John, you can also use SPDY/HTTP2.0 PUSH to send sticky code alongside with the 
original HTML that will mimic the use of inline scripts but behaves like an 
external script. Essentially, you will have: `<script 
src="/my-sticky-data-and-initialization-per-page.js"></script>`, while that 
script is actually sent thru the SPDY multi-plex, which means no roundtrip is 
issued, no perf penalty, and it complies with CSP restrictions, the best of 
both worlds!

/caridy

On Aug 18, 2014, at 11:35 AM, John Barton <johnjbar...@google.com> wrote:

> 
> 
> 
> On Mon, Aug 18, 2014 at 8:02 AM, Anne van Kesteren <ann...@annevk.nl> wrote:
> On Mon, Aug 18, 2014 at 4:57 PM, John Barton <johnjbar...@google.com> wrote:
> > So you are claiming that CSP no longer restricts inline scripts and that the
> > various online docs are incorrect?  Or only that the server  set the
> > "unsafe-inline" value to opt out of the restriction?
> 
> Neither. See https://w3c.github.io/webappsec/specs/content-security-policy/
> for the new nonce-source and hash-source features. (Don't read TR/,
> it's kind of equivalent to reading the previous version of ES, but
> worse.)
> 
> Excellent thanks!  Hope those new features are adopted and servers routinely 
> implement the hash-source feature.
> 
> jjb
> _______________________________________________
> es-discuss mailing list
> es-discuss@mozilla.org
> https://mail.mozilla.org/listinfo/es-discuss

_______________________________________________
es-discuss mailing list
es-discuss@mozilla.org
https://mail.mozilla.org/listinfo/es-discuss

Reply via email to