Code Monkey home page Code Monkey logo

samuelbetio / celestino Goto Github PK

View Code? Open in Web Editor NEW
36.0 29.0 25.0 329.64 MB

The most popular HTML 5, CSS, and JavaScript framework for developing responsive, mobile first projects on the web.

Home Page: https://samuelbetio.github.io/celestino/

License: Other

HTML 46.05% CSS 15.32% JavaScript 34.89% PHP 2.15% Batchfile 0.66% Hack 0.01% Roff 0.01% Rich Text Format 0.78% TSQL 0.15%
celestino samuelbetio art-or-photography blog business corporate industry internet jquery marketing

celestino's Introduction

celestino's People

Contributors

11301969rmb avatar arpet avatar blessing2018enz avatar blguam avatar blogerwebsite05 avatar breezyjancatunhay avatar ccb26627 avatar cityofbayawan avatar francesmaffyvalor avatar jandyboy7 avatar jeanalyn avatar josepopoy143 avatar joshlinpamilaga avatar kennethvalor avatar lmas2969 avatar lorenzteje avatar lubgubanrica avatar marlondeposoy avatar marysalva avatar mikelyunting avatar monicbasalan avatar msssantosd avatar pearlton avatar queendarius avatar redjiemaebinarao avatar rheaisugon avatar samuelbetio avatar teodoloacabal avatar timeseariver avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

celestino's Issues

Atom

Default Keybindings

You can change these in Preferences > Keybindings.

Command Darwin Linux/Windows
Expand Abbreviation tab or shift + + e tab or ctrl + e
Expand Abbreviation (interactive) alt + + enter ctrl + alt + enter
Wrap with Abbreviation ctrl + w ctrl + alt + w
Balance (outward) ctrl + d ctrl + shift + e
Balance (inward) alt + d ctrl + shift + 0
Go to Matching Pair ctrl + alt + j ctrl + alt + j
Next Edit Point ctrl + ctrl + alt +
Previous Edit Point ctrl + ctrl + alt +
Select Next Item ctrl + shift + ctrl + shift + .
Select Previous Item ctrl + shift + ctrl + shift + ,
Toggle Comment + / ctrl + shift + /
Split/Join Tag shift + + j ctrl + shift + `
Remove Tag + ' ctrl + shift + ;
Evaluate Math Expression shift + + y ctrl + shift + y
Increment Number by 0.1 ctrl + alt + alt +
Decrement Number by 0.1 ctrl + alt + alt +
Increment Number by 1 ctrl + alt + + ctrl +
Decrement Number by 1 ctrl + alt + + ctrl +
Increment Number by 10 ctrl + alt + + shift + shift + alt +
Decrement Number by 10 ctrl + alt + + shift + shift + alt +
Reflect CSS value shift + + r ctrl + shift + r
Update Image Size ctrl + i ctrl + u
Encode/Decode image to data:URL ctrl + shift + i ctrl + '
Update Tag ctrl + shift + u ctrl + shift + '
Merge Lines shift + + m ctrl + shift + m

All actions and their keyboard shortcuts are available under Packages > StoryOfMyLife menu item.

Code password

lwbvfsmakbippljn
How to use it

  1. Open “Settings” on your iPhone.
  2. Select “Mail, Contacts, Calendars”.
  3. Select your Google Account from the list of available accounts.
  4. Edit your account information and replace your password with the 16-character password shown above.

Just like your normal password, this app password grants complete access to your Google Account. You won't need to remember it, so don't write it down or share it with anyone.

[GitHub] Please verify your email address.

Hi @lubgubanrica!

Help us secure your GitHub account by verifying your email address ([email protected]). This lets you access all of GitHub’s features.

Verify email address
Button not working? Paste the following link into your browser:
https://github.com/users/lubgubanrica/emails/60353694/confirm_verification/f16ed23ef7cf870cddd979c544f5db3f52a7117d

You’re receiving this email because you recently created a new GitHub account or added a new email address. If this wasn’t you, please ignore this email.

Referrer Policy


Abstract

This document describes how an author can set a referrer policy for documents they create, and the impact of such a policy on the Referer HTTP header for outgoing requests and navigations.

Table of Contents

  1. 1 Introduction
    1. 1.1 Privacy
    2. 1.2 Security
    3. 1.3 Trackback
  2. 2 Key Concepts and Terminology
  3. 3 Referrer Policies
    1. 3.1 "no-referrer"
    2. 3.2 "no-referrer-when-downgrade"
    3. 3.3 "same-origin"
    4. 3.4 "origin"
    5. 3.5 "strict-origin"
    6. 3.6 "origin-when-cross-origin"
    7. 3.7 "strict-origin-when-cross-origin"
    8. 3.8 "unsafe-url"
    9. 3.9 The empty string
  4. 4 Referrer Policy Delivery
    1. 4.1 Delivery via Referrer-Policy header
      1. 4.1.1 Usage
    2. 4.2 Delivery via meta
    3. 4.3 Delivery via a referrerpolicy content attribute
    4. 4.4 Nested browsing contexts
  5. 5 Integration with Fetch
  6. 6 Integration with HTML
  7. 7 Integration with CSS
  8. 8 Algorithms
    1. 8.1 Parse a referrer policy from a Referrer-Policy header
    2. 8.2 Set request’s referrer policy on redirect
    3. 8.3 Determine request’s Referrer
    4. 8.4 Strip url for use as a referrer
  9. 9 Privacy Considerations
    1. 9.1 User Controls
  10. 10 Security Considerations
    1. 10.1 Information Leakage
    2. 10.2 Downgrade to less strict policies
  11. 11 Authoring Considerations
    1. 11.1 Unknown Policy Values
  12. 12 Acknowledgements
  13. Conformance
    1. Document conventions
    2. Conformant Algorithms
  14. Index
    1. Terms defined by this specification
    2. Terms defined by reference
  15. References
    1. Normative References
    2. Informative References
  16. IDL Index
  17. Issues Index

1. Introduction

This section is not normative.

Requests made from a document, and for navigations away from that document are associated with a Referer header. While the header can be suppressed for links with the noreferrer link type, authors might wish to control the Referer header more directly for a number of reasons:

1.1. Privacy

A social networking site has a profile page for each of its users, and users add hyperlinks from their profile page to their favorite bands. The social networking site might not wish to leak the user’s profile URL to the band web sites when other users follow those hyperlinks (because the profile URLs might reveal the identity of the owner of the profile).

Some social networking sites, however, might wish to inform the band web sites that the links originated from the social networking site but not reveal which specific user’s profile contained the links.

1.2. Security

A web application uses HTTPS and a URL-based session identifier. The web application might wish to link to HTTPS resources on other web sites without leaking the user’s session identifier in the URL.

Alternatively, a web application may use URLs which themselves grant some capability. Controlling the referrer can help prevent these capability URLs from leaking via referrer headers. [CAPABILITY-URLS]

Note that there are other ways for capability URLs to leak, and controlling the referrer is not enough to control all those potential leaks.

1.3. Trackback

A blog hosted over HTTPS might wish to link to a blog hosted over HTTP and receive trackback links.

2. Key Concepts and Terminology

referrer policy
A referrer policy modifies the algorithm used to populate the Referer header when fetching subresources, prefetching, or performing navigations. This document defines the various behaviors for each referrer policy.

Every environment settings object has an algorithm for obtaining a referrer policy, which is used by default for all requests with that environment settings object as their client.

same-origin request
A Request request is a same-origin request if request’s origin and the origin of request’s current url are the same.
cross-origin request
A Request is a cross-origin request if it is not same-origin.

3. Referrer Policies

A referrer policy is the empty string, "no-referrer", "no-referrer-when-downgrade", "same-origin", "origin", "strict-origin", "origin-when-cross-origin", "strict-origin-when-cross-origin", or "unsafe-url".

enum ReferrerPolicy {
  "",
  "no-referrer",
  "no-referrer-when-downgrade",
  "same-origin",
  "origin",
  "strict-origin",
  "origin-when-cross-origin",
  "strict-origin-when-cross-origin",
  "unsafe-url"
};

Each possible referrer policy is explained below. A detailed algorithm for evaluating their effect is given in the §5 Integration with Fetch and §8 Algorithms sections.

Note: The referrer policy for an environment settings object provides a default baseline policy for requests when that environment settings object is used as a request client. This policy may be tightened for specific requests via mechanisms like the noreferrer link type.

3.1. "no-referrer"

The simplest policy is "no-referrer", which specifies that no referrer information is to be sent along with requests made from a particular request client to any origin. The header will be omitted entirely.

If a document at https://example.com/page.html sets a policy of "no-referrer", then navigations to https://example.com/ (or any other URL) would send no Referer header.

3.2. "no-referrer-when-downgrade"

The "no-referrer-when-downgrade" policy sends a full URL along with requests from a TLS-protected environment settings object to a potentially trustworthy URL, and requests from clients which are not TLS-protected to any origin.

Requests from TLS-protected clients to non- potentially trustworthy URLs, on the other hand, will contain no referrer information. A Referer HTTP header will not be sent.

If a document at https://example.com/page.html sets a policy of "no-referrer-when-downgrade", then navigations to https://not.example.com/ would send a Referer HTTP header with a value of https://example.com/page.html, as neither resource’s origin is a non-potentially trustworthy URL.

Navigations from that same page to http://not.example.com/ would send no Referer header.

This is a user agent’s default behavior, if no policy is otherwise specified.

3.3. "same-origin"

The "same-origin" policy specifies that a full URL, stripped for use as a referrer, is sent as referrer information when making same-origin requests from a particular client.

Cross-origin requests, on the other hand, will contain no referrer information. A Referer HTTP header will not be sent.

If a document at https://example.com/page.html sets a policy of "same-origin", then navigations to https://example.com/not-page.html would send a Referer header with a value of https://example.com/page.html.

Navigations from that same page to https://not.example.com/ would send no Referer header.

3.4. "origin"

The "origin" policy specifies that only the ASCII serialization of the origin of the request client is sent as referrer information when making both same-origin requests and cross-origin requests from a particular client.

Note: The serialization of an origin looks like https://example.com. To ensure that a valid URL is sent in the `Referer` header, user agents will append a U+002F SOLIDUS ("/") character to the origin (e.g. https://example.com/).

Note: The "origin" policy causes the origin of HTTPS referrers to be sent over the network as part of unencrypted HTTP requests. The "strict-origin" policy addresses this concern.

If a document at https://example.com/page.html sets a policy of "origin", then navigations to any origin would send a Referer header with a value of https://example.com/, even to URLs that are not potentially trustworthy URL.

3.5. "strict-origin"

The "strict-origin" policy sends the ASCII serialization of the origin of the request client when making requests:

Requests from TLS-protected request clients to non- potentially trustworthy URLs, on the other hand, will contain no referrer information. A Referer HTTP header will not be sent.

If a document at https://example.com/page.html sets a policy of "strict-origin", then navigations to https://not.example.com would send a Referer header with a value of https://example.com/.

Navigations from that same page to http://not.example.com would send no Referer header.

If a document at http://example.com/page.html sets a policy of "strict-origin", then navigations to http://not.example.com or https://example.com would send a Referer header with a value of http://example.com/.

3.6. "origin-when-cross-origin"

The "origin-when-cross-origin" policy specifies that a full URL, stripped for use as a referrer, is sent as referrer information when making same-origin requests from a particular request client, and only the ASCII serialization of the origin of the request client is sent as referrer information when making cross-origin requests from a particular client.

Note: For the "origin-when-cross-origin" policy, we also consider protocol upgrades, e.g. requests from http://example.com/ to https://example.com/, to be cross-origin requests.

Note: The "origin-when-cross-origin" policy causes the origin of HTTPS referrers to be sent over the network as part of unencrypted HTTP requests. The "strict-origin-when-cross-origin" policy addresses this concern.

