@@ -388,7 +388,7 @@ The following example, would allow access to `fs` for all `data:` resources:
388
388
}
389
389
```
390
390
391
- ##### Example: [ import maps] [ ] emulation
391
+ ##### Example: import maps emulation
392
392
393
393
Given an import map:
394
394
@@ -425,7 +425,7 @@ Given an import map:
425
425
}
426
426
```
427
427
428
- Import maps assume you can get any resource by default. This means
428
+ [ Import maps] [ ] assume you can get any resource by default. This means
429
429
` "dependencies" ` at the top level of the policy should be set to ` true ` .
430
430
Policies require this to be opt-in since it enables all resources of the
431
431
application cross linkage which doesn't make sense for many scenarios. They also
@@ -547,13 +547,13 @@ There are constraints you need to know before using this system:
547
547
write access.
548
548
* Permission changes are not retroactively applied to existing resources.
549
549
550
+ [ Import maps ] : https://url.spec.whatwg.org/#relative-url-with-fragment-string
550
551
[ Security Policy ] : https://github.com/nodejs/node/blob/main/SECURITY.md
551
552
[ `--allow-child-process` ] : cli.md#--allow-child-process
552
553
[ `--allow-fs-read` ] : cli.md#--allow-fs-read
553
554
[ `--allow-fs-write` ] : cli.md#--allow-fs-write
554
555
[ `--allow-worker` ] : cli.md#--allow-worker
555
556
[ `--experimental-permission` ] : cli.md#--experimental-permission
556
557
[ `permission.has()` ] : process.md#processpermissionhasscope-reference
557
- [ import maps ] : https://url.spec.whatwg.org/#relative-url-with-fragment-string
558
558
[ relative-url string ] : https://url.spec.whatwg.org/#relative-url-with-fragment-string
559
559
[ special schemes ] : https://url.spec.whatwg.org/#special-scheme
0 commit comments