Hello all. I'm about to decide whether to use Polymer in a Chrome Packaged Application in the near future. Since the project will be quite big (it's a rewriting of a software currently written in Java and NetBeans Platform), I'm quite worried about using Vulcanizer as my main file will grow up a lot. So, I was wondering: is there any plan on bringing Polymer on Chrome Packaged Apps natively? I tried running a test app in Chrome Dev Editor and Chrome 36 Beta, but I still get CSP-related errors, so I guess that HTML imports and Observe-js becoming native are not the only missing pieces...Can someone give me a clue?
Follow Polymer on Google+: plus.google.com/107187849809354688692
---
You received this message because you are subscribed to the Google Groups "Polymer" group.
To unsubscribe from this group and stop receiving emails from it, send an email to polymer-dev...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/polymer-dev/2dd04aeb-0d00-404c-af63-e8f38b3d42d8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
<!DOCTYPE html>
<html><head> <title>PolymerApp</title> <!-- 1. Load platform.js for polyfill support. --> <script src="bower_components/platform/platform.js"></script>
<!-- 2. Use an HTML Import to bring in the element. --> <link rel="import" href="bower_components/paper-button/paper-button.html" /> <link rel="stylesheet" href="styles.css"></head>
<body> <h1 id="greeting"></h1> <paper-button label="flat button"></paper-button> <paper-button label="raised button" raisedButton></paper-button> <script src="main.js"></script></body></html>
- Refused to evaluate a string as JavaScript because 'unsafe-eval' is not an allowed source of script in the following Content Security Policy directive: "default-src 'self' chrome-extension-resource:". Note that 'script-src' was not explicitly set, so 'default-src' is used as a fallback.
observe.js:794
- (anonymous function)observe.js:794
- (anonymous function)observe.js:797
- (anonymous function)observe.js:1716
Refused to execute inline script because it violates the following Content Security Policy directive: "default-src 'self' chrome-extension-resource:". Either the 'unsafe-inline' keyword, a hash ('sha256-...'), or a nonce ('nonce-...') is required to enable inline execution. Note also that 'script-src' was not explicitly set, so 'default-src' is used as a fallback.
core-meta.html:61Refused to execute inline script because it violates the following Content Security Policy directive: "default-src 'self' chrome-extension-resource:". Either the 'unsafe-inline' keyword, a hash ('sha256-...'), or a nonce ('nonce-...') is required to enable inline execution. Note also that 'script-src' was not explicitly set, so 'default-src' is used as a fallback.
core-iconset.html:65Refused to execute inline script because it violates the following Content Security Policy directive: "default-src 'self' chrome-extension-resource:". Either the 'unsafe-inline' keyword, a hash ('sha256-...'), or a nonce ('nonce-...') is required to enable inline execution. Note also that 'script-src' was not explicitly set, so 'default-src' is used as a fallback.
core-icon.html:43Refused to execute inline script because it violates the following Content Security Policy directive: "default-src 'self' chrome-extension-resource:". Either the 'unsafe-inline' keyword, a hash ('sha256-...'), or a nonce ('nonce-...') is required to enable inline execution. Note also that 'script-src' was not explicitly set, so 'default-src' is used as a fallback.
paper-focusable.html:34Refused to execute inline script because it violates the following Content Security Policy directive: "default-src 'self' chrome-extension-resource:". Either the 'unsafe-inline' keyword, a hash ('sha256-...'), or a nonce ('nonce-...') is required to enable inline execution. Note also that 'script-src' was not explicitly set, so 'default-src' is used as a fallback.
paper-ripple.html:88Refused to execute inline script because it violates the following Content Security Policy directive: "default-src 'self' chrome-extension-resource:". Either the 'unsafe-inline' keyword, a hash ('sha256-...'), or a nonce ('nonce-...') is required to enable inline execution. Note also that 'script-src' was not explicitly set, so 'default-src' is used as a fallback.
paper-shadow.html:64Refused to execute inline script because it violates the following Content Security Policy directive: "default-src 'self' chrome-extension-resource:". Either the 'unsafe-inline' keyword, a hash ('sha256-...'), or a nonce ('nonce-...') is required to enable inline execution. Note also that 'script-src' was not explicitly set, so 'default-src' is used as a fallback.
paper-button.html:84To view this discussion on the web visit https://groups.google.com/d/msgid/polymer-dev/1c1f2c64-6263-4544-a552-d60d2b389bb4%40googlegroups.com.
Indeed, vulcanizing seems to be the only choice for now.So... back to the original question: I'll need to vulcanize even after Chrome 36, won't I?
To view this discussion on the web visit https://groups.google.com/d/msgid/polymer-dev/35910d74-120c-4bd5-8036-c7b268d4af47%40googlegroups.com.
So I hope that this will work in the future. Given that the development of my project should last at least several months and with vulcanizer as an available workaround I'm quite optimistic. Thanks for the answers!
Follow Polymer on Google+: plus.google.com/107187849809354688692
---
You received this message because you are subscribed to the Google Groups "Polymer" group.
To unsubscribe from this group and stop receiving emails from it, send an email to polymer-dev...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/polymer-dev/c0db443f-94a3-4d47-86bb-7c0178035770%40googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/polymer-dev/d194140c-8b1e-4cdc-9429-5f1aad402c43%40googlegroups.com.