Hi

I'm so sorry for late reply.

The bug describes what I looked for.
I want to forbid a packaged webapp from introducing external js.

Thank you.


On 14/10/9 18:42 , Frederik Braun wrote:
On 09.10.2014 07:38, Junichi Hashimoto wrote:
Hi

Is there any example of specifying CSP in manifest file?

I added a following line for a web-previleged app but inline-script is
still active.

"csp":"default-src *; script-src 'self'; object-src 'none'; style-src
'self'"


Do you mean inline style instead of inline script?

The only change you seem to have made from the default policy is
removing 'unsafe-inline' from the style-src directive, making it a bit
stricter. The result would be disallowing inline styles (i.e., tags like
<style> css code here </style> and attributes like  style="css code here")

Is this what you intend to do?
I can confirm that I am still able to do inline styling with this
stricter manifest CSP in place. This sounds like a comeback of thsi bug
<https://bugzilla.mozilla.org/show_bug.cgi?id=1021972>, maybe?


If you tried to do something else, I want to highlight that the manifest
CSP directive should only ever be able to make the existing CSP
stricter: You will not find ways to relax the CSP we have in place for
Firefox OS apps.




# firefoxOS is version 2.1
_______________________________________________
dev-b2g mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-b2g

_______________________________________________
dev-b2g mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-b2g


_______________________________________________
dev-b2g mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-b2g

Reply via email to