Skip to content

Commit 70f3ba9

Browse files
committed
remove invalid source
1 parent b549d42 commit 70f3ba9

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

src/core/webview/ClineProvider.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -722,7 +722,7 @@ export class ClineProvider extends EventEmitter<ClineProviderEvents> implements
722722
<meta charset="utf-8">
723723
<meta name="viewport" content="width=device-width,initial-scale=1,shrink-to-fit=no">
724724
<meta name="theme-color" content="#000000">
725-
<meta http-equiv="Content-Security-Policy" content="default-src 'none'; font-src ${webview.cspSource}; style-src ${webview.cspSource} 'unsafe-inline'; img-src ${webview.cspSource} data:; media-src ${webview.cspSource}; script-src ${webview.cspSource} 'wasm-unsafe-eval' 'nonce-${nonce}' https://us-assets.i.posthog.com 'strict-dynamic'; connect-src https://openrouter.ai https://api.requesty.ai https://us.i.posthog.com https://us-assets.i.posthog.com https://file+.vscode-resource.vscode-cdn.net;">
725+
<meta http-equiv="Content-Security-Policy" content="default-src 'none'; font-src ${webview.cspSource}; style-src ${webview.cspSource} 'unsafe-inline'; img-src ${webview.cspSource} data:; media-src ${webview.cspSource}; script-src ${webview.cspSource} 'wasm-unsafe-eval' 'nonce-${nonce}' https://us-assets.i.posthog.com 'strict-dynamic'; connect-src https://openrouter.ai https://api.requesty.ai https://us.i.posthog.com https://us-assets.i.posthog.com">
726726
<link rel="stylesheet" type="text/css" href="${stylesUri}">
727727
<link href="${codiconsUri}" rel="stylesheet" />
728728
<script nonce="${nonce}">

src/core/webview/__tests__/ClineProvider.test.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -360,7 +360,7 @@ describe("ClineProvider", () => {
360360

361361
// Verify Content Security Policy contains the necessary PostHog domains
362362
expect(mockWebviewView.webview.html).toContain(
363-
"connect-src https://openrouter.ai https://api.requesty.ai https://us.i.posthog.com https://us-assets.i.posthog.com https://file+.vscode-resource.vscode-cdn.net;",
363+
"connect-src https://openrouter.ai https://api.requesty.ai https://us.i.posthog.com https://us-assets.i.posthog.com",
364364
)
365365

366366
// Extract the script-src directive section and verify required security elements

0 commit comments

Comments
 (0)