updateXssConfiguration

put

/ccadmin/v1/merchant/xssConfiguration

Update anti-XSS (anti-cross-site-scripting) configuration. Allows whitelisting of endpoints by URI prefix or endpoint id and configuring specific XML tags to allow.

Request

Supported Media Types
Body ()
Root Schema : updateXssConfiguration_request
Type: object
Show Source
Example:
{
    "endpointIdsWhitelist":[
        "applicationJavaScript"
    ],
    "uriPrefixesWhitelist":[
        "/ccadmin/v1"
    ],
    "tagWhitelistAdditions":[
        "foo",
        "bar"
    ],
    "tagWhitelist":[
        "a",
        "abbr",
        "acronym",
        "address",
        "b",
        "big",
        "blockquote",
        "br",
        "caption",
        "cite",
        "code",
        "col",
        "colgroup",
        "dd",
        "defn",
        "del",
        "dir",
        "div",
        "dt",
        "em",
        "h1",
        "h2",
        "h3",
        "h4",
        "h5",
        "h6",
        "hr",
        "i",
        "img",
        "ins",
        "kbd",
        "li",
        "link",
        "menu",
        "ol",
        "p",
        "pre",
        "q",
        "samp",
        "small",
        "span",
        "strong",
        "sub",
        "sup",
        "table",
        "tbody",
        "td",
        "tfoot",
        "th",
        "thread",
        "tr",
        "tt",
        "ul",
        "var"
    ],
    "endpointIdsToAlwaysValidate":[
        "createProduct",
        "updateProduct"
    ]
}
Nested Schema : endpointIdsToAlwaysValidate
Type: array
List of endpoints by id that will have their request bodies XSS validated even if they fall under the whitelists. This is an editable list.
Show Source
Nested Schema : endpointIdsWhitelist
Type: array
List of endpoints by id that will not have their request bodies XSS validated. This is an editable list.
Show Source
Nested Schema : htmlValidatorAllowedAttributeAdditions
Type: array
Editable list of additional attribute names for the HTML parser-based anti-XSS validator to allow.
Show Source
Nested Schema : htmlValidatorAllowedTagAdditions
Type: array
Editable list of additional tag names for the HTML parser-based anti-XSS validator to allow.
Show Source
Nested Schema : illegalAttributeNames
Type: array
Editable illegal XML attribute name list.
Show Source
Nested Schema : tagWhitelist
Type: array
The list of XML tags that are allowed via whitelist. This is the built-in list and is read-only
Show Source
Nested Schema : tagWhitelistAdditions
Type: array
List of additional XML tags that are allowed via whitelist. This is an editable list.
Show Source
Nested Schema : uriPrefixesWhitelist
Type: array
List of URI prefixes. Endpoints whose URI's include any of these prefixes will not have their request bodies XSS validated. This is an editable list.
Show Source
Back to Top

Response

Supported Media Types

200 Response

Following model is returned when operation succeeds.
Body ()
Root Schema : updateXssConfiguration_response
Type: object
Show Source
Nested Schema : endpointIdsToAlwaysValidate
Type: array
Editable endpoint ids that will be XSS validated even if they fall under the whitelists.
Show Source
Nested Schema : endpointIdsWhitelist
Type: array
Editable whitelist of endpoint ids that will not perform XSS validation.
Show Source
Nested Schema : htmlValidatorAllowedAttributeAdditions
Type: array
Editable list of additional attribute names for the HTML parser-based anti-XSS validator to allow.
Show Source
Nested Schema : htmlValidatorAllowedTagAdditions
Type: array
Editable list of additional tag names for the HTML parser-based anti-XSS validator to allow.
Show Source
Nested Schema : illegalAttributeNames
Type: array
Editable illegal XML attribute name list.
Show Source
Nested Schema : tagWhitelist
Type: array
Read-only built-in setting for XML tags that are allowed in input values.
Show Source
Nested Schema : tagWhitelistAdditions
Type: array
Editable additional XML tags that are allowed in input values.
Show Source
Nested Schema : uriPrefixesWhitelist
Type: array
Editable whitelist of endpoint URI prefixes that will not perform XSS validation.
Show Source
Example Response (application/json)
{
    "endpointIdsWhitelist":[
        "applicationJavaScript"
    ],
    "uriPrefixesWhitelist":[
        "/ccadmin/v1"
    ],
    "tagWhitelistAdditions":[
        "bar",
        "foo"
    ],
    "endpointIdsToAlwaysValidate":[
        "createProduct",
        "updateProduct"
    ]
}

Default Response

The error response. The following are the internal error codes thrown by this API when the request processing fails in Oracle Commerce Cloud: |Error Code|Description| |------------------|------------------| |13001|Validation errors were found in the input.|
Body ()
Root Schema : errorModel
Type: object
Show Source
Nested Schema : errors
Type: array
An optional list of errors if multiple errors were encountered
Show Source
Nested Schema : items
Type: object
Show Source
Back to Top