The direct Ajv dependency uses a a browser-unsafe eval which will cause a CSP(Content Security Policy) error during runtime. To resolve the issue, the following changes are made:
Ajv is removed from dependency but added in dev dependency
Use the standalone validation code generated by the Ajv library as suggested by the documentation to avoid the unsafe-val method to be used in browser.
Description of changes
The direct
Ajv
dependency uses a a browser-unsafe eval which will cause a CSP(Content Security Policy) error during runtime. To resolve the issue, the following changes are made:Ajv
is removed from dependency but added in dev dependencyAjv
library as suggested by the documentation to avoid the unsafe-val method to be used in browser.Codegen Paramaters Changed or Added
Issue #, if available
Description of how you validated changes
Unit & E2E tests
Checklist
yarn test
passespath
) behave differently on windows.By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.