From bd798296a9675cf221174b86c768d9c4cac1647c Mon Sep 17 00:00:00 2001
From: Domenic Denicola Cross-Origin-Resource-Policy
` headerRequestCredentials
enumeration
X-Frame-Options
processing here (tracked
- as issue #1230).
The Should navigation response to navigation request of type from source in target
- be blocked by Content Security Policy? algorithm returns "Blocked
" when executed upon navigationParams's request, response,
- navigationType, source, and browsingContext.
-
The result of checking a - navigation response's adherence to its embedder policy with response and - navigationParams's browsing - context is false.
response is a network error;
the result of should navigation response to navigation request of type from source
+ in target be blocked by Content Security Policy? given navigationParams's
+ request, response,
+ navigationType, source, and browsingContext is "Blocked
";
the result of checking a navigation response's adherence to
+ `X-Frame-Options
` given response, navigationParams's
+ browsing context, and
+ navigationParams's origin is
+ false; or
the result of checking a navigation response's adherence to its embedder policy given + response and navigationParams's browsing context is false.
then:
@@ -84786,6 +84791,89 @@ interface BeforeUnloadEvent : Event { +X-Frame-Options
` headerThe ` In particular, HTTP Header Field X-Frame-Options specified an Per the below processing model, ifIf
+ both CSP TODO ABNF? Not sure of the normative status of those these days. To check a navigation response's adherence to ` If browsingContext is not a child browsing context, then return
+ true. For each policy of response's CSP list: If policy's disposition is not " If policy's directive set contains a Let xFrameOptions be the result of getting, decoding, and splitting
+ ` If xFrameOptions contains " If xFrameOptions contains " Let ancestorBC be browsingContext's parent browsing
+ context. While ancestorBC is not null: Let origin be ancestorBC's active document's
+ origin. If origin is not same origin with
+ destinationOrigin, then return false. Set ancestorBC to ancestorBC's parent browsing
+ context, if one exists; otherwise, null. Return true. This section describes a header for registration in the Permanent Message Header Field
+ Registry. This section describes a convention for use with the IANA URI scheme registry. It does not
@@ -122164,6 +122275,9 @@ INSERT INTERFACES HERE
X-Frame-Options
` HTTP response header is a legacy way of controlling whether
+ and how a Document
may be loaded inside of a child browsing context. It
+ is obsoleted by the frame-ancestors
CSP directive,
+ which provides more granular control over the same situations. It was originally defined in
+ HTTP Header Field X-Frame-Options, but the definition and processing
+ model here supersedes that document.
+
+ ALLOW-FROM
variant of the header, but this is not to be implemented.frame-ancestors
directive and
+ `X-Frame-Options
` are used in the same response, then `X-Frame-Options
` is ignored.X-Frame-Options
`, given
+ a response response, a browsing
+ context browsingContext, and an origin
+ destinationOrigin:
+
+
+
+
+ enforce
", then continue.frame-ancestors
directive, then return true.X-Frame-Options
` from response's header list.DENY
", then return false.SAMEORIGIN
", then:
+
+
+
+ Offline web applications
@@ -117207,6 +117295,29 @@ interface External {
+ `
+
+ X-Frame-Options
`
+
+
+
web+
scheme prefix