Esasy mazmuna geçiň Docs nawigasiýasyna geçiň
in English

Düzelt

“Sass” bilen “Bootstrap” -y mowzuk açmagy, sazlamagy we giňeltmegi, global wariantlaryň gämi ýüküni, giň reňk ulgamyny we başgalary öwreniň.

Gysgaça syn

Bootstrap-y sazlamagyň birnäçe usuly bar. Iň oňat ýoluňyz taslamaňyza, gurluşyk gurallaryňyzyň çylşyrymlylygyna, ulanýan Bootstrap wersiýaňyza, brauzer goldawyna we başgalara bagly bolup biler.

Iň gowy görýän iki usulymyz:

  1. Çeşme faýllarymyzy ulanyp we giňeldip bilersiňiz, paket dolandyryjysynyň üsti bilen Bootstrap ulanmak .
  2. Bootstrap-yň düzülen paýlaýyş faýllaryny ýa-da jsDelivr ulanyp, Bootstrap stillerine goşup ýa-da ýok edip bilersiňiz.

Bu ýerde her paket dolandyryjysyny nädip ulanmalydygy barada jikme-jik maglumat berip bilmesek-de, “ Sass” düzüjiňiz bilen “Bootstrap” -y ulanmak barada käbir görkezmeler berip bileris .

For those who want to use the distribution files, review the getting started page for how to include those files and an example HTML page. From there, consult the docs for the layout, components, and behaviors you’d like to use.

As you familiarize yourself with Bootstrap, continue exploring this section for more details on how to utilize our global options, making use of and changing our color system, how we build our components, how to use our growing list of CSS custom properties, and how to optimize your code when building with Bootstrap.

CSPs and embedded SVGs

Several Bootstrap components include embedded SVGs in our CSS to style components consistently and easily across browsers and devices. For organizations with more strict CSP configurations, we’ve documented all instances of our embedded SVGs (all of which are applied via background-image) so you can more thoroughly review your options.

Based on community conversation, some options for addressing this in your own codebase include replacing the URLs with locally hosted assets, removing the images and using inline images (not possible in all components), and modifying your CSP. Our recommendation is to carefully review your own security policies and decide on the best path forward, if necessary.