Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[#1218] Resolve CSP issue blocking Sentry requests in Traefik configuration #1362

Conversation

placek
Copy link
Contributor

@placek placek commented Jun 20, 2024

The purpose of these changes is to resolve a Content Security Policy (CSP) issue in the Traefik configuration that was blocking Sentry requests. The existing CSP settings did not allow communication with Sentry endpoints, specifically POST requests to the Sentry API, which was hindering error tracking and monitoring. This update addresses the problem by modifying the connect-src directive to include permissions for requests to any instance of Sentry under the *.ingest.sentry.io domain. By making this adjustment, the system ensures that Sentry can receive error data, aligning with the user story's requirement for effective error monitoring. The outcome of these changes is a functional error logging and monitoring system through Sentry, as the requests are no longer blocked. Testing has confirmed that error data is successfully transmitted to Sentry, enabling continuous evaluation and troubleshooting of the frontend service. Furthermore, the updated CSP has been crafted to uphold security best practices, preventing any compromise in the system's overall security posture. The modifications have been documented to ensure clarity and facilitate future maintenance.

The Content Security Policy (CSP) was updated to resolve the issue that
was blocking Sentry requests. Previously, the `connect-src` directive
did not include wildcard entries for Sentry endpoints, causing POST
requests to the Sentry API to fail. The configuration was adjusted to
permit requests to any instance of Sentry under the `*.ingest.sentry.io`
domain. This change ensures that error tracking and monitoring via
Sentry can function correctly, as required by the user story. The
updated CSP also maintains security best practices and has been tested
to confirm successful transmission of error data to Sentry.
@placek placek requested review from Ryun1 and MSzalowski as code owners June 20, 2024 08:08
@placek placek linked an issue Jun 20, 2024 that may be closed by this pull request
@placek placek self-assigned this Jun 20, 2024
@placek placek added 🐛 Bug Something isn't working 🏗 Infrastructure labels Jun 20, 2024
@placek placek merged commit bfa66c6 into develop Jun 20, 2024
5 checks passed
@placek placek deleted the bug/1218-resolve-csp-issue-blocking-sentry-requests-in-traefik-configuration branch June 20, 2024 08:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
🐛 Bug Something isn't working 🏗 Infrastructure
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Resolve CSP issue blocking Sentry requests in Traefik configuration
2 participants