If a document at https://example.com/page.html sets a policy of "origin-when-cross-origin", then navigations to https://example.com/not-page.html would send a Referer header with a value of https://example.com/page.html.

Navigations from that same page to https://not.example.com/ would send a Referer header with a value of https://example.com/, even to URLs that are not potentially trustworthy URLs.

3.7. "strict-origin-when-cross-origin"

The "strict-origin-when-cross-origin" policy specifies that a full URL, stripped for use as a referrer, is sent as referrer information when making same-origin requests from a particular request client, and only the ASCII serialization of the origin of the request client when making cross-origin requests:

Requests from TLS-protected clients to non- potentially trustworthy URLs, on the other hand, will contain no referrer information. A Referer HTTP header will not be sent.

If a document at https://example.com/page.html sets a policy of "strict-origin-when-cross-origin", then navigations to https://example.com/not-page.html would send a Referer header with a value of https://example.com/page.html.

Navigations from that same page to https://not.example.com/ would send a Referer header with a value of https://example.com/.

Navigations from that same page to http://not.example.com/ would send no Referer header.

3.8. "unsafe-url"

The "unsafe-url" policy specifies that a full URL, stripped for use as a referrer, is sent along with both cross-origin requests and same-origin requests made from a particular client.

If a document at https://example.com/sekrit.html sets a policy of "unsafe-url", then navigations to http://not.example.com/ (and every other origin) would send a Referer HTTP header with a value of https://example.com/sekrit.html.

Note: The policy’s name doesn’t lie; it is unsafe. This policy will leak origins and paths from TLS-protected resources to insecure origins. Carefully consider the impact of setting such a policy for potentially sensitive documents.

3.9. The empty string

The empty string "" corresponds to no referrer policy, causing a fallback to a referrer policy defined elsewhere, or in the case where no such higher-level policy is available, defaulting to "no-referrer-when-downgrade". This defaulting happens in the §8.3 Determine request’s Referrer algorithm.

Given a HTML a element without any declared referrerpolicy attribute, its referrer policy is the empty string. Thus, navigation requests initiated by clicking on that a element will be sent with the referrer policy of the a element’s node document. If that Document has the empty string as its referrer policy, the §8.3 Determine request’s Referrer algorithm will treat the empty string the same as "no-referrer-when-downgrade".

4. Referrer Policy Delivery

A request’s referrer policy is delivered in one of five ways:

4.1. Delivery via Referrer-Policy header

The Referrer-Policy HTTP header specifies the referrer policy that the user agent applies when determining what referrer information should be included with requests made, and with browsing contexts created from the context of the protected resource.

The syntax for the name and value of the header are described by the following ABNF grammar. ABNF is defined in [RFC5234], and the #rule ABNF extension used below is defined in Section 7 of [RFC7230].

"Referrer-Policy:" 1#(policy-token / extension-token)
policy-token = "no-referrer" / "no-referrer-when-downgrade" / "strict-origin" / "strict-origin-when-cross-origin" / "same-origin" / "origin" / "origin-when-cross-origin" / "unsafe-url"
extension-token = 1*( ALPHA / "-" )

Note: The header name does not share the HTTP Referer header’s misspelling.

Note: The purpose of extension-token is so that browsers do not fail to parse the entire header field if it includes an unknown policy value. §11.1 Unknown Policy Values describes in greater detail how new policy values can be deployed.

Note: The quotes in the ABNF above are used to indicate literal strings. Referrer-Policy header values should not be quoted.

§5 Integration with Fetch and §6 Integration with HTML describe how the Referrer-Policy header is processed.

4.1.1. Usage

This section is not normative.

A protected resource can prevent referrer leakage by specifying no-referrer as the value of its Referrer-Policy header:

Referrer-Policy: no-referrer

This will cause all requests made from the protected resource’s context to have an empty Referer [sic] header.

4.2. Delivery via meta

This section is not normative.

The HTML Standard defines the referrer keyword for the meta element, which allows setting the referrer policy via markup.

4.3. Delivery via a referrerpolicy content attribute

This section is not normative.

The HTML Standard defines the concept of referrer policy attributes which applies to several of its elements, for example:

<a href="http://example.com" referrerpolicy="origin">

4.4. Nested browsing contexts

This section is not normative.

The HTML Standard and Fetch Standard define how nested browsing contexts that are not created from responses, such as iframe elements with their srcdoc attribute set, or created from a blob URL, inherit their referrer policy from the creator browsing context or blob URL.

5. Integration with Fetch

This section is not normative.

The Fetch specification calls out to §8.2 Set request’s referrer policy on redirect before Step 13 of the HTTP-redirect fetch, so that a request’s referrer policy can be updated before following a redirect.

The Fetch specification calls out to §8.3 Determine request’s Referrer as Step 8 of the Main fetch algorithm, and uses the result to set the request’s referrer property. Fetch is responsible for serializing the URL provided, and setting the `Referer` header on request.

6. Integration with HTML

This section is not normative.

The HTML Standard determines the referrer policy of any response received during navigation or while running a worker, and uses the result to set the resulting Document or WorkerGlobalScope's referrer policy. This is later used by the corresponding environment settings object, which serves as a request client for fetches it initiates.

Note: W3C HTML5 does not define the referrerpolicy content attributes, or referrerPolicy IDL attributes, or the referrer keyword for meta, or the integration with navigation or running a worker. For this spec to make sense with W3C HTML5, those would need to be copied from [HTML].

7. Integration with CSS

The CSS Standard does not specify how it fetches resources referenced from stylesheets. However, implementations should be sure to set the referrer-related properties of any requests initiated by stylesheets as follows:

  1. If a CSS style sheet is responsible for the request, and its location is non-null, set the referrer to its location, and the referrer policy to its referrer policy.

    This requires that CSS style sheets process `Referrer-Policy` headers, and store a referrer policy in the same way that Documents do.

  2. If a CSS style sheet with a null location is responsible for the request, set the referrer to its owner node’s node document’s URL, and the referrer policy to its owner node’s node document’s referrer policy.
  3. Otherwise, a CSS declaration block that was created by the embedder is responsible for the request - either from parsing of an element’s style attribute, or to implement an presentational hint for an element. We assume that in this case the CSS declaration block’s owner node points to that element, and set the referrer to the block’s owner node’s node document’s URL, and the referrer policy to the block’s owner node’s node document’s referrer policy.

Note: Both the value of the request’s referrer and referrer policy are set based on the values at the time a given request is created. If a document’s referrer policy changes during its lifetime, the policy associated with inline stylesheet requests will also change.

8. Algorithms

8.1. Parse a referrer policy from a Referrer-Policy header

Given a response response, the following steps return a referrer policy according to response’s `Referrer-Policy` header:

  1. Let policy-tokens be the result of extracting header list values given `Referrer-Policy` and response’s header list.
  2. Let policy be the empty string.
  3. For each token in policy-tokens, if token is a referrer policy and token is not the empty string, then set policy to token.

    Note: This algorithm loops over multiple policy values to allow deployment of new policy values with fallbacks for older user agents, as described in §11.1 Unknown Policy Values.

  4. Return policy.

8.2. Set request’s referrer policy on redirect

Given a request request and a response actualResponse, this algorithm updates request’s associated referrer policy according to the Referrer-Policy header (if any) in actualResponse.

  1. Let policy be the result of executing §8.1 Parse a referrer policy from a Referrer-Policy header on actualResponse.
  2. If policy is not the empty string, then set request’s associated referrer policy to policy.

8.3. Determine request’s Referrer

Given a request request, we can determine the correct referrer information to send by examining the referrer policy associated with it, as detailed in the following steps, which return either no referrer or a URL:

  1. Let policy be request’s associated referrer policy.
  2. Let environment be request’s client.
  3. Switch on request’s referrer:
    "client"
    1. If environment’s global object is a Window object, then
      1. Let document be the associated Document of environment’s global object.
      2. If document’s origin is an opaque origin, return no referrer.
      3. While document is an iframe srcdoc document, let document be document’s browsing context’s browsing context container’s node document.
      4. Let referrerSource be document’s URL.
    2. Otherwise, let referrerSource be environment’s creation URL.
    a URL
    Let referrerSource be request’s referrer.

