-
-
Notifications
You must be signed in to change notification settings - Fork 983
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Making injection of clearfix element during iframe content initialization optional #606
Comments
Not heard of anyone having that issue before, does using a different height
calculation method help?
…On Wed, Jul 11, 2018 at 5:35 PM, Jessica Jordan ***@***.***> wrote:
Hey, thank you for putting this handy library together! I'm just trying it
out for a project for the first time and works pretty smoothly.
One thing I noticed though was that - for some of the pages in my
application - the injection of the clearfix element during the
initialization
<https://github.com/davidjbradshaw/iframe-resizer/blob/d8434af956f9d54981e956a47969bb26e84089bc/js/iframeResizer.contentWindow.js#L171>
of the iframe content window will lead to most of my iframe content being
hidden behind this specific clearfix element.
Is there currently a way to opt out of this injection? If not, would it
make sense to provide an option flag that defaults to true to make this a
non-breaking change for current users but still allow other users to opt
out of the automatic clearfix element injection?
If this seems feasible, I'm happy to send a PR. Looking forward to your
feedback!
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#606>, or mute
the thread
<https://github.com/notifications/unsubscribe-auth/AAkHEq_KKYQSdOv0ZJXkfE5ORyL5JQl-ks5uFhtcgaJpZM4VLYBt>
.
--
David J. Bradshaw )'( [email protected]
'The people we think are a little weird are the ones who change the world'
- Simon Sinek
|
Yes exactly, this issue is showing up with all I want to emphasize that this is not an issue with the library itself, but rather with the integration of the library with other applications: As far as I can see it,
In this scenario the clearfix div that is added to the DOM by The injection of the clearfix element is something that might also change the layout of other applications unexpectedly, in which the DOM change is not anticipated. I think it would be cool to leave the clearfix element as a default so everyone can still reap the benefits of it. Yet, I think it would be useful for users to be able to opt-out of it, in case they have particular styles added to their apps which rely on a certain DOM layout to be present and stay in place. In my case, I wouldn't know how to circumvent this issue except for checking that my application is loaded as an iframe and then appending a particular class to the body tag which will update the aforementioned default styling. What are your thoughts on this? |
I think this is actually described in the issue #427 as well:
|
I just tried to reproduce this by adding your css to the example file and it does not create an issue |
Anyway I will add |
Hey, thank you for putting this handy library together! I'm just trying it out for a project for the first time and works pretty smoothly.
One thing I noticed though was that - for some of the pages in my application - the injection of the clearfix element during the initialization of the iframe content window will lead to most of my iframe content being hidden behind this specific clearfix element.
Is there currently a way to opt out of this injection? If not, would it make sense to provide an option flag that defaults to
true
to make this a non-breaking change for current users but still allow other users to opt out of the automatic clearfix element injection?If this seems feasible, I'm happy to send a PR. Looking forward to your feedback!
The text was updated successfully, but these errors were encountered: