<!doctype html>
<html>
 <head> 
  <meta charset="UTF-8"> 
 </head>
 <body>
  <div style="font-family:-apple-system,BlinkMacSystemFont,helvetica,sans-serif;" class="default-style">
   Hi,
   <br>
  </div>
  <div style="font-family:-apple-system,BlinkMacSystemFont,helvetica,sans-serif;" class="default-style">
   <br>
  </div>
  <div style="font-family:-apple-system,BlinkMacSystemFont,helvetica,sans-serif;" class="default-style">
   Did anyone try to implement a <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP">Content Security Policy (CSP)</a> without allowing <a href="https://content-security-policy.com/unsafe-inline/">unsafe-inline</a> scripts for a single page (jQuery AJAX) Seaside application? I made a few things working with <a href="https://content-security-policy.com/nonce/">nonce</a>, using a custom subclass of JQScriptGenerator and some other tweaks, but was wondering what other people are doing.
   <br>
  </div>
  <div style="font-family:-apple-system,BlinkMacSystemFont,helvetica,sans-serif;" class="default-style">
   <br>
  </div>
  <div style="font-family:-apple-system,BlinkMacSystemFont,helvetica,sans-serif;" class="default-style">
   Cheers,
   <br>
  </div>
  <div style="font-family:-apple-system,BlinkMacSystemFont,helvetica,sans-serif;" class="default-style">
   Adriaan.
   <br>
  </div>
 </body>
</html>