-
Notifications
You must be signed in to change notification settings - Fork 29k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix Trusted Types violations (round #3) #108400
Comments
FYI @jrieken : running |
@alexdima for workers a trusted script url should be enough to fix things |
Since the tsec tool is still over eager with errors and incompatible with latest TS syntax: |
sorry for the silly question, this is my first trusted types ping -- what should I do if the usage is intended? In the renderer webview, we intentionally want to insert unsanitized HTML that's rendered for the webview. |
@connor4312 Here are 3 examples of what I had to do when I really had to use 84cf12f#diff-b41fb33a1ffaa149285201e892f84c51e34e9eda746019cf41e7209972ff3d51 |
got it, thanks! |
(includes from 4.9.0) Diff: xtermjs/xterm.js@3504e2e...master Fixes microsoft#108400 Fixes microsoft#111562
Current remaining violations. Compiled this list using
yarn tsec-compile-check
and the.vscode/searches/TrustedTypes.code-search
Usage of innerHTML
Worker, use createScriptUrl
Script.text
The text was updated successfully, but these errors were encountered: