From: Daniel Carl Date: Mon, 9 Mar 2015 21:01:56 +0000 (+0100) Subject: Restore alphabetical order of settings in man page. X-Git-Url: https://git.owens.tech/projects.html/projects.html/git?a=commitdiff_plain;h=2bbe0082b11521ad2a2ebea183fc71beef596261;p=vimb.git Restore alphabetical order of settings in man page. --- diff --git a/doc/vimb.1 b/doc/vimb.1 index 58cc6a8..bd49da9 100644 --- a/doc/vimb.1 +++ b/doc/vimb.1 @@ -1217,6 +1217,35 @@ This feature filters some kinds of reflective XSS attacks on vulnerable web sites. .SS Vimb-Settings .TP +.B auto-response-header (list) +Prepend HTTP-Header to responses received from server, based on pattern +matching. +The purpose of this setting is to enforce some security setting in the client. +For example, you could set Content-Security-Policy (see +`http://www.w3.org/TR/CSP/') for implement a whitelist policy, or set +Strict-Transport-Security for server that don't provide this header whereas +they propose https website. +.sp +Note that this setting will not remplace existing headers, but add a new one. +If multiple patterns match a request uri, the last matched rule will be +applied. +You could also specified differents headers for same pattern. +.sp +The format is a list of `pattern header-list`. +If `header-list` has not than one element, enclosing with QUOTE +is mandatory: `"pattern header-list"`. +The header-list format is the same as `header` setting. +.RS +.PP +Example: +.PD 0 +.IP ":set auto-response-header=* Content-security-policy=default-src 'self' 'unsafe-inline' 'unsafe-eval'; script-src 'none'" +.IP ":set auto-response-header+=https://example.com/* Content-security-policy=default-src 'self' https://*.example.com/" +.IP ":set auto-response-header+=https://example.com/* Strict-Transport-Security=max-age=31536000" +.IP ":set auto-response-header+=""https://*.example.org/sub/* Content-security-policy,X-Test=ok""" +.PD +.RE +.TP .B ca-bundle (string) The path to the crt file for the certificate validation. The given path is expanded with standard file expansion. @@ -1336,35 +1365,6 @@ Header completely from request. .PD .RE .TP -.B auto-response-header (list) -Prepend HTTP-Header to responses received from server, based on pattern -matching. -The purpose of this setting is to enforce some security setting in the client. -For example, you could set Content-Security-Policy (see -`http://www.w3.org/TR/CSP/') for implement a whitelist policy, or set -Strict-Transport-Security for server that don't provide this header whereas -they propose https website. -.sp -Note that this setting will not remplace existing headers, but add a new one. -If multiple patterns match a request uri, the last matched rule will be -applied. -You could also specified differents headers for same pattern. -.sp -The format is a list of `pattern header-list`. -If `header-list` has not than one element, enclosing with QUOTE -is mandatory: `"pattern header-list"`. -The header-list format is the same as `header` setting. -.RS -.PP -Example: -.PD 0 -.IP ":set auto-response-header=* Content-security-policy=default-src 'self' 'unsafe-inline' 'unsafe-eval'; script-src 'none'" -.IP ":set auto-response-header+=https://example.com/* Content-security-policy=default-src 'self' https://*.example.com/" -.IP ":set auto-response-header+=https://example.com/* Strict-Transport-Security=max-age=31536000" -.IP ":set auto-response-header+=""https://*.example.org/sub/* Content-security-policy,X-Test=ok""" -.PD -.RE -.TP .B hint-follow-last (bool) If on, vimb automatically follows the last remaining hint on the page. If off hints are fired only if enter is pressed.