Changeset 358568
- Timestamp:
- 03/11/2011 01:11:48 AM (15 years ago)
- Location:
- content-security-policy/trunk
- Files:
-
- 2 edited
-
csp-options-page.php (modified) (1 diff)
-
script/csp-options.js (modified) (2 diffs)
Legend:
- Unmodified
- Added
- Removed
-
content-security-policy/trunk/csp-options-page.php
r358553 r358568 21 21 specific types of content are expected. To provide protection in this way, CSP 22 22 fundamentally changes the way JavaScript can be embedded in web pages, so be 23 aware that <b>WordPress plugins may experience broken functionality</b> when CSP24 is enabled.</p>23 aware that <b>WordPress plugins and themes may experience broken 24 functionality</b> when CSP is enabled.</p> 25 25 <table class="form-table" id="csp-form"> 26 26 <tr valign="top"> -
content-security-policy/trunk/script/csp-options.js
r358553 r358568 74 74 // only from this site 75 75 if (policy == "allow 'self';") { 76 var myHost = jQuery.url.setUrl( $(this).attr("src")).attr("host");76 var myHost = jQuery.url.setUrl(window.location.href).attr("host"); 77 77 // show non-editable policy representation. we don't want them to be able 78 78 // to remove "allow 'self'" (at least through the visual policy editor). … … 444 444 // the printed list will be interactive 445 445 function showVisualPolicy(sourceList, elementID, editable) { 446 if (DEBUG) $("#log").text(display(sourceList))446 if (DEBUG) $("#log").text(display(sourceList)) 447 447 $("#"+elementID).empty(); 448 var myHost = jQuery.url.setUrl( $(this).attr("src")).attr("host");448 var myHost = jQuery.url.setUrl(window.location.href).attr("host"); 449 449 for (type in sourceList) { 450 450 var div = document.createElement("div");
Note: See TracChangeset
for help on using the changeset viewer.