CSP: fenced-frame-src
{{HTTPSidebar}}
{{SeeCompatTable}}
The HTTP {{HTTPHeader("Content-Security-Policy")}}
(CSP)
fenced-frame-src
directive specifies valid sources for nested browsing contexts loaded into {{HTMLElement("fencedframe")}}
elements.
CSP version | 1 |
---|---|
Directive type | `{{Glossary("Fetch directive")}}` |
Fallback | If this directive is absent, the user agent will look for the `{{CSP("frame-src")}}` directive (which falls back to the `{{CSP("child-src")}}` directive). |
Syntax
One or more sources can be allowed for the fenced-frame-src
policy:
Content-Security-Policy: fenced-frame-src <source>;
Content-Security-Policy: fenced-frame-src <source> <source>;
A space-separated list of source expression values. Resources of this type may be loaded if they match any of the given source expressions. For this directive, the following source expression values are applicable:
- The
<host-source>
value"https:"
- The
<scheme-source>
value"https:"
- The string
"*"
Examples
Violation cases
Given this CSP header:
Content-Security-Policy: fenced-frame-src https://example.com/
The following sources will not load in a fenced frame:
https://not-example.com/
(domain doesn’t match)https://example.org/
(TLD doesn’t match)
Specifications
{{Specifications}}
Browser compatibility
{{Compat}}
See also
- Fenced Frame API
{{HTMLElement("fencedframe")}}
{{HTTPHeader("Content-Security-Policy")}}