-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
Content Security Policy: fix unsafe-eval
#12262
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Just to have it mentioned: this is a Chrome limitation - Firefox allows WASM without |
I believe also Safari, which is a browser which riot-web claims to support. |
Using |
As far as I know, no, it does not fix the problem, unfortunately. Chromium 90.0.4430.212 still shows an error:on that test page and it uses That is actually also already linked in WebAssembly/content-security-policy#7. |
There's now support for This is another issue to pay attention as well long-term: https://bugs.chromium.org/p/chromium/issues/detail?id=961485. This discusses allowing loading WASM from same-origin sources and there's mentions of WASM potentially getting its own CSP directive (e.g. |
This got done |
* Fix gradients spacings on the space panel Make the gradients two separate ones so they can be fixed pixel widths from the top & bottom rather than percentages of the height. Tweak the spacings between the user menu & threads panel to match the figma and from Gaelle's design. * Update snapshots * More screenshots
Split off from #3632
At this time it is not possible to disable
unsafe-eval
as it will break WASM. In future this will be possible, this issue is to remind us to do such when all browsers support this.The text was updated successfully, but these errors were encountered: