-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Content Security Policy support #3
Comments
adopted-ember-addons/ember-cli-content-security-policy#67 and ember-cli/ember-cli#3350 suggest that the community has not really figured out how to address this problem. The ember-cli team's answer so far is "turn CSP off." |
It might be challenging for ember-ace to do this because every time the core ACE library changes any of its CSS, this library will have to change the hashes. I've opened ajaxorg/ace#3260 to ask the core ACE team to help us out. (ACE has the CSS as individual files in the project, but they're not included in the |
ACE also calculates lots of styles on the fly and then modifies the DOM with At least this part has to be solved by ACE core using |
@jamesarosen Really appreciate all the thought and effort you've put into this so far! I'll keep a close eye on the Ace issue you linked. The inline |
It actually looks like Chrome only ignores Opening that attack vector obviously isn't ideal, but it's less extreme than disabling CSP completely, and using it for |
Excellent find! It's a compromise, but it'll do for now. |
🌈 |
One interesting thing I came across when experimenting with this — it looks like ember-cli-content-security-policy doesn't believe in I'm guessing that would be a trivial fix on that end, but I haven't actually checked to be sure. |
I've really enjoyed using your add-on so far!
One thing I've noticed is I get numerous report-only warnings, along the lines of this:
Could you add a hash/nonce to avoid these errors?
The text was updated successfully, but these errors were encountered: