The list of sources that may be loaded for the specified policy.
Please note that you may need to specify directives in your app's Content-Security-Policy as a element or as a HTTP header as well since those restrictions are inherited by child iframes used for rendering content-documents.
Examples:
Allow any url.
For more examples see: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy#Directives https://content-security-policy.com/
Generated using TypeDoc
A Content-Security-Policy directive compatible with CSP Level 1 and CSP Level 2.
Please see the following documentation: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy#Directives https://content-security-policy.com/
The following directives can be modified when whitelisting sources for remoteResourcesScriptedDocumentsOptions: 'child-src', 'frame-src', 'connect-src', 'default-src', 'font-src', 'img-src', 'media-src', 'object-src', 'script-src', 'style-src'
The following directives can be modified when whitelisting sources for remoteResourcesNonScriptedDocumentsOptions: 'style-src', 'frame-src', 'style-src', 'media-src', 'font-src', 'img-src'