-
-
Notifications
You must be signed in to change notification settings - Fork 59
new crate feature: allow_all_protocols_in_img #165
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
test "unsafe" protocols on image sources here: https://jsfiddle.net/#&togetherjs=Q4ctsPpdfN
I appreciate where this is going! Thank you for your work! Most things here are options here. What’s the reason you wrapped this in a feature? 🤔 I have used features here because this is a Alternatively, for an option name, how about an option name: For the docs, then, for § Security, I am thinking of something like: You should be able to set `allow_any_src` safely.
The default is to allow only `http:`, `https:`, and relative images,
which is what GitHub does.
But it should be safe to allow any value on `src`.
The [HTML specification][whatwg-html-image] prohibits dangerous scripts in
images and all modern browsers respect this and are thus safe.
Opera 12 (from 2012) is a notable browser that did not respect this.
…
[whatwg-html-image]: https://html.spec.whatwg.org/multipage/images.html#images-processing-model I tried to show why things are the way they are, and why, as you show, it should be safe to deviate from those defaults. |
agreed, an option is better than a crate feature (which I thought you wanted given your previous comments). Can we name it |
Sorry, I did not mean to imply a crate feature!
|
I changed it to a configuration option instead of a crate feature. I also updated the readme. I put the section about Opera above, since it's not related to the new You may also want to add a separate subsection about external images, warning about user tracking and CSRF attacks. Something like
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you!
I think the Security section is not yet ready.
The rest of my suggestions are just some rephrasing and line wrapping.
The code looks 👍
Co-authored-by: Titus <[email protected]> Signed-off-by: Ophir LOJKINE <[email protected]>
Co-authored-by: Titus <[email protected]> Signed-off-by: Ophir LOJKINE <[email protected]>
Co-authored-by: Titus <[email protected]> Signed-off-by: Ophir LOJKINE <[email protected]>
Co-authored-by: Titus <[email protected]> Signed-off-by: Ophir LOJKINE <[email protected]>
Great, thank you ! Can you make a new release so that I can use it in my crate ? |
Thank you! Released in |
test "unsafe" protocols on image sources here: https://codepen.io/xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx-/pen/wBvzLmv
This is a follow-up on #164 (comment)