Skip to content

Conversation

@player-03
Copy link
Contributor

Running an inline script requires a website to have one of three things:

  1. No script-src directive in its content security policy (insecure).
  2. script-src 'unsafe-inline' (insecure).
  3. A nonce or hash for each inline script (secure but high-effort).

https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/CSP#inline_javascript

If we move the inline scripts into output.js, then websites can use a secure CSP without having to update it every time they want to publish a new Lime app.

Users can still call lime.embed() manually if they want, in which case this will refrain from calling it again. This also means it's compatible with OpenFL's index.html template, so we can safely release this before updating that.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant