Hi René did you find a solution for this issue?
I guess this will be a major issue for everyone integrating a payment provider…. Regards, Markus > Am 08.03.2023 um 10:51 schrieb René Bock via Webobjects-dev > <webobjects-dev@lists.apple.com>: > > Hi, > > has anybody ever successfully enabled the HTTP Content-Security-Policy in a > WOnder application – especially when the Ajax-Framework is heavily used? > > From my point of view, there are three main challenges to overcome when > implementing the CSP: > > * inline script code > * DOM event handlers as HTML attributes > * evals > > > Especially when using the 'unsafe-inline', 'unsafe-eval' etc. keywords are > not an option. > > > > Regards > > René > > > -- > Phone: +49 69 650096 18 > salient GmbH // Lindleystraße 12 // 60314 Frankfurt > Amtsgericht Frankfurt am Main // salient GmbH HRB 48693 > > _______________________________________________ > Do not post admin requests to the list. They will be ignored. > Webobjects-dev mailing list (Webobjects-dev@lists.apple.com) > Help/Unsubscribe/Update your Subscription: > https://lists.apple.com/mailman/options/webobjects-dev/markus.stoll%40junidas.de > > This email sent to markus.st...@junidas.de
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ Do not post admin requests to the list. They will be ignored. Webobjects-dev mailing list (Webobjects-dev@lists.apple.com) Help/Unsubscribe/Update your Subscription: https://lists.apple.com/mailman/options/webobjects-dev/archive%40mail-archive.com This email sent to arch...@mail-archive.com