Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add possibility to pass in a CSP nonce value #46

Closed
wants to merge 7 commits into from

Conversation

webjunkie
Copy link

Add nonce argument to pass in a CSP nonce value so that the script elements are allowed to run on CSP enabled sites.

See https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src#Unsafe_inline_script

Fixes #41

@jamesism
Copy link

Any chance this will merge soon?

# Conflicts:
#	dist/Snippets.js
#	dist/TagManager.js
@webjunkie
Copy link
Author

I merged master to fix merge conflicts.

@nick4fake
Copy link

@alinemorelli could you please merge this?

@shekyb
Copy link

shekyb commented Feb 7, 2022

Can we expect this to be merged?

@roiekoper
Copy link

Any updates about this PR?

@TheMikeL
Copy link

TheMikeL commented Sep 1, 2022

Any updates on this PR, or any alternatives to adding nonce in this library?

@karupanerura karupanerura mentioned this pull request Oct 4, 2022
@dazulu
Copy link

dazulu commented Nov 10, 2022

Are there any updates about this PR?

@eugeniosegala
Copy link

eugeniosegala commented Mar 24, 2023

We need to merge this PR.

How can I help to make this happen?

@webjunkie
Copy link
Author

Fixed in mosesokemwa@eab2eb4

@webjunkie webjunkie closed this May 29, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Violation of Content Security Policy directive script-src that disables inline scripts
8 participants