Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Content Security Policy (CSP Support) #1019

Open
billy-felton opened this issue Jul 17, 2023 · 1 comment
Open

Content Security Policy (CSP Support) #1019

billy-felton opened this issue Jul 17, 2023 · 1 comment
Assignees

Comments

@billy-felton
Copy link

Hi All,

We are using Grappelli in our application and are currently updating our Content Security Policy header.

When using the the Django CMS with Grapelli it flags up many instances where inline Javascript and inline CSS is being used which violates our CSP policy.

I had one approach of updating all the templates to support a "nonce-..." value, as well us restructuring the CSS and scripts to be in their own files but this would take a lot of work and would be difficult to maintain when a new version of Grappelli is released.

Has anyone else encountered this issue? or does anyone know if this is a issue currently being worked on?

Many Thanks,
Billy

@sehmaschine sehmaschine self-assigned this Jul 20, 2023
@sehmaschine
Copy link
Owner

see also #684

And to answer your question: We are currently not working on this issue, but I do see your point and the need to fix this. If we find the time, we'll look into this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants