-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
refactor: v2 release #6903
base: main
Are you sure you want to change the base?
refactor: v2 release #6903
Conversation
🦋 Changeset detectedLatest commit: 6ed1284 The changes in this PR will be included in the next version bump. This PR includes changesets to release 5 packages
Not sure what this means? Click here to learn what changesets are. Click here if you're a maintainer who wants to add another changeset to this PR |
commit: |
built with Refined Cloudflare Pages Action⚡ Cloudflare Pages Deployment
|
} | ||
errorDiv.setAttribute('q:key', '_error_'); | ||
const journal: VNodeJournal = []; | ||
vnode_getDOMChildNodes(journal, vHost).forEach((child) => errorDiv.appendChild(child)); |
Check warning
Code scanning / CodeQL
DOM text reinterpreted as HTML Medium
DOM text
DOM text
} else if (key === 'value' && key in element) { | ||
(element as any).value = escapeHTML(String(value)); | ||
} else if (key === dangerouslySetInnerHTML) { | ||
(element as any).innerHTML = value!; |
Check warning
Code scanning / CodeQL
DOM text reinterpreted as HTML Medium
DOM text
DOM text
Show autofix suggestion
Hide autofix suggestion
Copilot Autofix AI 2 days ago
To fix the problem, we need to ensure that any content assigned to innerHTML
is properly sanitized to prevent XSS attacks. The best way to fix this is to use a library like DOMPurify
to sanitize the HTML content before setting it. This approach ensures that any potentially dangerous HTML content is cleaned, removing any malicious scripts or tags.
- Import the
DOMPurify
library. - Use
DOMPurify.sanitize
to clean thevalue
before assigning it toinnerHTML
.
-
Copy modified line R1 -
Copy modified line R897
@@ -1 +1,2 @@ | ||
import DOMPurify from 'dompurify'; | ||
/** | ||
@@ -895,3 +896,3 @@ | ||
} else if (key === dangerouslySetInnerHTML) { | ||
(element as any).innerHTML = value!; | ||
(element as any).innerHTML = DOMPurify.sanitize(value!); | ||
} else { |
-
Copy modified lines R11-R12
@@ -10,3 +10,4 @@ | ||
"dependencies": { | ||
"csstype": "^3.1" | ||
"csstype": "^3.1", | ||
"dompurify": "^3.2.3" | ||
}, |
Package | Version | Security advisories |
dompurify (npm) | 3.2.3 | None |
const insertBefore = journal[idx++] as Element | Text | null; | ||
let newChild: any; | ||
while (idx < length && typeof (newChild = journal[idx]) !== 'number') { | ||
insertParent.insertBefore(newChild, insertBefore); |
Check warning
Code scanning / CodeQL
DOM text reinterpreted as HTML Medium
DOM text
DOM text
fix(computed): retry qrl execution on throwing promise
fix: repl tabs
fix: convert destructured string prop to props variable
Co-authored-by: Steff <[email protected]>
fix: destructured props for inline components
fix: serialize var prop
fix: updating signal-based var props
fix: textarea with null value
fix: moving existing virtual node during vnode diffing
fix: add and remove var prop attribute
fix: const/var props in loops/functions
fix: finding context parent and sorting projections in the scheduler
This PR is for showing progress on v2, and having installable npm packages.
DO NOT MERGE
The changes are meant to be readable and maintainable, so if things are unclear please let us know.