Skip to content

Commit

Permalink
Remove references to CSP plugin-types
Browse files Browse the repository at this point in the history
With Flash not being supported anymore, the CSP directive plugin-types
has lost its main reason for being and is being removed from the
Content Security Policy specification:
w3c/webappsec-csp#456

This change removes references to the relative algorithm in the
Content Security Policy spec.
  • Loading branch information
Antonio Sartori committed Jan 15, 2021
1 parent a6bc594 commit fe7fa3e
Showing 1 changed file with 3 additions and 9 deletions.
12 changes: 3 additions & 9 deletions source
Original file line number Diff line number Diff line change
Expand Up @@ -3861,7 +3861,6 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute
<li>The <dfn data-x-href="https://w3c.github.io/webappsec-csp/#allow-base-for-document">Is base allowed for Document?</dfn> algorithm</li>
<li>The <dfn data-x-href="https://w3c.github.io/webappsec-csp/#frame-ancestors"><code data-x="">frame-ancestors</code> directive</dfn></li>
<li>The <dfn data-x-href="https://w3c.github.io/webappsec-csp/#sandbox"><code data-x="">sandbox</code> directive</dfn></li>
<li>The <dfn data-x-href="https://w3c.github.io/webappsec-csp/#should-plugin-element-be-blocked-a-priori-by-content-security-policy">Should plugin element be blocked <i lang="la">a priori</i> by Content Security Policy?</dfn> algorithm</li>
<li>The <dfn data-x-href="https://w3c.github.io/webappsec-csp/#contains-a-header-delivered-content-security-policy">contains a header-delivered Content Security Policy</dfn> property.</li>
</ul>
</dd>
Expand Down Expand Up @@ -30861,10 +30860,6 @@ interface <dfn>HTMLEmbedElement</dfn> : <span>HTMLElement</span> {
<li><p>If another <span data-x="concept-task">task</span> has since been queued to run <span>the
<code>embed</code> element setup steps</span> for <var>element</var>, then return.</p></li>

<li><p>If the <span>Should plugin element be blocked <i lang="la">a priori</i> by Content
Security Policy?</span> algorithm returns "<code data-x="">Blocked</code>" when executed on
<var>element</var>, then return. <ref spec=CSP></p></li>

<li>
<p>If <var>element</var> has a <code data-x="attr-embed-src">src</code> attribute set, then:</p>

Expand Down Expand Up @@ -31291,10 +31286,8 @@ interface <dfn>HTMLObjectElement</dfn> : <span>HTMLElement</span> {
data-x="concept-document-bc">browsing context</span> is non-null, or if the element's <span>node
document</span> is not <span>fully active</span>, or if the element is still in the <span>stack
of open elements</span> of an <span>HTML parser</span> or <span>XML parser</span>, or if the
element is not <span>being rendered</span>, or if the <span>Should plugin element be blocked
<i lang="la">a priori</i> by Content Security Policy?</span> algorithm returns "<code
data-x="">Blocked</code>" when executed on the element, then jump to the step below labeled
<i>fallback</i>. <ref spec=CSP></p>
element is not <span>being rendered</span>, then jump to the step below labeled <i>fallback</i>.
<ref spec=CSP></p>
</li>

<li>
Expand Down Expand Up @@ -123164,6 +123157,7 @@ INSERT INTERFACES HERE
Anthony Ramine,
Anthony Ricaud,
Anton Vayvod,
Antonio Sartori,
Antti Koivisto,
Arfat Salman,
Arkadiusz Michalski,
Expand Down

0 comments on commit fe7fa3e

Please sign in to comment.