You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When implementing a strong CSP that excludes unsafe inline (using things like a nonce or hashes in the CSP) it blocks query monitor output. I'm not 100% sure how many places this affects but there are several places in the code that are echo '<script type="text/javascript">' . "\n\n";. If these were converted to using core methods like add_inline_script I believe that has filters / hooks that allow us to control the CSP and add a nonce. Or if there even was a filter on the script tag to add our own attributes that would be helpful. Happy to take a stab at a PR for this if you're open to that.
The text was updated successfully, but these errors were encountered:
When implementing a strong CSP that excludes unsafe inline (using things like a nonce or hashes in the CSP) it blocks query monitor output. I'm not 100% sure how many places this affects but there are several places in the code that are
echo '<script type="text/javascript">' . "\n\n";
. If these were converted to using core methods like add_inline_script I believe that has filters / hooks that allow us to control the CSP and add a nonce. Or if there even was a filter on the script tag to add our own attributes that would be helpful. Happy to take a stab at a PR for this if you're open to that.The text was updated successfully, but these errors were encountered: