Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Content-Security-Policy: Usage of "'strict-dynamic'" #372

Open
aldyn opened this issue Jan 29, 2020 · 0 comments
Open

Content-Security-Policy: Usage of "'strict-dynamic'" #372

aldyn opened this issue Jan 29, 2020 · 0 comments

Comments

@aldyn
Copy link

aldyn commented Jan 29, 2020

Enhancement

Package Version: >=2.0.0
Currently it's not possible to configure strict-dynamic CSP header in the application, since there is no possibility to use nonce attribute in the index.html file. Only possible solution is to manually change, after build is done, index.html file (script src for runtime.js and main.js) and to add desired value.

Currently is only supported to configure nonce attribute for dynamically loaded scripts in the app by adding following part of the code at the top of main.ts file:

// @ts-ignore
__webpack_nonce__ = 'c29tZSBjb29sIHN0cmluZyB3aWxsIHBvcCB1cCAxMjM=';
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant