Hi Pratik,
I’m uploaded an example pom.xml and module.gwt.xml to Gist:
https://gist.github.com/NickWilton/dc1602fff24509154c076daa404bacb5
This example uses SmartGWT 4.1 and GWT 2.8.
The directory structure for this example is:
/ src / main / java / yourpackage / client
I suggest you have a look at the OWASP website, it’s an excellent resource to
understand this vulnerability and how to address it.
https://owasp.org/www-community/attacks/xss/
--
You received this message because you are subscribed to the Google Groups "GWT
Users" group.
To unsubscribe from
module.nocache.js is a build artifact, created with GWT. Like all web
technologies it’s up to the developer using GWT to ensure vulnerabilities like
XSS are not introduced.
There’s further information about avoiding the introduction of XSS
vulnerabilities in GWT applications here:
It would be good to have an approximate public release window for GWT 3.0 from
the community. Will it happen in 2019?
Also any plans to move release cadence for GWT to match Java’s 6-monthly cycles?
-Nick
> On 30 May 2019, at 10:54, Craig Mitchell wrote:
>
> Also, see here for more comments:
It’s very active. See https://gitter.im/gwtproject/gwt
-Nick
> On 28 Mar 2019, at 13:28, carl.hostrande...@gmail.com wrote:
>
> Hello all! I am wondering how active this project is? Don't see much action
> on the releases and comments.
>
> Another question I have is if this project is