рари
KPCKevin Powell - Community
•Created by clevermissfox on 11/9/2024 in #front-end
Testing workflow
It's a nice topic, would be interesting to read the thread when more people give their opinions on it
15 replies
KPCKevin Powell - Community
•Created by clevermissfox on 11/9/2024 in #front-end
Testing workflow
I've never encountered such a huge need, but I'd probably break down the testing process into several steps:
1) Let's call it "Major Testing" (e.g maybe daily):
- Latest Chrome on Windows
- Safari on iOS
- Chrome on Android
- FF latest
2) "Secondary" testing (e.g maybe weekly):
- Edge (as it's Chromium-based, mainly check for Edge-specific features)
- Additional devices comes in here
- Maybe some older versions of primary browseres
3) Edge Cases (e.g maybe montly)
- Opera
- Older devices/OS ver
- Niche browsers
It's more about focusing on which browsers/devices represent the majority of traffic on your resource. We have a dominant group (70-80% or even more) - we prioritize it
Also good tip would be creating kind of a spreadsheet-checklist template thingy for what you really wanna check. I believe BrowserStack has one already, you can build your own based on that.
Speaking of Chromium-based browsers, we can't really treat all as "Chromium" collectively, because Chrome is kind of a master browser in here. Because of the different speed of implementing of new APIs, it's not uncommon for these browsers to implement something new “long” enough, Chrome tends to do it faster
On the other hand, there are cases when Edge implemented something faster than the Chrome team. These are quite specific cases, more affecting some APIs not yet supported by all browsers (for example Payment Request API which is not fully supported by FF for now)
But I'd still treat the Chrome as a sort of big brother that you want to give more love to, the others wouldn't be forgotten, but they'd get noticeably less attention
15 replies
KPCKevin Powell - Community
•Created by snxxwyy on 11/8/2024 in #front-end
icon swap | InnerHTML security risks
so many little details, that's why I really love the frontend
43 replies
KPCKevin Powell - Community
•Created by snxxwyy on 11/8/2024 in #front-end
icon swap | InnerHTML security risks
Didn't play with the sprites enough, thanks for the insights
43 replies
KPCKevin Powell - Community
•Created by snxxwyy on 11/8/2024 in #front-end
icon swap | InnerHTML security risks
Briefly:
1) Class Based Approach as in Codepen below is good
2) Approach like this
Can lead to some XSS and DOM manipulation risk
3) replaceChild is wacky cause it creates a new DOM element on each toggle
4) SVG sprite is cool just like 1)
43 replies