
 [0.0% 
Duplication](https://sonarcloud.io/component_measures?id=apache_struts&pullRequest=658&metric=new_duplicated_lines_density&view=list)
   
   




Issue Time Tracking
---

Worklog Id: (was: 844957)
Time Spent: 20m  (was: 10m)

> Allow to configure more flexible Content-Security-Policy
> 
>
> Key: WW-5275
> URL: https://issues.apache.org/jira/browse/WW-5275
> Project: Struts 2
>  Issue Type: New Feature
>  Components: Core Interceptors
>Reporter: Lukasz Lenart
>Priority: Minor
> Fix For: 6.2.0
>
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> Currently CSP interceptor doesn't allow to change {{script-src}} or 
> {{object-src}} or any other values - it should be possible to customise these 
> to allow users adopt the policy to their specific needs.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)