Files
nextcloud-server-mirror/tests/lib/AppFramework/Http
Daniel Calviño Sánchez 41f2d912d2 Allow "wasm-unsafe-eval" in CSP
If a page has a Content Security Policy header and the `script-src` (or
`default-src`) directive does not contain neither `wasm-unsafe-eval` nor
`unsafe-eval` loading and executing WebAssembly is blocked in the page
(although it is still possible to load and execute WebAssembly in a
worker thread).

Although the Nextcloud classes to manage the CSP already supported
allowing `unsafe-eval` this affects not only WebAssembly, but also the
`eval` operation in JavaScript.

To make possible to allow WebAssembly execution without allowing
JavaScript `eval` this commit adds support for allowing
`wasm-unsafe-eval`.

Signed-off-by: Daniel Calviño Sánchez <danxuliu@gmail.com>
2023-08-10 02:38:41 +02:00
..
2023-01-20 11:45:08 +01:00
2023-01-20 11:45:08 +01:00
2023-01-20 11:45:08 +01:00
2016-11-16 15:30:37 +01:00
2023-01-20 11:45:08 +01:00
2022-02-23 11:01:58 +01:00
2023-01-20 11:45:08 +01:00
2023-01-20 11:45:08 +01:00