<!doctype html>
<html>
<head>
<meta charset="UTF-8">
</head>
<body>
<div style="font-family:-apple-system,BlinkMacSystemFont,helvetica,sans-serif;" class="default-style">
Hi,
<br>
</div>
<div style="font-family:-apple-system,BlinkMacSystemFont,helvetica,sans-serif;" class="default-style">
<br>
</div>
<div style="font-family:-apple-system,BlinkMacSystemFont,helvetica,sans-serif;" class="default-style">
Did anyone try to implement a <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP">Content Security Policy (CSP)</a> without allowing <a href="https://content-security-policy.com/unsafe-inline/">unsafe-inline</a> scripts for a single page (jQuery AJAX) Seaside application? I made a few things working with <a href="https://content-security-policy.com/nonce/">nonce</a>, using a custom subclass of JQScriptGenerator and some other tweaks, but was wondering what other people are doing.
<br>
</div>
<div style="font-family:-apple-system,BlinkMacSystemFont,helvetica,sans-serif;" class="default-style">
<br>
</div>
<div style="font-family:-apple-system,BlinkMacSystemFont,helvetica,sans-serif;" class="default-style">
Cheers,
<br>
</div>
<div style="font-family:-apple-system,BlinkMacSystemFont,helvetica,sans-serif;" class="default-style">
Adriaan.
<br>
</div>
</body>
</html>