-
Notifications
You must be signed in to change notification settings - Fork 263
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Generate integrity sha384 for script #583
Comments
This issue is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 5 days. |
Activity |
I wanna try working on this and submitting a PR as soon as i'm done with my other PR. also, it supports |
ok so i feel like there should be both an opt-in per file and a global option (with per-file opt-out). <link data-trunk rel="tailwind-css" href="src/tailwind.css" integrity="none"/>
<link data-trunk rel="tailwind-css" href="src/tailwind.css" integrity="sha256"/>
<link data-trunk rel="tailwind-css" href="src/tailwind.css" integrity="sha384"/>
<link data-trunk rel="tailwind-css" href="src/tailwind.css" integrity="sha512"/> and then a i'll start working on this now as i feel like it's a nice addition, we'll see about naming changes when i'm actually done implementing it. |
@adryzz this looks good. Will this also apply for all the js and wasm glue to? |
it will, but while i have basic functionality working, i need to make it all clean and working properly without any hacks before i submit the PR |
This issue is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 5 days. |
Not stale :) |
This issue is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 5 days. |
I will try get this implemented into |
For the WASM and loader script, this is part of the |
@ctron when can we expect a release of |
I just released |
This issue is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 5 days. |
This got merged with #623 and it should be part of the next trunk release too. |
Released with trunk 0.18.0 |
For the CSP it would be nice if we could generate the sha calculation to create better security of the files that needs to be loaded in javascript. https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity#subresource_integrity_with_the_script_element
The text was updated successfully, but these errors were encountered: