From e1ba93217506c754efb52ff8e84cd7314e091211 Mon Sep 17 00:00:00 2001 From: Brian Banerjee Date: Fri, 16 Jan 2026 05:52:16 -0700 Subject: [PATCH 1/4] Fix syntax of example in Permissions-Policy: compute-pressure (#42793) Fix syntax of Permissions-Policy: compute-pressure --- .../headers/permissions-policy/compute-pressure/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/files/en-us/web/http/reference/headers/permissions-policy/compute-pressure/index.md b/files/en-us/web/http/reference/headers/permissions-policy/compute-pressure/index.md index 1bfe48322ace51c..e046f4380f8f5ed 100644 --- a/files/en-us/web/http/reference/headers/permissions-policy/compute-pressure/index.md +++ b/files/en-us/web/http/reference/headers/permissions-policy/compute-pressure/index.md @@ -41,7 +41,7 @@ Third-party usage can be selectively enabled using the `allow` attribute on {{HT This HTTP response header disables compute pressure completely: ```http -Permissions-Policy: {"compute-pressure": []} +Permissions-Policy: compute-pressure=() ``` ## Specifications From c4614bbe613c54975666cf8897ffc2a2ea7f8040 Mon Sep 17 00:00:00 2001 From: Manoj-1 <162041639+Manoj-eerabattini-1@users.noreply.github.com> Date: Fri, 16 Jan 2026 19:36:17 +0530 Subject: [PATCH 2/4] Fix incorrect wording of min-height behavior (#42792) * Fix incorrect description of min-height behavior * Fix flex-basis example height accuracy and wording Updated examples and explanations for flex-basis in CSS documentation. --- .../web/css/reference/properties/flex-basis/index.md | 12 +++++------- 1 file changed, 5 insertions(+), 7 deletions(-) diff --git a/files/en-us/web/css/reference/properties/flex-basis/index.md b/files/en-us/web/css/reference/properties/flex-basis/index.md index e6ff5713bc5c264..ac61b3549493bd0 100644 --- a/files/en-us/web/css/reference/properties/flex-basis/index.md +++ b/files/en-us/web/css/reference/properties/flex-basis/index.md @@ -217,22 +217,20 @@ We include two same-structure flex containers, which will be styled similarly ex
heading
- flex-basis: 0; -
+
flex-basis: 0;
heading
- flex-basis: 0%; -
+
flex-basis: 0%;
``` #### CSS -We style the containers as inline flex containers that will appear side by side to better enable comparing them. We set the `flex-direction` to `column`. The first container's flex items have a `flex-basis` value of `0`, while the second container's flex items have a `flex-basis` value of `0%`. Neither the flex containers nor their flex items have a height explicitly set, but the heights of `section` elements cannot exceed `200px` and their children have a height of `300px`. +We style the containers as inline flex containers that will appear side by side to better enable comparing them. We set the `flex-direction` to `column`. The first container's flex items have a `flex-basis` value of `0`, while the second container's flex items have a `flex-basis` value of `0%`. Neither the flex containers nor their flex items have a height explicitly set; however, the heights of `section` elements must be at least `200px`, and their children have a height of `300px`. ```css .container { @@ -245,7 +243,7 @@ We style the containers as inline flex containers that will appear side by side } section { - border: 1px solid red; + outline: 1px solid red; overflow: auto; min-height: 200px; @@ -268,7 +266,7 @@ section { {{EmbedLiveSample('flex_basis_0_vs_0', '100%', '400')}} -In the first container, with `flex-basis: 0`, the `
` element has an initial main size of zero, and it grows to the `200px` height limit. In the second container, with `flex-basis: 0%`, the `
` element has an initial main size of `300px` because, as the flex container doesn't have a set height, the percentage flex-basis values resolve to the [`content`](#content) value. +In the first container, with `flex-basis: 0`, the `
` element has an initial main size of zero, and it grows to the `200px` minimum height. In the second container, with `flex-basis: 0%`, the `
` element has an initial main size of `300px` because, as the flex container doesn't have a set height, the percentage flex-basis values resolve to the [`content`](#content) value. ## Specifications From 1a2cb1002680a7f2e82246787ff05c5bad519e18 Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Fri, 16 Jan 2026 14:07:49 +0000 Subject: [PATCH 3/4] chore(deps): bump @mdn/fred from 2.0.0 to 2.0.1 (#42796) --- package-lock.json | 111 ++++++++++++++++++++++++---------------------- package.json | 2 +- 2 files changed, 60 insertions(+), 53 deletions(-) diff --git a/package-lock.json b/package-lock.json index 2102eb95becf3b5..b323655e09021fd 100644 --- a/package-lock.json +++ b/package-lock.json @@ -10,7 +10,7 @@ "license": "SEE LICENSE IN LICENSE.md", "dependencies": { "@apideck/better-ajv-errors": "^0.3.6", - "@mdn/fred": "2.0.0", + "@mdn/fred": "2.0.1", "@octokit/rest": "^22.0.1", "ajv": "^8.17.1", "ajv-formats": "^3.0.1", @@ -211,9 +211,9 @@ } }, "node_modules/@codemirror/state": { - "version": "6.5.2", - "resolved": "https://registry.npmjs.org/@codemirror/state/-/state-6.5.2.tgz", - "integrity": "sha512-FVqsPqtPWKVVL3dPSxy8wEF/ymIEuVzF1PK3VbUgrxXpJUSHQWWZz4JMToquRxnkw+36LTamCZG2iua2Ptq0fA==", + "version": "6.5.4", + "resolved": "https://registry.npmjs.org/@codemirror/state/-/state-6.5.4.tgz", + "integrity": "sha512-8y7xqG/hpB53l25CIoit9/ngxdfoG+fx+V3SHBrinnhOtLvKHRyAJJuHzkWrR4YXXLX8eXBsejgAAxHUOdW1yw==", "license": "MIT", "dependencies": { "@marijn/find-cluster-break": "^1.0.0" @@ -955,16 +955,15 @@ } }, "node_modules/@lit-labs/ssr": { - "version": "3.3.1", - "resolved": "https://registry.npmjs.org/@lit-labs/ssr/-/ssr-3.3.1.tgz", - "integrity": "sha512-JlF1PempxvzrGEpRFrF+Ki0MHzR3HA51SK8Zv0cFpW9p0bPW4k0FeCwrElCu371UEpXF7RcaE2wgYaE1az0XKg==", + "version": "4.0.0", + "resolved": "https://registry.npmjs.org/@lit-labs/ssr/-/ssr-4.0.0.tgz", + "integrity": "sha512-pODr+t7cZVIrCRLuSLuWAACDnztEk5IrRFwFsbxyAyWcP2XP8aKuUZdVM/biXqxvIyHyCKtNZ92Gdcr+pjA5BQ==", "license": "BSD-3-Clause", "dependencies": { "@lit-labs/ssr-client": "^1.1.7", - "@lit-labs/ssr-dom-shim": "^1.3.0", + "@lit-labs/ssr-dom-shim": "^1.5.0", "@lit/reactive-element": "^2.0.4", "@parse5/tools": "^0.3.0", - "@types/node": "^16.0.0", "enhanced-resolve": "^5.10.0", "lit": "^3.1.2", "lit-element": "^4.0.4", @@ -974,12 +973,20 @@ }, "engines": { "node": ">=13.9.0" + }, + "peerDependencies": { + "@types/node": ">=20.0.0 <25.0.0" + }, + "peerDependenciesMeta": { + "@types/node": { + "optional": true + } } }, "node_modules/@lit-labs/ssr-client": { - "version": "1.1.7", - "resolved": "https://registry.npmjs.org/@lit-labs/ssr-client/-/ssr-client-1.1.7.tgz", - "integrity": "sha512-VvqhY/iif3FHrlhkzEPsuX/7h/NqnfxLwVf0p8ghNIlKegRyRqgeaJevZ57s/u/LiFyKgqksRP5n+LmNvpxN+A==", + "version": "1.1.8", + "resolved": "https://registry.npmjs.org/@lit-labs/ssr-client/-/ssr-client-1.1.8.tgz", + "integrity": "sha512-PjGh81oKsoI64m3IDjTqqjhC7dr2uC/o0jrllUb5gRAyp/RlAHxapgJrjq9kWz97faCHLQ8jUlTi6tGm+8fgyA==", "license": "BSD-3-Clause", "dependencies": { "@lit/reactive-element": "^2.0.4", @@ -988,17 +995,11 @@ } }, "node_modules/@lit-labs/ssr-dom-shim": { - "version": "1.3.0", - "resolved": "https://registry.npmjs.org/@lit-labs/ssr-dom-shim/-/ssr-dom-shim-1.3.0.tgz", - "integrity": "sha512-nQIWonJ6eFAvUUrSlwyHDm/aE8PBDu5kRpL0vHMg6K8fK3Diq1xdPjTnsJSwxABhaZ+5eBi1btQB5ShUTKo4nQ==", + "version": "1.5.1", + "resolved": "https://registry.npmjs.org/@lit-labs/ssr-dom-shim/-/ssr-dom-shim-1.5.1.tgz", + "integrity": "sha512-Aou5UdlSpr5whQe8AA/bZG0jMj96CoJIWbGfZ91qieWu5AWUMKw8VR/pAkQkJYvBNhmCcWnZlyyk5oze8JIqYA==", "license": "BSD-3-Clause" }, - "node_modules/@lit-labs/ssr/node_modules/@types/node": { - "version": "16.18.126", - "resolved": "https://registry.npmjs.org/@types/node/-/node-16.18.126.tgz", - "integrity": "sha512-OTcgaiwfGFBKacvfwuHzzn1KLxH/er8mluiy8/uM3sGXHaRe73RrSIj01jow9t4kJEW633Ov+cOexXeiApTyAw==", - "license": "MIT" - }, "node_modules/@lit/reactive-element": { "version": "2.1.0", "resolved": "https://registry.npmjs.org/@lit/reactive-element/-/reactive-element-2.1.0.tgz", @@ -1024,22 +1025,22 @@ "license": "MIT" }, "node_modules/@mdn/fred": { - "version": "2.0.0", - "resolved": "https://registry.npmjs.org/@mdn/fred/-/fred-2.0.0.tgz", - "integrity": "sha512-rD+TQh/6cYNeY8g/+rbrFao3yYdriiF1wo8+ut+vyFmh4UJzQp2bFN/QEwo7XRUHGIqDQcgyVXAedspEBlRrcA==", + "version": "2.0.1", + "resolved": "https://registry.npmjs.org/@mdn/fred/-/fred-2.0.1.tgz", + "integrity": "sha512-uPi5V6BcuWXKoqy0Wpgp8TxrBUlAFCpr6cfccR7oagPPHfm9iMnTLRvos2iQC799wPNvlk3wq1mFn6u5pPh8Qw==", "license": "MPL-2.0", "dependencies": { "@codemirror/lang-css": "^6.3.1", "@codemirror/lang-html": "^6.4.11", "@codemirror/lang-javascript": "^6.2.3", "@codemirror/lang-wast": "^6.0.2", - "@codemirror/state": "^6.5.2", + "@codemirror/state": "^6.5.4", "@codemirror/theme-one-dark": "^6.1.2", "@fluent/bundle": "^0.19.0", - "@lit-labs/ssr": "^3.3.1", - "@lit-labs/ssr-client": "^1.1.7", + "@lit-labs/ssr": "^4.0.0", + "@lit-labs/ssr-client": "^1.1.8", "@lit/task": "^1.0.3", - "@mdn/rari": "0.2.8", + "@mdn/rari": "0.2.9", "@mdn/watify": "^1.1.7", "@mozilla/glean": "^5.0.7", "codemirror": "^6.0.1", @@ -1051,8 +1052,8 @@ "he": "^1.2.0", "http-proxy-middleware": "^3.0.3", "insane": "^2.6.2", - "lit": "^3.3.1", - "lit-html": "^3.3.1", + "lit": "^3.3.2", + "lit-html": "^3.3.2", "open-editor": "^6.0.0", "prism-svelte": "^0.5.0", "prismjs": "^1.29.0", @@ -1067,9 +1068,9 @@ } }, "node_modules/@mdn/rari": { - "version": "0.2.8", - "resolved": "https://registry.npmjs.org/@mdn/rari/-/rari-0.2.8.tgz", - "integrity": "sha512-+tgM8MLStIlEPxmHjLSbEYIosSu2odGe48gPL2QLLYSoQtEjdiyFTh5stcbYZiG7Q2yKyc/wrl+GpQlUJH1tjA==", + "version": "0.2.9", + "resolved": "https://registry.npmjs.org/@mdn/rari/-/rari-0.2.9.tgz", + "integrity": "sha512-I7yqUnL4d3rvI81ulkb0Y9nSj9cf4H0waZYIFM+j6gyL1t21Dsm52JW1Y7ryQYiem4od81nSZOw0qzgQ8uYmHw==", "hasInstallScript": true, "license": "MPL-2.0", "dependencies": { @@ -1429,9 +1430,9 @@ "license": "MIT" }, "node_modules/@types/lodash": { - "version": "4.17.21", - "resolved": "https://registry.npmjs.org/@types/lodash/-/lodash-4.17.21.tgz", - "integrity": "sha512-FOvQ0YPD5NOfPgMzJihoT+Za5pdkDJWcbpuj1DjaKZIr/gxodQjY/uWEFlTNqW2ugXHUiL8lRQgw63dzKHZdeQ==", + "version": "4.17.23", + "resolved": "https://registry.npmjs.org/@types/lodash/-/lodash-4.17.23.tgz", + "integrity": "sha512-RDvF6wTulMPjrNdCoYRC8gNR880JNGT8uB+REUpC2Ns4pRqQJhGz90wh7rgdXDPpCczF3VGktDuFGVnz8zP7HA==", "license": "MIT" }, "node_modules/@types/ms": { @@ -1446,6 +1447,7 @@ "resolved": "https://registry.npmjs.org/@types/node/-/node-22.13.1.tgz", "integrity": "sha512-jK8uzQlrvXqEU91UxiK5J7pKHyzgnI1Qnl0QDHIgVGuolJhRb9EEl28Cj9b3rGR8B2lhFCtvIm5os8lFnO/1Ew==", "license": "MIT", + "peer": true, "dependencies": { "undici-types": "~6.20.0" } @@ -3661,9 +3663,9 @@ } }, "node_modules/enhanced-resolve": { - "version": "5.18.2", - "resolved": "https://registry.npmjs.org/enhanced-resolve/-/enhanced-resolve-5.18.2.tgz", - "integrity": "sha512-6Jw4sE1maoRJo3q8MsSIn2onJFbLTOjY9hlx4DZXmOKvLRd1Ok2kXmAGXaafL2+ijsJZ1ClYbl/pmqr9+k4iUQ==", + "version": "5.18.4", + "resolved": "https://registry.npmjs.org/enhanced-resolve/-/enhanced-resolve-5.18.4.tgz", + "integrity": "sha512-LgQMM4WXU3QI+SYgEc2liRgznaD5ojbmY3sb8LxyguVkIg5FxdpTkvk72te2R38/TGKxH634oLxXRGY6d7AP+Q==", "license": "MIT", "dependencies": { "graceful-fs": "^4.2.4", @@ -6306,9 +6308,9 @@ } }, "node_modules/lit": { - "version": "3.3.1", - "resolved": "https://registry.npmjs.org/lit/-/lit-3.3.1.tgz", - "integrity": "sha512-Ksr/8L3PTapbdXJCk+EJVB78jDodUMaP54gD24W186zGRARvwrsPfS60wae/SSCTCNZVPd1chXqio1qHQmu4NA==", + "version": "3.3.2", + "resolved": "https://registry.npmjs.org/lit/-/lit-3.3.2.tgz", + "integrity": "sha512-NF9zbsP79l4ao2SNrH3NkfmFgN/hBYSQo90saIVI1o5GpjAdCPVstVzO1MrLOakHoEhYkrtRjPK6Ob521aoYWQ==", "license": "BSD-3-Clause", "dependencies": { "@lit/reactive-element": "^2.1.0", @@ -6317,20 +6319,20 @@ } }, "node_modules/lit-element": { - "version": "4.2.0", - "resolved": "https://registry.npmjs.org/lit-element/-/lit-element-4.2.0.tgz", - "integrity": "sha512-MGrXJVAI5x+Bfth/pU9Kst1iWID6GHDLEzFEnyULB/sFiRLgkd8NPK/PeeXxktA3T6EIIaq8U3KcbTU5XFcP2Q==", + "version": "4.2.2", + "resolved": "https://registry.npmjs.org/lit-element/-/lit-element-4.2.2.tgz", + "integrity": "sha512-aFKhNToWxoyhkNDmWZwEva2SlQia+jfG0fjIWV//YeTaWrVnOxD89dPKfigCUspXFmjzOEUQpOkejH5Ly6sG0w==", "license": "BSD-3-Clause", "dependencies": { - "@lit-labs/ssr-dom-shim": "^1.2.0", + "@lit-labs/ssr-dom-shim": "^1.5.0", "@lit/reactive-element": "^2.1.0", "lit-html": "^3.3.0" } }, "node_modules/lit-html": { - "version": "3.3.1", - "resolved": "https://registry.npmjs.org/lit-html/-/lit-html-3.3.1.tgz", - "integrity": "sha512-S9hbyDu/vs1qNrithiNyeyv64c9yqiW9l+DBgI18fL+MTvOtWoFR0FWiyq1TxaYef5wNlpEmzlXoBlZEO+WjoA==", + "version": "3.3.2", + "resolved": "https://registry.npmjs.org/lit-html/-/lit-html-3.3.2.tgz", + "integrity": "sha512-Qy9hU88zcmaxBXcc10ZpdK7cOLXvXpRoBxERdtqV9QOrfpMZZ6pSYP91LhpPtap3sFMUiL7Tw2RImbe0Al2/kw==", "license": "BSD-3-Clause", "dependencies": { "@types/trusted-types": "^2.0.2" @@ -7275,6 +7277,7 @@ "version": "1.0.0", "resolved": "https://registry.npmjs.org/node-domexception/-/node-domexception-1.0.0.tgz", "integrity": "sha512-/jKZoMpw0F8GRwl4/eLROPA3cfcXtLApP0QzLmUT/HuPCZWyB7IY9ZrMeKw2O/nFIqPQB3PVM9aYm0F312AXDQ==", + "deprecated": "Use your platform's native DOMException instead", "funding": [ { "type": "github", @@ -9075,12 +9078,16 @@ } }, "node_modules/tapable": { - "version": "2.2.2", - "resolved": "https://registry.npmjs.org/tapable/-/tapable-2.2.2.tgz", - "integrity": "sha512-Re10+NauLTMCudc7T5WLFLAwDhQ0JWdrMK+9B2M8zR5hRExKmsRDCBA7/aV/pNJFltmBFO5BAMlQFi/vq3nKOg==", + "version": "2.3.0", + "resolved": "https://registry.npmjs.org/tapable/-/tapable-2.3.0.tgz", + "integrity": "sha512-g9ljZiwki/LfxmQADO3dEY1CbpmXT5Hm2fJ+QaGKwSXUylMybePR7/67YW7jOrrvjEgL1Fmz5kzyAjWVWLlucg==", "license": "MIT", "engines": { "node": ">=6" + }, + "funding": { + "type": "opencollective", + "url": "https://opencollective.com/webpack" } }, "node_modules/tar": { diff --git a/package.json b/package.json index 75354a65fc15de9..5d78270e230966f 100644 --- a/package.json +++ b/package.json @@ -45,7 +45,7 @@ }, "dependencies": { "@apideck/better-ajv-errors": "^0.3.6", - "@mdn/fred": "2.0.0", + "@mdn/fred": "2.0.1", "@octokit/rest": "^22.0.1", "ajv": "^8.17.1", "ajv-formats": "^3.0.1", From ba886c384e385689ce8feffacf4f7ce1d8c5e736 Mon Sep 17 00:00:00 2001 From: Onkar Khadangale <87750369+OnkarRuikar@users.noreply.github.com> Date: Fri, 16 Jan 2026 20:09:39 +0530 Subject: [PATCH 4/4] Synchronize with BCD v7.2.4 (#42789) Co-authored-by: OnkarRuikar --- files/en-us/web/api/element/index.md | 2 +- files/en-us/web/api/element/sethtml/index.md | 4 +--- .../en-us/web/api/html_sanitizer_api/index.md | 6 ++--- .../web/api/sanitizer/allowattribute/index.md | 4 +--- .../web/api/sanitizer/allowelement/index.md | 4 +--- files/en-us/web/api/sanitizer/get/index.md | 4 +--- files/en-us/web/api/sanitizer/index.md | 24 +++++++++---------- .../api/sanitizer/removeattribute/index.md | 4 +--- .../web/api/sanitizer/removeelement/index.md | 4 +--- .../web/api/sanitizer/removeunsafe/index.md | 4 +--- .../replaceelementwithchildren/index.md | 4 +--- .../web/api/sanitizer/sanitizer/index.md | 4 +--- .../web/api/sanitizer/setcomments/index.md | 4 +--- .../api/sanitizer/setdataattributes/index.md | 4 +--- files/en-us/web/api/sanitizerconfig/index.md | 4 +--- .../at-rules/@font-face/font-stretch/index.md | 4 ---- .../properties/font-stretch/index.md | 4 ---- 17 files changed, 26 insertions(+), 62 deletions(-) diff --git a/files/en-us/web/api/element/index.md b/files/en-us/web/api/element/index.md index cab0b93e196abe5..cb3f61181190e34 100644 --- a/files/en-us/web/api/element/index.md +++ b/files/en-us/web/api/element/index.md @@ -317,7 +317,7 @@ _`Element` inherits methods from its parents {{DOMxRef("Node")}}, and its own pa - : Sets the value of the attribute with the specified name and namespace, from the current node. - {{DOMxRef("Element.setCapture()")}} {{Non-standard_Inline}} {{Deprecated_Inline}} - : Sets up mouse event capture, redirecting all mouse events to this element. -- {{DOMxRef("Element.setHTML()")}} {{SecureContext_Inline}} {{experimental_inline}} +- {{DOMxRef("Element.setHTML()")}} {{SecureContext_Inline}} - : Parses and [sanitizes](/en-US/docs/Web/API/HTML_Sanitizer_API) a string of HTML into a document fragment, which then replaces the element's original subtree in the DOM. - {{DOMxRef("Element.setHTMLUnsafe()")}} - : Parses a string of HTML into a document fragment, without sanitization, which then replaces the element's original subtree in the DOM. The HTML string may include declarative shadow roots, which would be parsed as template elements if the HTML was set using [`Element.innerHTML`](/en-US/docs/Web/API/Element/innerHTML). diff --git a/files/en-us/web/api/element/sethtml/index.md b/files/en-us/web/api/element/sethtml/index.md index 6abf4caf467ef06..3452e203d6ca5d9 100644 --- a/files/en-us/web/api/element/sethtml/index.md +++ b/files/en-us/web/api/element/sethtml/index.md @@ -3,12 +3,10 @@ title: "Element: setHTML() method" short-title: setHTML() slug: Web/API/Element/setHTML page-type: web-api-instance-method -status: - - experimental browser-compat: api.Element.setHTML --- -{{APIRef("HTML Sanitizer API")}}{{SeeCompatTable}} +{{APIRef("HTML Sanitizer API")}} The **`setHTML()`** method of the {{domxref("Element")}} interface provides an XSS-safe method to parse and sanitize a string of HTML and insert it into the DOM as a subtree of the element. diff --git a/files/en-us/web/api/html_sanitizer_api/index.md b/files/en-us/web/api/html_sanitizer_api/index.md index 0716b1d4c881ace..50487a65fadf9d5 100644 --- a/files/en-us/web/api/html_sanitizer_api/index.md +++ b/files/en-us/web/api/html_sanitizer_api/index.md @@ -2,12 +2,10 @@ title: HTML Sanitizer API slug: Web/API/HTML_Sanitizer_API page-type: web-api-overview -status: - - experimental browser-compat: api.Sanitizer --- -{{DefaultAPISidebar("HTML Sanitizer API")}}{{SeeCompatTable}} +{{DefaultAPISidebar("HTML Sanitizer API")}} The **HTML Sanitizer API** allows developers to take strings of HTML and filter out unwanted elements, attributes, and other HTML entities when they are inserted into the DOM or a shadow DOM. @@ -219,7 +217,7 @@ They may be useful with the unsafe HTML methods and trusted types, depending on ## Interfaces -- {{domxref('Sanitizer')}} {{experimental_inline}} +- {{domxref('Sanitizer')}} - : A reusable sanitizer configuration object that defines what elements and attributes should be allowed/removed when sanitizing untrusted strings of HTML. This is used in the methods that insert strings of HTML into the DOM or Document. - {{domxref('SanitizerConfig')}} diff --git a/files/en-us/web/api/sanitizer/allowattribute/index.md b/files/en-us/web/api/sanitizer/allowattribute/index.md index e6c303fa0e7f9fd..867fd367a5490e4 100644 --- a/files/en-us/web/api/sanitizer/allowattribute/index.md +++ b/files/en-us/web/api/sanitizer/allowattribute/index.md @@ -3,12 +3,10 @@ title: "Sanitizer: allowAttribute() method" short-title: allowAttribute() slug: Web/API/Sanitizer/allowAttribute page-type: web-api-instance-method -status: - - experimental browser-compat: api.Sanitizer.allowAttribute --- -{{APIRef("HTML Sanitizer API")}}{{SeeCompatTable}} +{{APIRef("HTML Sanitizer API")}} The **`allowAttribute()`** method of the {{domxref("Sanitizer")}} interface sets an attribute to be allowed on all elements when the sanitizer is used. diff --git a/files/en-us/web/api/sanitizer/allowelement/index.md b/files/en-us/web/api/sanitizer/allowelement/index.md index 4e317163c9e6426..5b8485b6bda48f3 100644 --- a/files/en-us/web/api/sanitizer/allowelement/index.md +++ b/files/en-us/web/api/sanitizer/allowelement/index.md @@ -3,12 +3,10 @@ title: "Sanitizer: allowElement() method" short-title: allowElement() slug: Web/API/Sanitizer/allowElement page-type: web-api-instance-method -status: - - experimental browser-compat: api.Sanitizer.allowElement --- -{{APIRef("HTML Sanitizer API")}}{{SeeCompatTable}} +{{APIRef("HTML Sanitizer API")}} The **`allowElement()`** method of the {{domxref("Sanitizer")}} interface sets that the specified element is allowed in the output when the sanitizer is used. diff --git a/files/en-us/web/api/sanitizer/get/index.md b/files/en-us/web/api/sanitizer/get/index.md index 3d473042532f170..f20672e4e7fd493 100644 --- a/files/en-us/web/api/sanitizer/get/index.md +++ b/files/en-us/web/api/sanitizer/get/index.md @@ -3,12 +3,10 @@ title: "Sanitizer: get() method" short-title: get() slug: Web/API/Sanitizer/get page-type: web-api-instance-method -status: - - experimental browser-compat: api.Sanitizer.get --- -{{APIRef("HTML Sanitizer API")}}{{SeeCompatTable}} +{{APIRef("HTML Sanitizer API")}} The **`get()`** method of the {{domxref("Sanitizer")}} interface returns a {{domxref('SanitizerConfig')}} dictionary instance that represents the current `Sanitizer` configuration. diff --git a/files/en-us/web/api/sanitizer/index.md b/files/en-us/web/api/sanitizer/index.md index 89694d61a34daac..64f8cb213c0aafb 100644 --- a/files/en-us/web/api/sanitizer/index.md +++ b/files/en-us/web/api/sanitizer/index.md @@ -2,12 +2,10 @@ title: Sanitizer slug: Web/API/Sanitizer page-type: web-api-interface -status: - - experimental browser-compat: api.Sanitizer --- -{{APIRef("HTML Sanitizer API")}}{{SeeCompatTable}} +{{APIRef("HTML Sanitizer API")}} The **`Sanitizer`** interface of the [HTML Sanitizer API](/en-US/docs/Web/API/HTML_Sanitizer_API) defines a configuration object that specifies what elements, attributes and comments are allowed or should be removed when inserting strings of HTML into an {{domxref("Element")}} or {{domxref("ShadowRoot")}}, or when parsing an HTML string into a {{domxref("Document")}}. @@ -21,28 +19,28 @@ Note that `Sanitizer` is expected to be more efficient to reuse and modify when ## Constructors -- {{domxref("Sanitizer.Sanitizer", "Sanitizer()")}} {{experimental_inline}} +- {{domxref("Sanitizer.Sanitizer", "Sanitizer()")}} - : Creates and returns a `Sanitizer` object, optionally with custom sanitization behavior defined in a {{domxref('SanitizerConfig')}}. ## Instance methods -- {{domxref('Sanitizer.allowElement()')}} {{experimental_inline}} +- {{domxref('Sanitizer.allowElement()')}} - : Sets an element as allowed by the sanitizer, optionally with an array of attributes that are allowed or disallowed. -- {{domxref('Sanitizer.get()')}} {{experimental_inline}} +- {{domxref('Sanitizer.get()')}} - : Returns the current `Sanitizer` configuration as a {{domxref('SanitizerConfig')}} dictionary instance. -- {{domxref('Sanitizer.removeElement()')}} {{experimental_inline}} +- {{domxref('Sanitizer.removeElement()')}} - : Sets an element to be removed by the sanitizer. -- {{domxref('Sanitizer.removeUnsafe()')}} {{experimental_inline}} +- {{domxref('Sanitizer.removeUnsafe()')}} - : Updates the sanitizer configuration so that it will remove any XSS-unsafe HTML. -- {{domxref('Sanitizer.replaceElementWithChildren()')}} {{experimental_inline}} +- {{domxref('Sanitizer.replaceElementWithChildren()')}} - : Sets an element to be replaced by its child HTML elements. -- {{domxref('Sanitizer.allowAttribute()')}} {{experimental_inline}} +- {{domxref('Sanitizer.allowAttribute()')}} - : Sets an attribute as allowed on any element. -- {{domxref('Sanitizer.removeAttribute()')}} {{experimental_inline}} +- {{domxref('Sanitizer.removeAttribute()')}} - : Sets an attribute to be removed from any element. -- {{domxref('Sanitizer.setComments()')}} {{experimental_inline}} +- {{domxref('Sanitizer.setComments()')}} - : Sets whether comments will be allowed or removed by the sanitizer. -- {{domxref('Sanitizer.setDataAttributes()')}} {{experimental_inline}} +- {{domxref('Sanitizer.setDataAttributes()')}} - : Sets whether data attributes on elements will be allowed or removed by the sanitizer. ## Examples diff --git a/files/en-us/web/api/sanitizer/removeattribute/index.md b/files/en-us/web/api/sanitizer/removeattribute/index.md index 9654632cc989134..f4f838fd7e6c012 100644 --- a/files/en-us/web/api/sanitizer/removeattribute/index.md +++ b/files/en-us/web/api/sanitizer/removeattribute/index.md @@ -3,12 +3,10 @@ title: "Sanitizer: removeAttribute() method" short-title: removeAttribute() slug: Web/API/Sanitizer/removeAttribute page-type: web-api-instance-method -status: - - experimental browser-compat: api.Sanitizer.removeAttribute --- -{{APIRef("HTML Sanitizer API")}}{{SeeCompatTable}} +{{APIRef("HTML Sanitizer API")}} The **`removeAttribute()`** method of the {{domxref("Sanitizer")}} interface sets an attribute to be removed from all elements when the sanitizer is used. diff --git a/files/en-us/web/api/sanitizer/removeelement/index.md b/files/en-us/web/api/sanitizer/removeelement/index.md index 0d56fbbe089af69..226206993ee3e91 100644 --- a/files/en-us/web/api/sanitizer/removeelement/index.md +++ b/files/en-us/web/api/sanitizer/removeelement/index.md @@ -3,12 +3,10 @@ title: "Sanitizer: removeElement() method" short-title: removeElement() slug: Web/API/Sanitizer/removeElement page-type: web-api-instance-method -status: - - experimental browser-compat: api.Sanitizer.removeElement --- -{{APIRef("HTML Sanitizer API")}}{{SeeCompatTable}} +{{APIRef("HTML Sanitizer API")}} The **`removeElement()`** method of the {{domxref("Sanitizer")}} interface sets the specified element be removed from the output when the sanitizer is used. diff --git a/files/en-us/web/api/sanitizer/removeunsafe/index.md b/files/en-us/web/api/sanitizer/removeunsafe/index.md index 5b2013da065716b..b1d360a4062c033 100644 --- a/files/en-us/web/api/sanitizer/removeunsafe/index.md +++ b/files/en-us/web/api/sanitizer/removeunsafe/index.md @@ -3,12 +3,10 @@ title: "Sanitizer: removeUnsafe() method" short-title: removeUnsafe() slug: Web/API/Sanitizer/removeUnsafe page-type: web-api-instance-method -status: - - experimental browser-compat: api.Sanitizer.removeUnsafe --- -{{APIRef("HTML Sanitizer API")}}{{SeeCompatTable}} +{{APIRef("HTML Sanitizer API")}} The **`removeUnsafe()`** method of the {{domxref("Sanitizer")}} interface configures the sanitizer configuration so that it will remove all elements, attributes, and event handler content attributes that are considered XSS-unsafe by the browser. diff --git a/files/en-us/web/api/sanitizer/replaceelementwithchildren/index.md b/files/en-us/web/api/sanitizer/replaceelementwithchildren/index.md index 1e23f71e1a3c4ed..917ac6f3460baf2 100644 --- a/files/en-us/web/api/sanitizer/replaceelementwithchildren/index.md +++ b/files/en-us/web/api/sanitizer/replaceelementwithchildren/index.md @@ -3,12 +3,10 @@ title: "Sanitizer: replaceElementWithChildren() method" short-title: replaceElementWithChildren() slug: Web/API/Sanitizer/replaceElementWithChildren page-type: web-api-instance-method -status: - - experimental browser-compat: api.Sanitizer.replaceElementWithChildren --- -{{APIRef("HTML Sanitizer API")}}{{SeeCompatTable}} +{{APIRef("HTML Sanitizer API")}} The **`replaceElementWithChildren()`** method of the {{domxref("Sanitizer")}} interface sets an element to be replaced by its child HTML elements when the sanitizer is used. This is primarily used for stripping styles from text. diff --git a/files/en-us/web/api/sanitizer/sanitizer/index.md b/files/en-us/web/api/sanitizer/sanitizer/index.md index e1b491e0b640359..ecb1a45c8344993 100644 --- a/files/en-us/web/api/sanitizer/sanitizer/index.md +++ b/files/en-us/web/api/sanitizer/sanitizer/index.md @@ -3,12 +3,10 @@ title: "Sanitizer: Sanitizer() constructor" short-title: Sanitizer() slug: Web/API/Sanitizer/Sanitizer page-type: web-api-constructor -status: - - experimental browser-compat: api.Sanitizer.Sanitizer --- -{{APIRef("HTML Sanitizer API")}}{{SeeCompatTable}} +{{APIRef("HTML Sanitizer API")}} The **`Sanitizer()`** constructor creates a new {{domxref("Sanitizer")}} object, which can be used to filter unwanted elements and attributes from HTML or documents before they are inserted/parsed into the DOM. diff --git a/files/en-us/web/api/sanitizer/setcomments/index.md b/files/en-us/web/api/sanitizer/setcomments/index.md index 3891849bfde5d83..fd1f00bd7d50a1f 