-
-
Notifications
You must be signed in to change notification settings - Fork 276
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issues with Content Security Policy #234
Comments
That’s a problem. I had requested support for using only specific operators some time ago but there is no progress. crcn/sift.js#153 So what we can do right now:
Thanks for the issue! |
Ok, I can do a quick fix and a separate @casl/[email protected] which will be csp compliant. Eventually I plan to contribute either to |
Agreed with sift author to integrate CSP support into his library :) waiting for him to merge my PR |
sift is published, will try to update and publish casl tomorrow (there may be some issues to update sift to the latest version and if so, then I will publish a preview version of |
available in |
We are using CASL for our project to check permissions.
recently we encountered that there are some issues with CSP in our application.
Going further, we found that it is because of sift.js which has something like following in javascsript...
return"string"==typeof e?new Function("obj","return "+e)
CASL uses "sift" for Mongo DB like filters in javascript.
I tried to go through CASL documentation, but found nothing related to CSP or Security.
Has anybody got this issue before? Is it possible to fix this without adding "unsafe-eval"
following is the code snippet from stif.js which causes problem
The text was updated successfully, but these errors were encountered: