-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Inline scripts should be avoided #83
Comments
Laziness is the culprit. If you want, please send a PR and I'll release. Thanks. |
I was feeling bad, so I fixed it. I am also trying to remove 'unsafe inline' from my CSP directives. @michael-e Can you test the latest |
It works fine for me, but I have no real-life test case for filtered or paginated ordering. (I have not used these features in my projects.) |
Me neither. But it was working on my 'test' setup... So I ship ? |
Hmmm, yes, I would ship it. But is it a bugfix? I mean, shouldn't it be v2.4.0? |
I tested it too... looks good in normal mode (apart from my general issues with the current behavior of this extension). Looks also good when using it combined with pagination. But I haven't tested filtered ordering yet... but might do so today! |
No a security patch. Not a new feature. Shipped as |
The extension driver adds an inline script to the head of the page:
This should be avoided. If you use Content Security Policy HTTP headers, you will always attempt to limit the allowed script sources as much as possible, avoiding inline scripts at all costs. (Security evaluation websites like https://observatory.mozilla.org will blame you for allowing inline scripts because this enables special attack vectors.)
Is there any reason why the snippet above has not simply been added to
assets/order_entries.publish.js
?The text was updated successfully, but these errors were encountered: