Browse Source
clean up HTML, CSS, and JavaScript for CSP
clean up HTML, CSS, and JavaScript for CSP
In order to implement Content-Security-Policy, the inlined style, event handlers, and scripts all have to go. This commit completes this work.pull/36/head
mutantmonkey
9 years ago
12 changed files with 110 additions and 48 deletions
-
71static/css/linx.css
-
14static/js/bin.js
-
2templates/404.html
-
2templates/display/audio.html
-
26templates/display/bin.html
-
2templates/display/file.html
-
2templates/display/image.html
-
5templates/display/pdf.html
-
8templates/display/video.html
-
2templates/index.html
-
2templates/oops.html
-
4templates/paste.html
@ -1,5 +1,5 @@ |
|||
{% extends "base.html" %} |
|||
|
|||
{% block content %} |
|||
<a href="/"><img style="border:0;" src='/static/images/404.jpg' width='400'></a> |
|||
<a href="/"><img src='/static/images/404.jpg'></a> |
|||
{% endblock %} |
@ -1,7 +1,7 @@ |
|||
{% extends "base.html" %} |
|||
|
|||
{% block main %} |
|||
<div class="normal" style="width: 500px;"> |
|||
<div class="normal display-file"> |
|||
<p class="center">You are requesting <a href="/selif/{{ filename }}">{{ filename }}</a>, <a href="/selif/{{ filename }}">click here</a> to download.</p> |
|||
</div> |
|||
{% endblock %} |
@ -1,10 +1,8 @@ |
|||
{% extends "base.html" %} |
|||
|
|||
{% block main %} |
|||
<div id='video'> |
|||
<video controls autoplay width="800"> |
|||
<video class="display-video" controls autoplay> |
|||
<source src="/selif/{{ filename }}"/> |
|||
</video> |
|||
</div> |
|||
|
|||
<a href='/selif/{{ filename }}'>Download it instead</a> |
|||
</video> |
|||
{% endblock %} |
Write
Preview
Loading…
Cancel
Save
Reference in new issue