Skip to content

Commit

Permalink
Drop the sandbox flag.
Browse files Browse the repository at this point in the history
Closes #28, again.
  • Loading branch information
mikewest committed Feb 14, 2020
1 parent a05fd1f commit 1e2694f
Showing 1 changed file with 4 additions and 40 deletions.
44 changes: 4 additions & 40 deletions index.src.html
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,6 @@ <h1>Secure Contexts</h1>
Indent: 2
Markup Shorthands: markdown on
Boilerplate: omit conformance, omit feedback-header
At Risk: The <a>sandboxed secure browsing context flag</a> defined in [[#monkey-patching-sandbox-flags]], as well as its usage in [[#is-settings-object-contextually-secure]].
</pre>
<pre class="link-defaults">
spec:url; type:interface; text:URL
Expand Down Expand Up @@ -507,35 +506,6 @@ <h3 id="integration-idl">Integration with WebIDL</h3>

<h3 id="monkey-patching-html">Modifications to HTML</h3>

<h4 id="monkey-patching-sandbox-flags">Sandboxing</h4>

Developers may wish to treat sandboxed <a for="/">browsing contexts</a> as <a>secure
contexts</a> in some situations, and <a>non-secure contexts</a> in others. The
following sandboxing flag supports this desire:

<dl>
<dt>The <dfn export>sandboxed secure browsing context flag</dfn></dt>
<dd>
This flag asserts that content in a browsing context will be treated as a
<a>non-secure context</a>, even if it would otherwise be considered secure.
</dd>
</dl>

The <a>parse a sandboxing directive</a> algorithm is extended by adding the
following entry to the list in the final step of the algorithm which parses
|tokens| into flags:

* The <a>sandboxed secure browsing context flag</a>, unless |tokens|
contains the
<dfn attr-value for="iframe/sandbox" export>`allow-secure-context`</dfn>
keyword.

ISSUE(w3c/webappsec-secure-contexts#28): This feature is "at risk", pending the
resolution of the linked issue (which itself is pending metrics gathered from
browser vendors). Accordingly, no attempt has been made to upstream this to
either WHATWG's HTML or W3C's HTML. Once we've decided whether or not to keep
the feature, we'll work on that.

<h4 id="shared-workers" class="non-normative">Shared Workers</h4>

<em>This section is non-normative</em>.
Expand Down Expand Up @@ -608,18 +578,12 @@ <h3 id="is-settings-object-contextually-secure">

5. Return "`Not Secure`" if any of the following are true:

1. |document|'s <a for=Document>active sandboxing flag set</a> contains the
<a>sandboxed secure browsing context flag</a>.

Note: This check is "at risk". See [[#monkey-patching-sandbox-flags]]
for details.

2. |document| has a [=parent browsing context=] (|context|), and |context|'s
1. |document| has a [=parent browsing context=] (|context|), and |context|'s
[=active document=]'s [=relevant settings object=] is not [=contextually secure=].

3. |settings|'s <a for="environment settings object">HTTPS state</a> is "`deprecated`".
2. |settings|'s <a for="environment settings object">HTTPS state</a> is "`deprecated`".

4. |document|'s <a for=Document>active sandboxing flag set</a> includes the
3. |document|'s <a for=Document>active sandboxing flag set</a> includes the
<a>sandboxed origin browsing context flag</a>, and
[[#is-url-trustworthy]] returns "`Not Trustworthy`" when executed upon
|settings|'s <a>creation URL</a>.
Expand All @@ -633,7 +597,7 @@ <h3 id="is-settings-object-contextually-secure">
look at the origin of its URL to determine whether we would have
considered it trustworthy had it not been sandboxed.

5. |document|'s <a for=Document>active sandboxing flag set</a> does not include the
4. |document|'s <a for=Document>active sandboxing flag set</a> does not include the
<a>sandboxed origin browsing context flag</a>, and
[[#is-origin-trustworthy]] returns "`Not Trustworthy`" when executed
upon |settings|'s <a for="environment settings object">origin</a>.
Expand Down

0 comments on commit 1e2694f

Please sign in to comment.