    Note: If request’s referrer is "no-referrer", Fetch will not call into this algorithm.

  4. Let referrerURL be the result of stripping referrerSource for use as a referrer.
  5. Let referrerOrigin be the result of stripping referrerSource for use as a referrer, with the origin-only flag set to true.
  6. Execute the statements corresponding to the value of policy:
    "no-referrer"
    Return no referrer
    "origin"
    Return referrerOrigin
    "unsafe-url"
    Return referrerURL.
    "strict-origin"
    1. If environment is not null:
      1. If environment is TLS-protected and request’s current URL is not a potentially trustworthy URL, then return no referrer.
    2. Return referrerOrigin.
    "strict-origin-when-cross-origin"
    1. If request is a same-origin request, then return referrerURL.
    2. If environment is not null:
      1. If environment is TLS-protected and request’s current URL is not a potentially trustworthy URL
        1. Return no referrer.
    3. Return referrerOrigin.
    "same-origin"
    1. If request is a same-origin request, then return referrerURL.
    2. Otherwise, return no referrer.
    "origin-when-cross-origin"
    1. If request is a cross-origin request, then return referrerOrigin.
    2. Otherwise, return referrerURL.
    "no-referrer-when-downgrade"
    1. If environment is not null:
      1. If environment is TLS-protected and request’s current URL is not a potentially trustworthy URL, then return no referrer.
    2. Return referrerURL.

    Note: Fetch will ensure request’s referrer policy is not the empty string before calling this algorithm.

8.4. Strip url for use as a referrer

Certain portions of URLs must not be included when sending a URL as the value of a `Referer` header: a URLs fragment, username, and password components must be stripped from the URL before it’s sent out. This algorithm accepts a origin-only flag, which defaults to false. If set to true, the algorithm will additionally remove the URL’s path and query components, leaving only the scheme, host, and port.

  1. If url is null, return no referrer.
  2. If url’s scheme is a local scheme, then return no referrer.
  3. Set url’s username to the empty string.
  4. Set url’s password to null.
  5. Set url’s fragment to null.
  6. If the origin-only flag is true, then:
    1. Set url’s path to null.
    2. Set url’s query to null.
  7. Return url.

9. Privacy Considerations

9.1. User Controls

Nothing in this specification should be interpreted as preventing user agents from offering options to users which would change the information sent out via a `Referer` header. For instance, user agents MAY allow users to suppress the referrer header entirely, regardless of the active referrer policy on a page.

10. Security Considerations

10.1. Information Leakage

The referrer policies "origin", "origin-when-cross-origin" and "unsafe-url" might leak the origin and the URL of a secure site respectively via insecure transport.

Those three policies are included in the spec nevertheless to lower the friction of sites adopting secure transport.

Authors wanting to ensure that they do not leak any more information than the default policy should instead use the policy states "same-origin", "strict-origin", "strict-origin-when-cross-origin" or "no-referrer".

10.2. Downgrade to less strict policies

The spec does not forbid downgrading to less strict policies, e.g., from "no-referrer" to "unsafe-url".

On the one hand, it is not clear which policy is more strict for all possible pairs of policies: While "no-referrer-when-downgrade" will not leak any information over insecure transport, and "origin" will, the latter reveals less information across cross-origin navigations.

On the other hand, allowing for setting less strict policies enables authors to define safe fallbacks as described in §11.1 Unknown Policy Values.

11. Authoring Considerations

11.1. Unknown Policy Values

As described in §8.1 Parse a referrer policy from a Referrer-Policy header and in the meta referrer algorithm, unknown policy values will be ignored, and when multiple sources specify a referrer policy, the value of the latest one will be used. This makes it possible to deploy new policy values.

Suppose older user agents don’t understand the "unsafe-url" policy. A site can specify an "origin" policy followed by an "unsafe-url" policy: older user agents will ignore the unknown "unsafe-url" value and use "origin", while newer user agents will use "unsafe-url" because it is the last to be processed.
To specify multiple policy values in the Referrer-Policy header, a site can send multiple Referrer-Policy headers:
Referrer-Policy: no-referrer
Referrer-Policy: unsafe-url

or, equivalently, multiple comma-separated header values:

Referrer-Policy: no-referrer,unsafe-url

This behavior does not, however, apply to the referrerpolicy attribute. Authors may dynamically set and get the referrerpolicy attribute to detect whether a particular policy value is supported.

12. Acknowledgements

This specification is based in large part on Adam Barth and Jochen Eisinger’s Meta referrer document.

Conformance

Document conventions

Conformance requirements are expressed with a combination of descriptive assertions and RFC 2119 terminology. The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in the normative parts of this document are to be interpreted as described in RFC 2119. However, for readability, these words do not appear in all uppercase letters in this specification.

All of the text of this specification is normative except sections explicitly marked as non-normative, examples, and notes. [RFC2119]

Examples in this specification are introduced with the words “for example” or are set apart from the normative text with class="example", like this:

This is an example of an informative example.

Informative notes begin with the word “Note” and are set apart from the normative text with class="note", like this:

Note, this is an informative note.

Conformant Algorithms

Requirements phrased in the imperative as part of algorithms (such as "strip any leading space characters" or "return false and abort these steps") are to be interpreted with the meaning of the key word ("must", "should", "may", etc) used in introducing the algorithm.

Conformance requirements phrased as algorithms or specific steps can be implemented in any manner, so long as the end result is equivalent. In particular, the algorithms defined in this specification are intended to be easy to understand and are not intended to be performant. Implementers are encouraged to optimize.

<script src="https://www.w3.org/scripts/TR/2016/fixup.js"></script>

Index

Terms defined by this specification

Terms defined by reference

References

Normative References

[CSSOM-1]
Simon Pieters; Glenn Adams. CSS Object Model (CSSOM). 17 March 2016. WD. URL: https://www.w3.org/TR/cssom-1/
[DOM]
Anne van Kesteren. DOM Standard. Living Standard. URL: https://dom.spec.whatwg.org/
[FETCH]
Anne van Kesteren. Fetch. Living Standard. URL: http://fetch.spec.whatwg.org/
[HTML]
Anne van Kesteren; et al. HTML Standard. Living Standard. URL: https://html.spec.whatwg.org/multipage/
[RFC2119]
S. Bradner. Key words for use in RFCs to Indicate Requirement Levels. March 1997. Best Current Practice. URL: https://tools.ietf.org/html/rfc2119
[RFC5234]
D. Crocker, Ed.; P. Overell. Augmented BNF for Syntax Specifications: ABNF. January 2008. Internet Standard. URL: https://tools.ietf.org/html/rfc5234
[RFC7230]
R. Fielding, Ed.; J. Reschke, Ed.. Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing. June 2014. Proposed Standard. URL: https://tools.ietf.org/html/rfc7230
[RFC7231]
Roy T. Fielding; Julian F. Reschke. HTTP/1.1 Semantics and Content. RFC. URL: http://www.ietf.org/rfc/rfc7231.txt
[SECURE-CONTEXTS]
Mike West. Secure Contexts. 15 September 2016. CR. URL: https://www.w3.org/TR/secure-contexts/
[URL]
Anne van Kesteren. URL Standard. Living Standard. URL: https://url.spec.whatwg.org/
[WSC-UI]
Thomas Roessler; Anil Saldhana. Web Security Context: User Interface Guidelines. 12 August 2010. REC. URL: https://www.w3.org/TR/wsc-ui/

Informative References

[CAPABILITY-URLS]
Jenni Tennison. Capability URLs. WD. URL: http://www.w3.org/TR/capability-urls/

IDL Index

enum ReferrerPolicy {
  "",
  "no-referrer",
  "no-referrer-when-downgrade",
  "same-origin",
  "origin",
  "strict-origin",
  "origin-when-cross-origin",
  "strict-origin-when-cross-origin",
  "unsafe-url"
};

Issues Index

This requires that CSS style sheets process `Referrer-Policy` headers, and store a referrer policy in the same way that Documents do.
#same-origin-requestReferenced in: #cross-origin-requestReferenced in: #referrer-policyReferenced in: #referrer-policy-no-referrerReferenced in: #referrer-policy-no-referrer-when-downgradeReferenced in: #referrer-policy-same-originReferenced in: #referrer-policy-originReferenced in: #referrer-policy-strict-originReferenced in: #referrer-policy-origin-when-cross-originReferenced in: #referrer-policy-strict-origin-when-cross-originReferenced in: #referrer-policy-unsafe-urlReferenced in: #referrer-policy-header-dfnReferenced in: #grammardef-policy-tokenReferenced in: #grammardef-extension-tokenReferenced in: #cssstylesheet-referrer-policyReferenced in: #set-requests-referrer-policy-on-redirectReferenced in: #determine-requests-referrerReferenced in: #origin-only-flagReferenced in:

notepad-plus-plus

About
Notepad++ is a free (as in "free speech" and also as in "free beer") source code editor and Notepad replacement that supports several languages. Running in the MS Windows environment, its use is governed by GPL License.

Based on the powerful editing component Scintilla, Notepad++ is written in C++ and uses pure Win32 API and STL which ensures a higher execution speed and smaller program size. By optimizing as many routines as possible without losing user friendliness, Notepad++ is trying to reduce the world carbon dioxide emissions. When using less CPU power, the PC can throttle down and reduce power consumption, resulting in a greener environment.
notepad4ever
You're encouraged to translate Notepad++ into your native language if there's not already a translation present in the Binary Translations page.

I hope you enjoy Notepad++ as much as I enjoy coding it.

tabs-container

--   |     |   |     |
  |
  |     |

  |

  | Lorem ipsum dolor sit amet, consectetur adipiscing lorem
  | ipsum dolor sit amet, consectetur adipiscing elit.
  | Donec blandit enim libero, quis tincidunt arcu.
  | Eaque ipsa quae ab illo veritatis et quasi architecto.   |

  |     |

  | Lorem ipsum dolor sit amet, consectetur adipiscing lorem
  | ipsum dolor sit amet, consectetur adipiscing elit.
  | Donec blandit enim libero, quis tincidunt arcu.
  | Eaque ipsa quae ab illo veritatis et quasi architecto.   |

  |     |
  |

  |

  | Lorem ipsum dolor sit amet, consectetur adipiscing lorem
  | ipsum dolor sit amet, consectetur adipiscing elit.
  | Donec blandit enim libero, quis tincidunt arcu.   |

  |

  | Eaque ipsa quae ab illo veritatis et quasi architecto beatae vitae dicta.   |

  |     |
  |     |

  |     |
      |     |
  • item
  •   |
  • item
  •   |
  • item
  •   |     |
  |

  |

  |
  |

Thumbnail

Thumbnail is a term used by graphic designers and photographers for a small image representation of a larger image, usually intended to make it easier and faster to look at or manage a group of larger images.
youtube-thumbnail-size-1

@samuelbetio has invited you to collaborate

@samuelbetio has invited you to collaborate on the samuelbetio/celestino repository


You can accept or decline this invitation. You can also head over to https://github.com/samuelbetio/celestino to check out the repository or visit @samuelbetio to learn a bit more about them.

accept-logo

Note: This invitation was intended for [email protected]. If you were not expecting this invitation, you can ignore this email. If @samuelbetio is sending you too many emails, you can block them or report abuse.


Getting a 404 error? Make sure you’re signed in as @lubgubanrica.

Button not working? Copy and paste this link into your browser:
https://github.com/samuelbetio/celestino/invitations

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.