100644 --- a/files/en-us/web/api/sanitizer/setcomments/index.md +++ b/files/en-us/web/api/sanitizer/setcomments/index.md @@ -3,12 +3,10 @@ title: "Sanitizer: setComments() method" short-title: setComments() slug: Web/API/Sanitizer/setComments page-type: web-api-instance-method -status: - - experimental browser-compat: api.Sanitizer.setComments --- -{{APIRef("HTML Sanitizer API")}}{{SeeCompatTable}} +{{APIRef("HTML Sanitizer API")}} The **`setComments()`** method of the {{domxref("Sanitizer")}} interface sets whether comments will be allowed or removed by the sanitizer. diff --git a/files/en-us/web/api/sanitizer/setdataattributes/index.md b/files/en-us/web/api/sanitizer/setdataattributes/index.md index 27f3968aa71f1e2..a40307c7e8682a6 100644 --- a/files/en-us/web/api/sanitizer/setdataattributes/index.md +++ b/files/en-us/web/api/sanitizer/setdataattributes/index.md @@ -3,12 +3,10 @@ title: "Sanitizer: setDataAttributes() method" short-title: setDataAttributes() slug: Web/API/Sanitizer/setDataAttributes page-type: web-api-instance-method -status: - - experimental browser-compat: api.Sanitizer.setDataAttributes --- -{{APIRef("HTML Sanitizer API")}}{{SeeCompatTable}} +{{APIRef("HTML Sanitizer API")}} The **`setDataAttributes()`** method of the {{domxref("Sanitizer")}} interface sets whether all [`data-*` attributes](/en-US/docs/Web/HTML/Reference/Global_attributes/data-*) will be allowed by the sanitizer, or if they must be individually specified. diff --git a/files/en-us/web/api/sanitizerconfig/index.md b/files/en-us/web/api/sanitizerconfig/index.md index 83cb5d8bed92610..4e66e0fc6964433 100644 --- a/files/en-us/web/api/sanitizerconfig/index.md +++ b/files/en-us/web/api/sanitizerconfig/index.md @@ -2,14 +2,12 @@ title: SanitizerConfig slug: Web/API/SanitizerConfig page-type: web-api-interface -status: - - experimental browser-compat: - api.Sanitizer.get - api.Sanitizer.Sanitizer --- -{{APIRef("HTML Sanitizer API")}}{{SeeCompatTable}} +{{APIRef("HTML Sanitizer API")}} The **`SanitizerConfig`** dictionary of the [HTML Sanitizer API](/en-US/docs/Web/API/HTML_Sanitizer_API) specifies what elements, attributes and comments are allowed or should be removed when inserting strings of HTML into an {{domxref("Element")}} or {{domxref("ShadowRoot")}}, or when parsing an HTML string into a {{domxref("Document")}}. diff --git a/files/en-us/web/css/reference/at-rules/@font-face/font-stretch/index.md b/files/en-us/web/css/reference/at-rules/@font-face/font-stretch/index.md index ba75b003a871302..b4c7d1ba83a8a1e 100644 --- a/files/en-us/web/css/reference/at-rules/@font-face/font-stretch/index.md +++ b/files/en-us/web/css/reference/at-rules/@font-face/font-stretch/index.md @@ -2,14 +2,10 @@ title: font-stretch slug: Web/CSS/Reference/At-rules/@font-face/font-stretch page-type: css-at-rule-descriptor -status: - - deprecated browser-compat: css.at-rules.font-face.font-stretch sidebar: cssref --- -{{deprecated_header}} - > [!NOTE] > The `font-stretch` descriptor was renamed to `font-width` in the [CSS Fonts specification](https://drafts.csswg.org/css-fonts/#font-stretch-desc). To preserve compatibility, the specification retains `font-stretch` as an alias for the `font-width` descriptor. diff --git a/files/en-us/web/css/reference/properties/font-stretch/index.md b/files/en-us/web/css/reference/properties/font-stretch/index.md index 3ebd7eb964f300f..2fddbfccd64bf0c 100644 --- a/files/en-us/web/css/reference/properties/font-stretch/index.md +++ b/files/en-us/web/css/reference/properties/font-stretch/index.md @@ -2,14 +2,10 @@ title: font-stretch slug: Web/CSS/Reference/Properties/font-stretch page-type: css-property -status: - - deprecated browser-compat: css.properties.font-stretch sidebar: cssref --- -{{deprecated_header}} - > [!NOTE] > The `font-stretch` property was renamed to `font-width` in the [CSS Fonts specification](https://drafts.csswg.org/css-fonts/#font-stretch-prop). To preserve compatibility, the specification retains `font-stretch` as an alias for the `font-width` property.