From 2bb5c0bdc5975b64f9eaba356002f70636e16091 Mon Sep 17 00:00:00 2001 From: Christian Oliff Date: Mon, 16 Aug 2021 17:24:51 +0900 Subject: [PATCH] Run build update --- dist/.htaccess | 198 +++++++++++++++++++++++------------------ dist/package-lock.json | 6 +- src/doc/html.md | 2 +- 3 files changed, 116 insertions(+), 90 deletions(-) diff --git a/dist/.htaccess b/dist/.htaccess index eab92e33..adefc34a 100644 --- a/dist/.htaccess +++ b/dist/.htaccess @@ -1,4 +1,4 @@ -# Apache Server Configs v4.1.0 | MIT License +# Apache Server Configs v5.0.0 | MIT License # https://github.com/h5bp/server-configs-apache # (!) Using `.htaccess` files slows down Apache, therefore, if you have @@ -27,9 +27,15 @@ # allowing access based on (sub)domain: # # Header set Access-Control-Allow-Origin "subdomain.example.com" +# +# (1) When `Access-Control-Allow-Origin` points to a specific rule rather +# than `*`, then `Vary: Origin` should be sent along with the response. # # Header set Access-Control-Allow-Origin "*" + +# # (1) +# # Header append Vary Origin # # ---------------------------------------------------------------------- @@ -43,7 +49,7 @@ - + SetEnvIf Origin ":" IS_CORS Header set Access-Control-Allow-Origin "*" env=IS_CORS @@ -109,32 +115,6 @@ ErrorDocument 404 /404.html Options -MultiViews -# ###################################################################### -# # INTERNET EXPLORER # -# ###################################################################### - -# ---------------------------------------------------------------------- -# | Document modes | -# ---------------------------------------------------------------------- - -# Force Internet Explorer 8/9/10 to render pages in the highest mode -# available in various cases when it may not. -# -# https://hsivonen.fi/doctype/#ie8 -# -# (!) Starting with Internet Explorer 11, document modes are deprecated. -# If your business still relies on older web apps and services that were -# designed for older versions of Internet Explorer, you might want to -# consider enabling `Enterprise Mode` throughout your company. -# -# https://msdn.microsoft.com/en-us/library/ie/bg182625.aspx#docmode -# https://blogs.msdn.microsoft.com/ie/2014/04/02/stay-up-to-date-with-enterprise-mode-for-internet-explorer-11/ -# https://msdn.microsoft.com/en-us/library/ff955275.aspx - - - Header always set X-UA-Compatible "IE=edge" "expr=%{CONTENT_TYPE} =~ m#text/html#i" - - # ###################################################################### # # MEDIA TYPES AND CHARACTER ENCODINGS # # ###################################################################### @@ -183,6 +163,7 @@ Options -MultiViews AddType image/avif avif AddType image/avif-sequence avifs AddType image/bmp bmp + AddType image/jxl jxl AddType image/svg+xml svg svgz AddType image/webp webp AddType video/mp4 f4v f4p m4v mp4 @@ -453,8 +434,7 @@ AddDefaultCharset utf-8 # # Keep in mind that while you could send the `X-Frame-Options` header for all # of your website's pages, this has the potential downside that it forbids even -# non-malicious framing of your content (e.g.: when users visit your website -# using a Google Image Search results page). +# non-malicious framing of your content. # # Nonetheless, you should ensure that you send the `X-Frame-Options` header for # all pages that allow a user to make a state-changing operation (e.g: pages @@ -465,10 +445,13 @@ AddDefaultCharset utf-8 # more than just clickjacking attacks. # https://cure53.de/xfo-clickjacking.pdf. # -# https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options +# (!) The `Content-Security-Policy` header has a `frame-ancestors` directive +# which obsoletes this header for supporting browsers. +# # https://tools.ietf.org/html/rfc7034 -# https://blogs.msdn.microsoft.com/ieinternals/2010/03/30/combating-clickjacking-with-x-frame-options/ -# https://www.owasp.org/index.php/Clickjacking +# https://owasp.org/www-project-secure-headers/#x-frame-options +# https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options +# https://docs.microsoft.com/archive/blogs/ieinternals/combating-clickjacking-with-x-frame-options # # Header always set X-Frame-Options "DENY" "expr=%{CONTENT_TYPE} =~ m#text/html#i" @@ -517,10 +500,17 @@ AddDefaultCharset utf-8 # The `frame-ancestors` directive helps avoid "Clickjacking" attacks and # is similar to the `X-Frame-Options` header. # -# Browsers that support the CSP header will ignore `X-Frame-Options` if +# Browsers that support the CSP header should ignore `X-Frame-Options` if # `frame-ancestors` is also specified. # -# (5) Forces the browser to treat all the resources that are served over HTTP +# (5) Elements controlled by `object-src` are perhaps coincidentally +# considered legacy HTML elements and are not receiving new standardized +# features (such as the security attributes `sandbox` or `allow` for +# `