Skip to content

Commit

Permalink
Fix typos
Browse files Browse the repository at this point in the history
  • Loading branch information
OnkarRuikar committed Mar 27, 2024
1 parent 5009121 commit 2786647
Show file tree
Hide file tree
Showing 4 changed files with 4 additions and 4 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ At this point, we are ready to start creating our to-do list application using A

## The to-do application structure

Like any web application, an Angular application has an `index.html` as the entry point. The `index.html` acually is the app's top level HTML template:
Like any web application, an Angular application has an `index.html` as the entry point. The `index.html` actually is the app's top level HTML template:

```html
<!doctype html>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -305,7 +305,7 @@ Details of all the keys you can include are given in the table below.
<p>
<strong>Warning:</strong> Due to the lack of isolation, the web page can detect and interfere with the executed code.
Do not use the <code>MAIN</code> world unless it is acceptable for web pages to read, access, or modify the logic or data that flows through the executed code.
<code>worid</code>, and therefore <code>"MAIN"</code>, is not supported in Firefox (although it is planned, and the work to introduce it is tracked by <a href="https://bugzil.la/1736575" class="external" target="_blank">Bug 1736575</a>). In the meantime, JavaScript code running in the isolated content script sandbox can use the Firefox "Xray vision" feature, as described in <a href="/en-US/docs/Mozilla/Add-ons/WebExtensions/Sharing_objects_with_page_scripts">Share objects with page scripts</a>.
<code>world</code>, and therefore <code>"MAIN"</code>, is not supported in Firefox (although it is planned, and the work to introduce it is tracked by <a href="https://bugzil.la/1736575" class="external" target="_blank">Bug 1736575</a>). In the meantime, JavaScript code running in the isolated content script sandbox can use the Firefox "Xray vision" feature, as described in <a href="/en-US/docs/Mozilla/Add-ons/WebExtensions/Sharing_objects_with_page_scripts">Share objects with page scripts</a>.
</p>
</div>
</dd>
Expand Down
2 changes: 1 addition & 1 deletion files/en-us/mozilla/firefox/releases/124/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ This article provides information about the changes in Firefox 124 that affect d

#### WebDriver BiDi

- Implemented the [storage.getCookies](https://w3c.github.io/webdriver-bidi/#command-storage-getCookies) command, which allows users to retrieve cookies. This command accepts two optional arguments. Clients can provide the `filter` argument to only return cookies matching specific criterias. And the `partition` argument can be used to build the partition key and retrieve cookies [owned by the corresponding partition](/en-US/docs/Web/Privacy/State_Partitioning). ([Firefox bug 1854580](https://bugzil.la/1854580))
- Implemented the [storage.getCookies](https://w3c.github.io/webdriver-bidi/#command-storage-getCookies) command, which allows users to retrieve cookies. This command accepts two optional arguments. Clients can provide the `filter` argument to only return cookies matching specific criteria. And the `partition` argument can be used to build the partition key and retrieve cookies [owned by the corresponding partition](/en-US/docs/Web/Privacy/State_Partitioning). ([Firefox bug 1854580](https://bugzil.la/1854580))
- Implemented the [storage.setCookie](https://w3c.github.io/webdriver-bidi/#command-storage-setCookie) command, which creates a new cookie. Users can provide information about the cookie in the `cookie` parameter, and optionally a `partition` parameter to build the partition key of the partition which should own the cookie. ([Firefox bug 1854582](https://bugzil.la/1854582))
- Implemented various commands to intercept requests:
- [network.addIntercept](https://w3c.github.io/webdriver-bidi/#command-network-addIntercept) which allows users to define URL patterns which will be used to intercept network requests during various phases of a network event lifecycle. This command returns the unique id generated for the created network intercept. ([Firefox bug 1826192](https://bugzil.la/1826192))
Expand Down
2 changes: 1 addition & 1 deletion files/en-us/web/api/fenced_frame_api/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -89,7 +89,7 @@ Supports-Loading-Mode: fenced-frame
Other effects of fenced frames on HTTP headers are as follows:

- [User-agent client hints](/en-US/docs/Web/HTTP/Client_hints#user-agent_client_hints) are not available inside fenced frames because they rely on [permissions policy](/en-US/docs/Web/HTTP/Permissions_Policy) delegation, which could be used to leak data.
- Strict [`Cross-Origin-Opener-Policy`](/en-US/docs/Web/HTTP/Headers/Cross-Origin-Opener-Policy) settings are enforced on new browsing contexts opened from inside frenced frames, otherwise they could be used to leak information to other origins. Any new window opened from inside a fenced frame will have [`rel="noopener"`](/en-US/docs/Web/HTML/Attributes/rel/noopener) and `Cross-Origin-Opener-Policy: same-origin` set to ensure that {{domxref("Window.opener")}} returns `null` and place it in its own browsing context group.
- Strict [`Cross-Origin-Opener-Policy`](/en-US/docs/Web/HTTP/Headers/Cross-Origin-Opener-Policy) settings are enforced on new browsing contexts opened from inside fenced frames, otherwise they could be used to leak information to other origins. Any new window opened from inside a fenced frame will have [`rel="noopener"`](/en-US/docs/Web/HTML/Attributes/rel/noopener) and `Cross-Origin-Opener-Policy: same-origin` set to ensure that {{domxref("Window.opener")}} returns `null` and place it in its own browsing context group.
- [`Content-Security-Policy: fenced-frame-src`](/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/fenced-frame-src) has been added for specifying valid sources for nested browsing contexts loaded into `<fencedframe>` elements.
- [`Content-Security-Policy: sandbox`](/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/sandbox) custom settings cannot be inherited by fenced frames, to mitigate privacy issues. For a fenced frame to load, you need to specify no `sandbox` CSP (which implies the below values), or specify the following sandbox values:
- `allow-same-origin`
Expand Down

0 comments on commit 2786647

Please sign in to comment.