jaml

Javascript Template Engines that work with Chrome's Content Security Policy

眉间皱痕 提交于 2020-01-01 08:21:31
问题 The Chrome API's Manifest version 2 has removed the ability to do unsafe-eval. This means using the eval function or in general dynamically creating a function from text. It seems like most if not all Javascript Templating Engines do this. I was using Jaml, but I tried several others like backbone.js (which really uses underscore.js's templating engine) with no luck. This comment on the Chromium project seems to indicate that there are a great many libraries that suffer from this. I think

Javascript Template Engines that work with Chrome's Content Security Policy

点点圈 提交于 2020-01-01 08:21:11
问题 The Chrome API's Manifest version 2 has removed the ability to do unsafe-eval. This means using the eval function or in general dynamically creating a function from text. It seems like most if not all Javascript Templating Engines do this. I was using Jaml, but I tried several others like backbone.js (which really uses underscore.js's templating engine) with no luck. This comment on the Chromium project seems to indicate that there are a great many libraries that suffer from this. I think

Saltstack load pillar in a for loop

谁说胖子不能爱 提交于 2019-12-07 12:19:57
问题 I am developing a automatic proftd installation whit Salt, i wont to get the ftp users from a template but I cant get work the pillar, i initialized the pillar whit the users data and call it into a for loop, but you don't get the pillar user data in the loop. When i make salt-call pillar.get ftpusers in the minion, the response is: local: This is my pillar ftpusers.sls: ftp-server.ftpusers: user: - user: user - passhash: j2k3hk134123l1234ljh!"·$ser - uuid: 1001 - guid: 1001 - home: /srv/ftp

Javascript Template Engines that work with Chrome's Content Security Policy

社会主义新天地 提交于 2019-12-04 00:33:17
The Chrome API's Manifest version 2 has removed the ability to do unsafe-eval. This means using the eval function or in general dynamically creating a function from text. It seems like most if not all Javascript Templating Engines do this. I was using Jaml, but I tried several others like backbone.js (which really uses underscore.js's templating engine) with no luck. This comment on the Chromium project seems to indicate that there are a great many libraries that suffer from this. I think Angular.js has a CSP-safe mode, but Angular.js is really too big for what we need. We just need a fairly