Unfortunately, we have to enable unsafe-inline if we are using Paypal#4189
Unfortunately, we have to enable unsafe-inline if we are using Paypal#4189
Conversation
|
No actionable comments were generated in the recent review. 🎉 ℹ️ Recent review info⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (2)
📝 WalkthroughWalkthroughPayPal integration is added to Content Security Policy configuration with conditional rules based on PAYPAL_CLIENT_ID environment variable. A styling class update was applied to the OrderSummary Vue component. Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~12 minutes Poem
🚥 Pre-merge checks | ✅ 1✅ Passed checks (1 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. 📝 Coding Plan
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment Tip CodeRabbit can scan for known vulnerabilities in your dependencies using OSV Scanner.OSV Scanner will automatically detect and report security vulnerabilities in your project's dependencies. No additional configuration is required. |
https://developer.paypal.com/sdk/js/best-practices/
However
unsafe-inlineis ignored as soon as there is a hash in the list. So we need to also disable the hash list...Summary by CodeRabbit
New Features
Style