mirror of
https://github.com/denoland/deno.git
synced 2024-12-02 17:01:14 -05:00
5504acea67
This replaces `--allow-net` for import permissions and makes the security sandbox stricter by also checking permissions for statically analyzable imports. By default, this has a value of `--allow-import=deno.land:443,jsr.io:443,esm.sh:443,raw.githubusercontent.com:443,gist.githubusercontent.com:443`, but that can be overridden by providing a different set of hosts. Additionally, when no value is provided, import permissions are inferred from the CLI arguments so the following works because `fresh.deno.dev:443` will be added to the list of allowed imports: ```ts deno run -A -r https://fresh.deno.dev ``` --------- Co-authored-by: David Sherret <dsherret@gmail.com> |
||
---|---|---|
.. | ||
byonm_phantom_dep_res_failure | ||
child_process_extra_pipes | ||
cjs_analysis_multiple_errors | ||
cjs_dynamic_import_esm_with_exports | ||
cjs_reexport_node_condition | ||
cjs_reexport_same_specifier_in_sub_folder | ||
detect_es_module_defined_as_cjs | ||
imports_wildcard | ||
node_debug | ||
node_process_beforeexit_exit_events_emitted_without_listeners | ||
node_test_module | ||
node_test_module_no_sanitizers | ||
readline_promises | ||
rejection_handled_web_process | ||
stdio_ipc | ||
web_node_events_dispatched_in_correct_order | ||
worker_threads | ||
worker_threads_cache |