{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":590570161,"defaultBranch":"main","name":"react","ownerLogin":"onionymous","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2023-01-18T18:03:05.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/19634607?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1703748875.0","currentOid":""},"activityList":{"items":[{"before":"6c3614de85314ad8a3086f68c163b3b067a13fbf","after":"cc0cf5176f1ab155482666af0aeba1521d799630","ref":"refs/heads/sapling-pr-archive-onionymous","pushedAt":"2023-12-29T08:20:05.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"merge commit for archive created by Sapling","shortMessageHtmlLink":"merge commit for archive created by Sapling"}},{"before":"4c97fffa43ef712b6603d714185573c8b691ab43","after":"468cea793fa41be2928adff6c317d8e52f6f5cde","ref":"refs/heads/pr27859","pushedAt":"2023-12-29T08:20:01.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"[Trusted Types] Don't stringify DOM attributes (#19588 redo)\n\nSummary: This is a resubmit of #19588 since it was never merged and closed in error. However, the issue it fixes is still relevant and will unblock rollout of the TT feature flag internally. Copying the original PR message here:\n\n-----\n\nInstead of using Trusted Types feature flag, assume that the browser would stringify the attributes, so that React-DOM doesn't have to (making interpolation into node attributes \"just work\" regardless of the Trusted Types enforcement and availability) . Currently only IE<=9 does not stringify attributes. This PR implicitly drops the support for IE 9.\n\nFor attributes undergoing sanitizeURL, the value is stringified in sanitizeURL function, unless enableTrustedTypesIntegration is true and the value is an immutable TrustedScriptURL value. This ascertains that objects with custom toString() function cannot be used to bypass the sanitization (now that DOMPropertyOperations don't stringify on their own).\n\nFixes facebook/react#19587.\n\n## Summary\nThe PR decouples the attribute stringification from the Trusted Types logic, dropping the former completely. It was only used as a workaround for a IE <=9 browser bug. A small improvement for Trusted Types would be that it moves the most important functionality from behind the flag - i.e. allows most React apps to pass trusted types into DOM sinks without enabling the feature flag.\n\nSome rare functionality and dev warnings are still gated on the flag, but those are unrelated to the stringification issue.\n\n## Test Plan\nAppropriate tests are added.","shortMessageHtmlLink":"[Trusted Types] Don't stringify DOM attributes (facebook#19588 redo)"}},{"before":"55dec69e56d1963242cf5655468cfc87578f70f0","after":"6c3614de85314ad8a3086f68c163b3b067a13fbf","ref":"refs/heads/sapling-pr-archive-onionymous","pushedAt":"2023-12-29T08:16:28.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"merge commit for archive created by Sapling","shortMessageHtmlLink":"merge commit for archive created by Sapling"}},{"before":"740d977db24ecd3b0ddb87bcac3249b62762ebca","after":"4c97fffa43ef712b6603d714185573c8b691ab43","ref":"refs/heads/pr27859","pushedAt":"2023-12-29T08:16:24.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"[Trusted Types] Don't stringify DOM attributes (#19588 redo)\n\nSummary: This is a resubmit of #19588 since it was never merged and closed in error. However, the issue it fixes is still relevant and will unblock rollout of the TT feature flag internally. Copying the original PR message here:\n\n-----\n\nInstead of using Trusted Types feature flag, assume that the browser would stringify the attributes, so that React-DOM doesn't have to (making interpolation into node attributes \"just work\" regardless of the Trusted Types enforcement and availability) . Currently only IE<=9 does not stringify attributes. This PR implicitly drops the support for IE 9.\n\nFor attributes undergoing sanitizeURL, the value is stringified in sanitizeURL function, unless enableTrustedTypesIntegration is true and the value is an immutable TrustedScriptURL value. This ascertains that objects with custom toString() function cannot be used to bypass the sanitization (now that DOMPropertyOperations don't stringify on their own).\n\nFixes facebook/react#19587.