亚洲国产日韩欧美一区二区三区,精品亚洲国产成人av在线,国产99视频精品免视看7,99国产精品久久久久久久成人热,欧美日韩亚洲国产综合乱

Table of Contents
What is Subresource Integrity (SRI)
How to generate integrity value
Things to note in actual use
Home Web Front-end HTML Tutorial HTML `integrity` Attribute for Subresource Integrity

HTML `integrity` Attribute for Subresource Integrity

Jul 29, 2025 am 02:26 AM
java programming

Subresource Integrity (SRI) protects external resource integrity through hash verification and prevents tampering. 1. Usage scenario: When introducing third-party libraries such as jQuery and Bootstrap, prevent CDN from being hijacked or man-in-the-middle attacks; 2. Implementation method: Add the integrity attribute to the script or link tag, the value is the SHA-256/384/512 hash of the resource, and crossorigin="anonymous" is required; 3. Generation method: Use command line tools or online generators to generate hashes; 4. Notes: The hashes need to be updated synchronously when changing the resource content. CDN may cause inconsistent hashes due to compression. HTTPS cannot replace SRI. SRI is mainly used for third-party resources.

HTML `integrity` Attribute for Subresource Integrity

To use the integrity attribute of HTML to ensure the integrity of subresources, to put it bluntly, when the browser loads external resources (such as JS or CSS introduced from CDN), it verifys whether the file content has been tampered with. The core of this mechanism is hash verification to ensure that the resources you reference are exactly the same as those originally published.

HTML `integrity` Attribute for Subresource Integrity

Here are a few key points to help you figure out how to use it, why, and what you need to pay attention to.


What is Subresource Integrity (SRI)

Subresource Integrity (SRI) is a browser security mechanism used to prevent loaded external resources (such as scripts or style sheets hosted on third-party CDNs) from being maliciously modified. Its principle is very simple: you add an integrity attribute to the tag, which puts the cryptographic hash value of the resource content. After the browser downloads the resource, it will calculate the hash by itself. If it is inconsistent with what you provide, it means that the file may have been tampered with, so it refuses to execute.

HTML `integrity` Attribute for Subresource Integrity

Common scenarios such as introducing public libraries such as jQuery and Bootstrap, if you trust the official CDN but are worried about attacks by the man in the middle or the CDN being hijacked, then adding integrity can add an additional layer of protection.


How to generate integrity value

To use SRI, you must first generate the correct hash for your resource. The most commonly used algorithms are SHA-256, SHA-384 and SHA-512, and it is recommended to use at least SHA-256.

HTML `integrity` Attribute for Subresource Integrity

You can generate it through the command line tool:

 cat yourfile.js | openssl dgst -sha256 -binary | openssl base64 -A

You can also directly generate online tools, such as SRI Hash Generator . You can see the corresponding integrity string by uploading the file.

After generation, add this property to the <script> or <link> tag:

 <script src="https://example.com/your-script.js"
        integrity="sha256-Here is the hash value you generated"
        crossorigin="anonymous"></script>

Be sure to add the crossorigin attribute, otherwise some browsers will not do completeness checks.


Things to note in actual use

While integrity is useful, there are several points that are prone to errors or ignore:

  • The resource cannot be changed : even if you change a character locally, the hash will not match. So once integrity is added, you cannot update the resource file without updating the hash at will.
  • CDN Caching Issues : Some CDNs may compress or rewrite resources, resulting in inconsistent hashes. It is best to test it before deployment.
  • HTTPS does not equal security : Even if HTTPS is used, it cannot guarantee that the CDN will not be compromised. SRI is an additional layer of security.
  • Only applicable to external resources : If it is a resource on your own server, it is generally not necessary to add it unless you also do CDN distribution.

Which resources are suitable for adding integrity

Not all resources are suitable for adding this attribute, and the following situations are mainly applicable:

  • Third-party JS/CSS libraries (such as jQuery, React, Bootstrap)
  • Static resources hosted on public CDNs
  • Common scripts shared by multiple sites

For scripts developed by yourself, especially those that change frequently, it is not recommended to add them, as they are too troublesome to maintain. But if the resources have been stably launched, you can also consider adding them.


Overall, integrity is a simple and effective security tool, especially when you rely on external resources, it is worth taking a few minutes to configure. Although not omnipotent, it can at least avoid potential risks in some cases.

The above is the detailed content of HTML `integrity` Attribute for Subresource Integrity. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undress AI Tool

Undress AI Tool

Undress images for free

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Hot Topics

PHP Tutorial
1488
72
VSCode settings.json location VSCode settings.json location Aug 01, 2025 am 06:12 AM

The settings.json file is located in the user-level or workspace-level path and is used to customize VSCode settings. 1. User-level path: Windows is C:\Users\\AppData\Roaming\Code\User\settings.json, macOS is /Users//Library/ApplicationSupport/Code/User/settings.json, Linux is /home//.config/Code/User/settings.json; 2. Workspace-level path: .vscode/settings in the project root directory

How to handle transactions in Java with JDBC? How to handle transactions in Java with JDBC? Aug 02, 2025 pm 12:29 PM

To correctly handle JDBC transactions, you must first turn off the automatic commit mode, then perform multiple operations, and finally commit or rollback according to the results; 1. Call conn.setAutoCommit(false) to start the transaction; 2. Execute multiple SQL operations, such as INSERT and UPDATE; 3. Call conn.commit() if all operations are successful, and call conn.rollback() if an exception occurs to ensure data consistency; at the same time, try-with-resources should be used to manage resources, properly handle exceptions and close connections to avoid connection leakage; in addition, it is recommended to use connection pools and set save points to achieve partial rollback, and keep transactions as short as possible to improve performance.

Mastering Dependency Injection in Java with Spring and Guice Mastering Dependency Injection in Java with Spring and Guice Aug 01, 2025 am 05:53 AM

DependencyInjection(DI)isadesignpatternwhereobjectsreceivedependenciesexternally,promotingloosecouplingandeasiertestingthroughconstructor,setter,orfieldinjection.2.SpringFrameworkusesannotationslike@Component,@Service,and@AutowiredwithJava-basedconfi

Python for Data Engineering ETL Python for Data Engineering ETL Aug 02, 2025 am 08:48 AM

Python is an efficient tool to implement ETL processes. 1. Data extraction: Data can be extracted from databases, APIs, files and other sources through pandas, sqlalchemy, requests and other libraries; 2. Data conversion: Use pandas for cleaning, type conversion, association, aggregation and other operations to ensure data quality and optimize performance; 3. Data loading: Use pandas' to_sql method or cloud platform SDK to write data to the target system, pay attention to writing methods and batch processing; 4. Tool recommendations: Airflow, Dagster, Prefect are used for process scheduling and management, combining log alarms and virtual environments to improve stability and maintainability.

Understanding the Java Virtual Machine (JVM) Internals Understanding the Java Virtual Machine (JVM) Internals Aug 01, 2025 am 06:31 AM

TheJVMenablesJava’s"writeonce,runanywhere"capabilitybyexecutingbytecodethroughfourmaincomponents:1.TheClassLoaderSubsystemloads,links,andinitializes.classfilesusingbootstrap,extension,andapplicationclassloaders,ensuringsecureandlazyclassloa

How to work with Calendar in Java? How to work with Calendar in Java? Aug 02, 2025 am 02:38 AM

Use classes in the java.time package to replace the old Date and Calendar classes; 2. Get the current date and time through LocalDate, LocalDateTime and LocalTime; 3. Create a specific date and time using the of() method; 4. Use the plus/minus method to immutably increase and decrease the time; 5. Use ZonedDateTime and ZoneId to process the time zone; 6. Format and parse date strings through DateTimeFormatter; 7. Use Instant to be compatible with the old date types when necessary; date processing in modern Java should give priority to using java.timeAPI, which provides clear, immutable and linear

Google Chrome cannot open local files Google Chrome cannot open local files Aug 01, 2025 am 05:24 AM

ChromecanopenlocalfileslikeHTMLandPDFsbyusing"Openfile"ordraggingthemintothebrowser;ensuretheaddressstartswithfile:///;2.SecurityrestrictionsblockAJAX,localStorage,andcross-folderaccessonfile://;usealocalserverlikepython-mhttp.server8000tor

Understanding Network Ports and Firewalls Understanding Network Ports and Firewalls Aug 01, 2025 am 06:40 AM

Networkportsandfirewallsworktogethertoenablecommunicationwhileensuringsecurity.1.Networkportsarevirtualendpointsnumbered0–65535,withwell-knownportslike80(HTTP),443(HTTPS),22(SSH),and25(SMTP)identifyingspecificservices.2.PortsoperateoverTCP(reliable,c

See all articles