Skip to content

Commit

Permalink
Update viewer to [email protected]
Browse files Browse the repository at this point in the history
  • Loading branch information
adamraine committed Oct 10, 2023
1 parent bbf7fa5 commit d7904e8
Show file tree
Hide file tree
Showing 7 changed files with 97 additions and 123 deletions.
10 changes: 5 additions & 5 deletions viewer/index.html
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
<!--
Copyright 2016 The Lighthouse Authors. All Rights Reserved.
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
@license
Copyright 2016 Google LLC
SPDX-License-Identifier: Apache-2.0
-->

<!doctype html>
Expand All @@ -15,8 +15,8 @@
<meta name="theme-color" content="#304ffe">
<link rel="stylesheet" href="styles/bundled.css">
<link rel="canonical" href="https://googlechrome.github.io/lighthouse/viewer/">
<link rel="preload" href="i18n-module-D6DCP5OF.js" as="script" crossorigin="anonymous" />
<link rel="preload" href="chunk-U3QIE4IX.js" as="script" crossorigin="anonymous" /></head>
<link rel="preload" href="./src/i18n-module-HRN4JVXF.js" as="script" crossorigin="anonymous" />
<link rel="preload" href="./src/chunk-7UE7KBDV.js" as="script" crossorigin="anonymous" /></head>
<body>

<div class="drop_zone"></div>
Expand Down
28 changes: 14 additions & 14 deletions viewer/locales/en-US.json
Original file line number Diff line number Diff line change
Expand Up @@ -774,7 +774,7 @@
"message": "Syntax"
},
"core/audits/csp-xss.js | metaTagMessage": {
"message": "The page contains a CSP defined in a <meta> tag. Consider moving the CSP to an HTTP header or defining another strict CSP in an HTTP header."
"message": "The page contains a CSP defined in a `<meta>` tag. Consider moving the CSP to an HTTP header or defining another strict CSP in an HTTP header."
},
"core/audits/csp-xss.js | noCsp": {
"message": "No CSP found in enforcement mode"
Expand Down Expand Up @@ -1026,7 +1026,7 @@
"message": "Page is loaded in an incognito window"
},
"core/audits/installable-manifest.js | manifest-display-not-supported": {
"message": "Manifest 'display' property must be one of 'standalone', 'fullscreen', or 'minimal-ui'"
"message": "Manifest `display` property must be one of `standalone`, `fullscreen`, or `minimal-ui`"
},
"core/audits/installable-manifest.js | manifest-display-override-not-supported": {
"message": "Manifest contains 'display_override' field, and the first supported display mode must be one of 'standalone', 'fullscreen', or 'minimal-ui'"
Expand All @@ -1038,7 +1038,7 @@
"message": "Manifest URL changed while the manifest was being fetched."
},
"core/audits/installable-manifest.js | manifest-missing-name-or-short-name": {
"message": "Manifest does not contain a 'name' or 'short_name' field"
"message": "Manifest does not contain a `name` or `short_name` field"
},
"core/audits/installable-manifest.js | manifest-missing-suitable-icon": {
"message": "Manifest does not contain a suitable icon - PNG, SVG or WebP format of at least {value0} px is required, the sizes attribute must be set, and the purpose attribute, if set, must include \"any\"."
Expand Down Expand Up @@ -2211,25 +2211,25 @@
"message": "Pages that use WebXR are not currently eligible for back/forward cache."
},
"core/lib/csp-evaluator.js | allowlistFallback": {
"message": "Consider adding https: and http: URL schemes (ignored by browsers supporting 'strict-dynamic') to be backward compatible with older browsers."
"message": "Consider adding https: and http: URL schemes (ignored by browsers supporting `'strict-dynamic'`) to be backward compatible with older browsers."
},
"core/lib/csp-evaluator.js | deprecatedDisownOpener": {
"message": "disown-opener is deprecated since CSP3. Please, use the Cross-Origin-Opener-Policy header instead."
"message": "`disown-opener` is deprecated since CSP3. Please, use the Cross-Origin-Opener-Policy header instead."
},
"core/lib/csp-evaluator.js | deprecatedReferrer": {
"message": "referrer is deprecated since CSP2. Please, use the Referrer-Policy header instead."
"message": "`referrer` is deprecated since CSP2. Please, use the Referrer-Policy header instead."
},
"core/lib/csp-evaluator.js | deprecatedReflectedXSS": {
"message": "reflected-xss is deprecated since CSP2. Please, use the X-XSS-Protection header instead."
"message": "`reflected-xss` is deprecated since CSP2. Please, use the X-XSS-Protection header instead."
},
"core/lib/csp-evaluator.js | missingBaseUri": {
"message": "Missing base-uri allows injected <base> tags to set the base URL for all relative URLs (e.g. scripts) to an attacker controlled domain. Consider setting base-uri to 'none' or 'self'."
"message": "Missing `base-uri` allows injected `<base>` tags to set the base URL for all relative URLs (e.g. scripts) to an attacker controlled domain. Consider setting `base-uri` to `'none'` or `'self'`."
},
"core/lib/csp-evaluator.js | missingObjectSrc": {
"message": "Missing object-src allows the injection of plugins that execute unsafe scripts. Consider setting object-src to 'none' if you can."
"message": "Missing `object-src` allows the injection of plugins that execute unsafe scripts. Consider setting `object-src` to `'none'` if you can."
},
"core/lib/csp-evaluator.js | missingScriptSrc": {
"message": "script-src directive is missing. This can allow the execution of unsafe scripts."
"message": "`script-src` directive is missing. This can allow the execution of unsafe scripts."
},
"core/lib/csp-evaluator.js | missingSemicolon": {
"message": "Did you forget the semicolon? {keyword} seems to be a directive, not a keyword."
Expand All @@ -2250,10 +2250,10 @@
"message": "No CSP configures a reporting destination. This makes it difficult to maintain the CSP over time and monitor for any breakages."
},
"core/lib/csp-evaluator.js | reportToOnly": {
"message": "The reporting destination is only configured via the report-to directive. This directive is only supported in Chromium-based browsers so it is recommended to also use a report-uri directive."
"message": "The reporting destination is only configured via the report-to directive. This directive is only supported in Chromium-based browsers so it is recommended to also use a `report-uri` directive."
},
"core/lib/csp-evaluator.js | strictDynamic": {
"message": "Host allowlists can frequently be bypassed. Consider using CSP nonces or hashes instead, along with 'strict-dynamic' if necessary."
"message": "Host allowlists can frequently be bypassed. Consider using CSP nonces or hashes instead, along with `'strict-dynamic'` if necessary."
},
"core/lib/csp-evaluator.js | unknownDirective": {
"message": "Unknown CSP directive."
Expand All @@ -2262,10 +2262,10 @@
"message": "{keyword} seems to be an invalid keyword."
},
"core/lib/csp-evaluator.js | unsafeInline": {
"message": "'unsafe-inline' allows the execution of unsafe in-page scripts and event handlers. Consider using CSP nonces or hashes to allow scripts individually."
"message": "`'unsafe-inline'` allows the execution of unsafe in-page scripts and event handlers. Consider using CSP nonces or hashes to allow scripts individually."
},
"core/lib/csp-evaluator.js | unsafeInlineFallback": {
"message": "Consider adding 'unsafe-inline' (ignored by browsers supporting nonces/hashes) to be backward compatible with older browsers."
"message": "Consider adding `'unsafe-inline'` (ignored by browsers supporting nonces/hashes) to be backward compatible with older browsers."
},
"core/lib/deprecation-description.js | feature": {
"message": "Check the feature status page for more details."
Expand Down
Loading

0 comments on commit d7904e8

Please sign in to comment.