Skip to content

Commit

Permalink
Clearly mark CSP plugin-types & block-all-mixed-content as deprecated (
Browse files Browse the repository at this point in the history
…#5525)

Fixes #5522

Also fixes a couple of cross-reference flaws.
  • Loading branch information
sideshowbarker authored Jun 1, 2021
1 parent 736bd7a commit 1ba41c6
Showing 1 changed file with 22 additions and 17 deletions.
39 changes: 22 additions & 17 deletions files/en-us/web/http/headers/content-security-policy/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
title: Content-Security-Policy
slug: Web/HTTP/Headers/Content-Security-Policy
tags:
- CSP
- Content Security Policy
- HTTP
- Reference
- Security
- header
- CSP
- Content Security Policy
- HTTP
- Reference
- Security
- header
browser-compat: http.headers.csp.Content-Security-Policy
---
<div>{{HTTPSidebar}}</div>
Expand All @@ -16,7 +16,7 @@
web site administrators to control resources the user agent is allowed to load for a
given page. With a few exceptions, policies mostly involve specifying server origins and
script endpoints. This helps guard against cross-site scripting attacks
({{Glossary("XSS")}}).</p>
({{Glossary("Cross-site_scripting")}}).</p>

<p>For more information, see the introductory article on <a
href="/en-US/docs/Web/HTTP/CSP">Content Security Policy (CSP)</a>.</p>
Expand Down Expand Up @@ -118,9 +118,6 @@ <h3 id="Document_directives">Document directives</h3>
<dt>{{CSP("base-uri")}}</dt>
<dd>Restricts the URLs which can be used in a document's {{HTMLElement("base")}}
element.</dd>
<dt>{{CSP("plugin-types")}}</dt>
<dd>Restricts the set of plugins that can be embedded into a document by limiting the
types of resources which can be loaded.</dd>
<dt>{{CSP("sandbox")}}</dt>
<dd>Enables a sandbox for the requested resource similar to the
{{HTMLElement("iframe")}} {{htmlattrxref("sandbox", "iframe")}} attribute.</dd>
Expand Down Expand Up @@ -178,12 +175,6 @@ <h3 id="Reporting_directives">Reporting directives</h3>
<h3 id="Other_directives">Other directives</h3>

<dl>
<dt>{{CSP("block-all-mixed-content")}}</dt>
<dd>Prevents loading any assets using HTTP when the page is loaded using HTTPS.</dd>
<dt>{{CSP("referrer")}}{{deprecated_inline}}{{non-standard_inline}}</dt>
<dd>Used to specify information in the <a
href="/en-US/docs/Web/HTTP/Headers/Referer">Referer</a> (sic) header for links away
from a page. Use the {{HTTPHeader("Referrer-Policy")}} header instead.</dd>
<dt>{{CSP("require-sri-for")}}{{experimental_inline}}</dt>
<dd>Requires the use of {{Glossary("SRI")}} for scripts or styles on the page.</dd>
<dt>{{CSP("require-trusted-types-for")}}{{experimental_inline}}</dt>
Expand All @@ -201,6 +192,20 @@ <h3 id="Other_directives">Other directives</h3>
that need to be rewritten.</dd>
</dl>

<h3 id="deprecated_directives">Deprecated directives</h3>

<dl>
<dt>{{CSP("block-all-mixed-content")}}{{deprecated_inline}}</dt>
<dd>Prevents loading any assets using HTTP when the page is loaded using HTTPS.</dd>
<dt>{{CSP("plugin-types")}}{{deprecated_inline}}</dt>
<dd>Restricts the set of plugins that can be embedded into a document by limiting the
types of resources which can be loaded.</dd>
<dt>{{CSP("referrer")}}{{deprecated_inline}}{{non-standard_inline}}</dt>
<dd>Used to specify information in the <a
href="/en-US/docs/Web/HTTP/Headers/Referer">Referer</a> (sic) header for links away
from a page. Use the {{HTTPHeader("Referrer-Policy")}} header instead.</dd>
</dl>

<h2 id="Values">Values</h2>

<h3 id="Keyword_values">Keyword values</h3>
Expand All @@ -222,7 +227,7 @@ <h3 id="Unsafe_keyword_values">Unsafe keyword values</h3>
<dt><code>unsafe-inline</code></dt>
<dd>Allow use of inline resources.</dd>
<dt><code>unsafe-eval</code></dt>
<dd>Allow use of dynamic code evaluation such as {{jsxref("Global_Objects/eval", "eval")}}, {{domxref("Window.setImmediate", "setImmediate")}}{{non-standard_inline}}, and {{domxref("window.execScript", "execScript")}}{{non-standard_inline}}.</dd>
<dd>Allow use of dynamic code evaluation such as {{jsxref("Global_Objects/eval", "eval")}}, {{domxref("Window.setImmediate", "setImmediate")}}{{non-standard_inline}}, and <code>window.execScript</code> {{non-standard_inline}}.</dd>
<dt><code>unsafe-hashes</code> {{experimental_inline}}</dt>
<dd></dd>
<dt><code>unsafe-allow-redirects</code> {{experimental_inline}}</dt>
Expand Down

0 comments on commit 1ba41c6

Please sign in to comment.