)
I've already spent 4h+ searching the web for this, so I decided to ask the community...
What is the exact use case for angular's DomSanitizer.bypassSecurityTrustScript
method?
I know, that this
- comes with security risks
- is not the best way to insert code into angular apps
- is not the only way to inject script tags
- etc.
I don't want to use it for a real implementation. I'm just providing
an Angular Pipe to my users and I want to explain to them when and how
to use each security context (e.g. [innerHtml]="someVar | trust: 'html'"
).
I could find good examples for all except for the bypassSecurityTrustScript method.
So, can anyone explain to me WHEN and HOW to use DomSanitizer.bypassSecurityTrustScript
?
$ ng --version
Angular CLI: 12.2.17
Node: 14.17.6
Package Manager: npm 6.14.15
OS: win32 x64
Angular: 12.2.16
... animations, common, compiler, compiler-cli, core, elements
... forms, language-service, platform-browser
... platform-browser-dynamic, router
Package Version
------------------------------------------------------------
@angular-devkit/architect 0.1202.17
@angular-devkit/build-angular 12.2.17
@angular-devkit/core 12.2.17
@angular-devkit/schematics 12.2.17
@angular/cdk 12.2.13
@angular/cli 12.2.17
@angular/flex-layout 12.0.0-beta.35
@angular/material 12.2.13
@angular/material-moment-adapter 12.2.13
@schematics/angular 12.2.17
ng-packagr 12.2.7
rxjs 6.6.7
typescript 4.3.5
Cheers, Markus ;)