You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Visit a web page with a strict CSP such as Content-Security-Policy: default-src: none. (This works as a test page.)
The extension generates a console error message:
Content Security Policy: The page’s settings blocked the loading of a resource at inline (“default-src”).
I have a ton of extensions with content scripts installed, and this is the only one that triggers CSP warnings. I’ve not analyzed what IPFS Companion is doing that causes the warning.
Firefox Nightly 65.0a1 (2018-11-16)
The text was updated successfully, but these errors were encountered:
I am quite sure this is caused by window.ipfs experiment, which injects API via customized instance of ipfs-postmsg-proxy. We will look into this warning as a part of #589 and milestone/15.
Visit a web page with a strict CSP such as
Content-Security-Policy: default-src: none
. (This works as a test page.)The extension generates a console error message:
I have a ton of extensions with content scripts installed, and this is the only one that triggers CSP warnings. I’ve not analyzed what IPFS Companion is doing that causes the warning.
Firefox Nightly 65.0a1 (2018-11-16)
The text was updated successfully, but these errors were encountered: