Commit d134ee09 authored by Eriksson Monteiro's avatar Eriksson Monteiro

update millix integration

parent 44282147
...@@ -38,6 +38,7 @@ function refreshIframe() { ...@@ -38,6 +38,7 @@ function refreshIframe() {
} else { } else {
iframe = document.createElement('iframe'); iframe = document.createElement('iframe');
iframe.id = 'millix_frame'; iframe.id = 'millix_frame';
iframe.allow = "clipboard-write"
iframe.onload = onFrameReady; iframe.onload = onFrameReady;
iframe.src = `chrome-untrusted://millix/${page}` iframe.src = `chrome-untrusted://millix/${page}`
document.body.appendChild(iframe); document.body.appendChild(iframe);
......
...@@ -53,7 +53,7 @@ UntrustedMillixAppUI::UntrustedMillixAppUI(content::WebUI* web_ui) ...@@ -53,7 +53,7 @@ UntrustedMillixAppUI::UntrustedMillixAppUI(content::WebUI* web_ui)
network::mojom::CSPDirectiveName::DefaultSrc, "default-src 'self' 'unsafe-inline';"); network::mojom::CSPDirectiveName::DefaultSrc, "default-src 'self' 'unsafe-inline';");
untrusted_source->OverrideContentSecurityPolicy( untrusted_source->OverrideContentSecurityPolicy(
network::mojom::CSPDirectiveName::DefaultSrc, "img-src 'self' data: blob:;"); network::mojom::CSPDirectiveName::ImgSrc, "img-src 'self' data: blob:;");
untrusted_source->OverrideContentSecurityPolicy( untrusted_source->OverrideContentSecurityPolicy(
network::mojom::CSPDirectiveName::ScriptSrc, "script-src tangled://resources 'self' 'unsafe-inline';"); network::mojom::CSPDirectiveName::ScriptSrc, "script-src tangled://resources 'self' 'unsafe-inline';");
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment