Ollie Williams
banner
ollie-williams.bsky.social
Ollie Williams
@ollie-williams.bsky.social
Mostly posting about web standards.
There has been longstanding demand for something like this. Developer interest in DOM Parts has been fairly muted in comparison.
November 16, 2025 at 6:11 PM
I hope you can make the web components meeting. They are planning to discuss DOM Parts and perhaps NodeGroup/Persistent Fragment, which intersect with your work on Declarative partial updates, if only tangentially
November 9, 2025 at 4:20 PM
By contrast, CSS bundlers aren't interoperable github.com/romainmenke/...
GitHub - romainmenke/css-import-tests: Tests for at-import in CSS
Tests for at-import in CSS. Contribute to romainmenke/css-import-tests development by creating an account on GitHub.
github.com
November 7, 2025 at 10:55 AM
Personally I'd love to take a minimal standards-aligned slim-build approach where a tool would take my CSS files and put them into one single file using @sheet for each. It would remove the performance impact of @import. Useful for code organisation olliewilliams.xyz/blog/css-imp...
CSS @import is cool, actually
Importing CSS into a cascade layer. Conditionally importing CSS with feature queries and media queries. @import vs <link>
olliewilliams.xyz
November 7, 2025 at 10:55 AM
DHH has written about a simple no-build approach but that's always going to be bad for performance. world.hey.com/dhh/once-1-i...
ONCE #1 is entirely #nobuild for the front-end
The dream has come true. It’s now possible to build fast, modern web applications without transpiling or bundling either JavaScript or CSS. I’ve been working towards this personal nirvana ever since w...
world.hey.com
November 7, 2025 at 10:55 AM
Thanks Luke 💡. Theoretically I get it, although practically I've set my policy to createHTML: (input) => input as I'm not that sure what else I'd do here. It's a lot of extra code. I feel like the naming of the method is already good at getting developers to use some amount of caution.
October 26, 2025 at 12:46 PM
@bkardell.com I can create a trustedTypes policy to let me use setHTMLUnsafe(), but in your example you use DOMPurify.sanitize(). If I'm going to sanitise the string why not use setHTML()?
October 26, 2025 at 10:00 AM
Thanks for this, very useful. Do you know the rationale for removing so much stuff by default?
October 25, 2025 at 5:25 PM