\n\n## Summary\nThe PR decouples the attribute stringification from the Trusted Types logic, dropping the former completely. It was only used as a workaround for a IE <=9 browser bug. A small improvement for Trusted Types would be that it moves the most important functionality from behind the flag - i.e. allows most React apps to pass trusted types into DOM sinks without enabling the feature flag.\n\nSome rare functionality and dev warnings are still gated on the flag, but those are unrelated to the stringification issue.\n\n## Test Plan\nAppropriate tests are added.","shortMessageHtmlLink":"[Trusted Types] Don't stringify DOM attributes (facebook#19588 redo)"}},{"before":"ce5f558d5e0c97290aebd01f0d0dc3566174cfb9","after":"55dec69e56d1963242cf5655468cfc87578f70f0","ref":"refs/heads/sapling-pr-archive-onionymous","pushedAt":"2023-12-29T08:15:31.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"merge commit for archive created by Sapling","shortMessageHtmlLink":"merge commit for archive created by Sapling"}},{"before":"86575bf84b03cd4b54a735dd129ba1ae454f001b","after":"740d977db24ecd3b0ddb87bcac3249b62762ebca","ref":"refs/heads/pr27859","pushedAt":"2023-12-29T08:15:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"[Trusted Types] Don't stringify DOM attributes (#19588 redo)\n\nSummary: This is a resubmit of #19588 since it was never merged and closed in error. However, the issue it fixes is still relevant and will unblock rollout of the TT feature flag internally. Copying the original PR message here:\n\n-----\n\nInstead of using Trusted Types feature flag, assume that the browser would stringify the attributes, so that React-DOM doesn't have to (making interpolation into node attributes \"just work\" regardless of the Trusted Types enforcement and availability) . Currently only IE<=9 does not stringify attributes. This PR implicitly drops the support for IE 9.\n\nFor attributes undergoing sanitizeURL, the value is stringified in sanitizeURL function, unless enableTrustedTypesIntegration is true and the value is an immutable TrustedScriptURL value. This ascertains that objects with custom toString() function cannot be used to bypass the sanitization (now that DOMPropertyOperations don't stringify on their own).\n\nFixes facebook/react#19587.\n\n## Summary\nThe PR decouples the attribute stringification from the Trusted Types logic, dropping the former completely. It was only used as a workaround for a IE <=9 browser bug. A small improvement for Trusted Types would be that it moves the most important functionality from behind the flag - i.e. allows most React apps to pass trusted types into DOM sinks without enabling the feature flag.\n\nSome rare functionality and dev warnings are still gated on the flag, but those are unrelated to the stringification issue.\n\n## Test Plan\nAppropriate tests are added.","shortMessageHtmlLink":"[Trusted Types] Don't stringify DOM attributes (facebook#19588 redo)"}},{"before":"27c47901a1e0fce47e839dc45d921d3ec483a947","after":"ce5f558d5e0c97290aebd01f0d0dc3566174cfb9","ref":"refs/heads/sapling-pr-archive-onionymous","pushedAt":"2023-12-28T08:03:20.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"merge commit for archive created by Sapling","shortMessageHtmlLink":"merge commit for archive created by Sapling"}},{"before":"c146aee6b8bb07d59e3b6499b5c85866d912b849","after":"86575bf84b03cd4b54a735dd129ba1ae454f001b","ref":"refs/heads/pr27859","pushedAt":"2023-12-28T08:03:14.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"[Trusted Types] Don't stringify DOM attributes (#19588 redo)\n\nSummary: This is a resubmit of #19588 since it was never merged and closed in error. However, the issue it fixes is still relevant and will unblock rollout of the TT feature flag internally. Copying the original PR message here:\n\n-----\n\nInstead of using Trusted Types feature flag, assume that the browser would stringify the attributes, so that React-DOM doesn't have to (making interpolation into node attributes \"just work\" regardless of the Trusted Types enforcement and availability) . Currently only IE<=9 does not stringify attributes. This PR implicitly drops the support for IE 9.\n\nFor attributes undergoing sanitizeURL, the value is stringified in sanitizeURL function, unless enableTrustedTypesIntegration is true and the value is an immutable TrustedScriptURL value. This ascertains that objects with custom toString() function cannot be used to bypass the sanitization (now that DOMPropertyOperations don't stringify on their own).\n\nFixes facebook/react#19587.\n\n## Summary\nThe PR decouples the attribute stringification from the Trusted Types logic, dropping the former completely. It was only used as a workaround for a IE <=9 browser bug. A small improvement for Trusted Types would be that it moves the most important functionality from behind the flag - i.e. allows most React apps to pass trusted types into DOM sinks without enabling the feature flag.\n\nSome rare functionality and dev warnings are still gated on the flag, but those are unrelated to the stringification issue.\n\n## Test Plan\nAppropriate tests are added.","shortMessageHtmlLink":"[Trusted Types] Don't stringify DOM attributes (facebook#19588 redo)"}},{"before":"3e91a3df0f3ee3871800895ee62ef85362485ede","after":"27c47901a1e0fce47e839dc45d921d3ec483a947","ref":"refs/heads/sapling-pr-archive-onionymous","pushedAt":"2023-12-28T07:55:32.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"Merge c146aee6b8bb07d59e3b6499b5c85866d912b849 into sapling-pr-archive-onionymous","shortMessageHtmlLink":"Merge c146aee into sapling-pr-archive-onionymous"}},{"before":"43b5560db8d36fd66488a3ea856ccf0a36a77f99","after":"c146aee6b8bb07d59e3b6499b5c85866d912b849","ref":"refs/heads/pr27859","pushedAt":"2023-12-28T07:55:30.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"[Trusted Types] Don't stringify DOM attributes (#19588 redo)\n\nSummary: This is a resubmit of #19588 since it was never merged and closed in error. However, the issue it fixes is still relevant and will unblock rollout of the TT feature flag internally. Copying the original PR message here:\n\n-----\n\nInstead of using Trusted Types feature flag, assume that the browser would stringify the attributes, so that React-DOM doesn't have to (making interpolation into node attributes \"just work\" regardless of the Trusted Types enforcement and availability) . Currently only IE<=9 does not stringify attributes. This PR implicitly drops the support for IE 9.\n\nFor attributes undergoing sanitizeURL, the value is stringified in sanitizeURL function, unless enableTrustedTypesIntegration is true and the value is an immutable TrustedScriptURL value. This ascertains that objects with custom toString() function cannot be used to bypass the sanitization (now that DOMPropertyOperations don't stringify on their own).\n\nFixes facebook/react#19587.\n\n## Summary\nThe PR decouples the attribute stringification from the Trusted Types logic, dropping the former completely. It was only used as a workaround for a IE <=9 browser bug. A small improvement for Trusted Types would be that it moves the most important functionality from behind the flag - i.e. allows most React apps to pass trusted types into DOM sinks without enabling the feature flag.\n\nSome rare functionality and dev warnings are still gated on the flag, but those are unrelated to the stringification issue.\n\n## Test Plan\nAppropriate tests are added.","shortMessageHtmlLink":"[Trusted Types] Don't stringify DOM attributes (facebook#19588 redo)"}},{"before":"82dc417eab61650c8b9f7e9030d12967eef7658b","after":"3e91a3df0f3ee3871800895ee62ef85362485ede","ref":"refs/heads/sapling-pr-archive-onionymous","pushedAt":"2023-12-28T07:52:09.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"Merge 43b5560db8d36fd66488a3ea856ccf0a36a77f99 into sapling-pr-archive-onionymous","shortMessageHtmlLink":"Merge 43b5560 into sapling-pr-archive-onionymous"}},{"before":"8081590ae6e1302dac6e8ac3fcdaf828a19cf5d2","after":"43b5560db8d36fd66488a3ea856ccf0a36a77f99","ref":"refs/heads/pr27859","pushedAt":"2023-12-28T07:52:08.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"[Trusted Types] Don't stringify DOM attributes (#19588 redo)\n\nSummary: This is a resubmit of #19588 since it was never merged and closed in error. However, the issue it fixes is still relevant and will unblock rollout of the TT feature flag internally. Copying the original PR message here:\n\n-----\n\nInstead of using Trusted Types feature flag, assume that the browser would stringify the attributes, so that React-DOM doesn't have to (making interpolation into node attributes \"just work\" regardless of the Trusted Types enforcement and availability) . Currently only IE<=9 does not stringify attributes. This PR implicitly drops the support for IE 9.\n\nFor attributes undergoing sanitizeURL, the value is stringified in sanitizeURL function, unless enableTrustedTypesIntegration is true and the value is an immutable TrustedScriptURL value. This ascertains that objects with custom toString() function cannot be used to bypass the sanitization (now that DOMPropertyOperations don't stringify on their own).\n\nFixes facebook/react#19587.\n\n## Summary\nThe PR decouples the attribute stringification from the Trusted Types logic, dropping the former completely. It was only used as a workaround for a IE <=9 browser bug. A small improvement for Trusted Types would be that it moves the most important functionality from behind the flag - i.e. allows most React apps to pass trusted types into DOM sinks without enabling the feature flag.\n\nSome rare functionality and dev warnings are still gated on the flag, but those are unrelated to the stringification issue.\n\n## Test Plan\nAppropriate tests are added.","shortMessageHtmlLink":"[Trusted Types] Don't stringify DOM attributes (facebook#19588 redo)"}},{"before":"dbfc7d8871a5a7bffaa69177d8482601c023a9a5","after":"82dc417eab61650c8b9f7e9030d12967eef7658b","ref":"refs/heads/sapling-pr-archive-onionymous","pushedAt":"2023-12-28T07:50:30.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"merge commit for archive created by Sapling","shortMessageHtmlLink":"merge commit for archive created by Sapling"}},{"before":"6b6ee29b1f6be50068015e06543953d5797eee13","after":"8081590ae6e1302dac6e8ac3fcdaf828a19cf5d2","ref":"refs/heads/pr27859","pushedAt":"2023-12-28T07:50:26.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"[Trusted Types] Don't stringify DOM attributes (#19588 redo)\n\nSummary: This is a resubmit of #19588.\n\nFixes #19587.","shortMessageHtmlLink":"[Trusted Types] Don't stringify DOM attributes (facebook#19588 redo)"}},{"before":"58e709f3e5138ea08bb6902c2ec52fcd1d4cec64","after":"dbfc7d8871a5a7bffaa69177d8482601c023a9a5","ref":"refs/heads/sapling-pr-archive-onionymous","pushedAt":"2023-12-28T07:43:07.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"merge commit for archive created by Sapling","shortMessageHtmlLink":"merge commit for archive created by Sapling"}},{"before":"58e709f3e5138ea08bb6902c2ec52fcd1d4cec64","after":"6b6ee29b1f6be50068015e06543953d5797eee13","ref":"refs/heads/pr27859","pushedAt":"2023-12-28T07:43:03.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"[Trusted Types] Don't stringify DOM attributes (#19588 redo)\n\nSummary: This is a resubmit of #19588.\n\nFixes #19587.","shortMessageHtmlLink":"[Trusted Types] Don't stringify DOM attributes (facebook#19588 redo)"}},{"before":null,"after":"58e709f3e5138ea08bb6902c2ec52fcd1d4cec64","ref":"refs/heads/sapling-pr-archive-onionymous","pushedAt":"2023-12-28T07:34:35.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"[Trusted Types] Don't stringify DOM attributes (#19588 redo)\n\nSummary: This is a resubmit of #19588.\n\nFixes #19587.","shortMessageHtmlLink":"[Trusted Types] Don't stringify DOM attributes (facebook#19588 redo)"}},{"before":null,"after":"58e709f3e5138ea08bb6902c2ec52fcd1d4cec64","ref":"refs/heads/pr27859","pushedAt":"2023-12-28T07:34:32.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"[Trusted Types] Don't stringify DOM attributes (#19588 redo)\n\nSummary: This is a resubmit of #19588.\n\nFixes #19587.","shortMessageHtmlLink":"[Trusted Types] Don't stringify DOM attributes (facebook#19588 redo)"}},{"before":"ee85098019bf9703b32f608f8bbd5f8fb1a7d60b","after":"c5b9375767e2c4102d7e5559d383523736f1c902","ref":"refs/heads/main","pushedAt":"2023-12-28T07:31:16.000Z","pushType":"push","commitsCount":671,"pusher":{"login":"onionymous","name":"an onion","path":"/onionymous","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19634607?s=80&v=4"},"commit":{"message":"[Fizz] Only compute component stacks in DEV and prerenders (#27850)\n\nIf you have a lot of intentional throws (or postpones) from client-only\r\nrendering then computing the stack is too much.","shortMessageHtmlLink":"[Fizz] Only compute component stacks in DEV and prerenders (facebook#…"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAD0_CU5wA","startCursor":null,"endCursor":null}},"title":"Activity · onionymous/react"}