We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Checklist
Hosting
Describe the bug When using CloudFlare rocket loader, previews don't load due to CSP
To Reproduce Steps to reproduce the behavior:
Expected behavior Everything works
Screenshots
Desktop (please complete the following information):
Additional context VM132 rocket-loader.min.js:1 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'self' 'unsafe-eval' https://*.budibase.net https://cdn.budi.live https://js.intercomcdn.com https://widget.intercom.io https://d2l5prqdbvm3op.cloudfront.net https://us-assets.i.posthog.com 'nonce-nEXtxUhIBOlQ5hsJZjt+Nw=='". Either the 'unsafe-inline' keyword, a hash ('sha256-PxaLgZ6U2+ROaVE28X5HHykZG4rFbQwJ32zQDSXFFiM='), or a nonce ('nonce-...') is required to enable inline execution.
The text was updated successfully, but these errors were encountered:
BUDI-8918 Cloudflare rocket loader blocks script loading
Sorry, something went wrong.
No branches or pull requests
Checklist
Hosting
Describe the bug
When using CloudFlare rocket loader, previews don't load due to CSP
To Reproduce
Steps to reproduce the behavior:
Expected behavior
Everything works
Screenshots
Desktop (please complete the following information):
Additional context
VM132 rocket-loader.min.js:1 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'self' 'unsafe-eval' https://*.budibase.net https://cdn.budi.live https://js.intercomcdn.com https://widget.intercom.io https://d2l5prqdbvm3op.cloudfront.net https://us-assets.i.posthog.com 'nonce-nEXtxUhIBOlQ5hsJZjt+Nw=='". Either the 'unsafe-inline' keyword, a hash ('sha256-PxaLgZ6U2+ROaVE28X5HHykZG4rFbQwJ32zQDSXFFiM='), or a nonce ('nonce-...') is required to enable inline execution.
The text was updated successfully, but these errors were encountered: