[6.1] Add Custom Header Filter documentation to IS 6.1 docs#5844
[6.1] Add Custom Header Filter documentation to IS 6.1 docs#5844HasiniSama merged 1 commit intowso2:masterfrom
Conversation
|
Warning Rate limit exceeded
⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. 📒 Files selected for processing (2)
Note Other AI code review bot(s) detectedCodeRabbit has detected other AI code review bot(s) in this pull request and will avoid duplicating their findings in the review comments. This may lead to a less comprehensive review. WalkthroughAdds a new documentation page explaining how to enable and configure a custom header filter (including examples and limitations) and updates the product docs navigation to include the new page. Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~10 minutes Poem
🚥 Pre-merge checks | ✅ 2 | ❌ 1❌ Failed checks (1 warning)
✅ Passed checks (2 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
ffe4096 to
bc00445
Compare
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Fix all issues with AI agents
In `@en/identity-server/6.1.0/docs/deploy/custom-header-filter.md`:
- Line 53: The curl command URL has a typo "hhttps" which will fail; update the
command (the POST to
/t/{root_organization_name}/api/identity/config-mgt/v1.0/resource/custom-headers)
to use "https" instead of "hhttps" so the URL begins with "https://".
There was a problem hiding this comment.
Pull request overview
This PR adds comprehensive documentation for configuring custom HTTP headers using the Custom Header Filter feature in WSO2 Identity Server 6.1. The documentation enables administrators to add security headers like Content-Security-Policy to web applications.
Changes:
- Added custom header filter documentation to deployment configuration section
- Documented prerequisites, configuration steps, and API usage examples
- Included known limitations and usage notes for different web applications
Reviewed changes
Copilot reviewed 2 out of 2 changed files in this pull request and generated 8 comments.
| File | Description |
|---|---|
| en/identity-server/6.1.0/mkdocs.yml | Added navigation entry for Custom Header Filter documentation under Configure section |
| en/identity-server/6.1.0/docs/deploy/custom-header-filter.md | New documentation file explaining how to enable and configure custom headers for WSO2 IS web applications |
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Fix all issues with AI agents
In `@en/identity-server/6.1.0/docs/deploy/custom-header-filter.md`:
- Around line 8-10: Update the "Known limitations" note so it accurately states
the CSP behavior: replace the sentence that currently reads "WSO2 Identity
Server web applications do not fully support CSP headers with `unsafe-inline`
and `unsafe-eval` directives due to code base limitations" with a clear
statement that WSO2 Identity Server 6.1.0 web applications require CSP headers
to include `unsafe-inline` and/or `unsafe-eval` (because of inline
scripts/styles), and append that security patches and U2 updates reduce this
requirement; ensure the header/title "Known limitations" and surrounding context
remain unchanged.
🧹 Nitpick comments (1)
en/identity-server/6.1.0/docs/deploy/custom-header-filter.md (1)
35-44: Flag-kas dev-only (TLS verification disabled).All curl samples use
-k, which disables TLS verification. Please add a brief note that-kis for local/dev only and should be removed in production.♻️ Suggested doc tweak
```bash -curl -k -X POST https://localhost:9443/api/identity/config-mgt/v1.0/resource-type \ +curl -k -X POST https://localhost:9443/api/identity/config-mgt/v1.0/resource-type \ -H "accept: application/json" \ -H "Content-Type: application/json" \ -H "Authorization: Bearer {bearer_token}" \ -d '{ @@ }'
+!!! note
-kdisables TLS certificate verification. Use it only for local/dev setups and remove it in production.</details> Also applies to: 52-66, 80-88 </blockquote></details> </blockquote></details> <!-- This is an auto-generated comment by CodeRabbit for review status -->
bc00445 to
d535087
Compare
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Fix all issues with AI agents
In `@en/identity-server/6.1.0/docs/deploy/custom-header-filter.md`:
- Line 3: Update the application names in the summary sentence to match the
mapping list: change "Account Recovery" to "Account Recovery Endpoint" and "My
Account" to "My Account Portal" so the phrasing is consistent with the mapping
entries; locate and edit the strings "Account Recovery" and "My Account" in the
Custom Header Filter description and replace them with "Account Recovery
Endpoint" and "My Account Portal" respectively.
1a7ed02 to
db07fcd
Compare
db07fcd to
4c20db2
Compare
|
The failing LINT issues can be ignored. |
Issues:
This breaks of the PR: #5821
6.1.0
Screen.Recording.2026-01-21.at.14.24.37.mov
Summary by CodeRabbit
✏️ Tip: You can customize this high-level summary in your review settings.