diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 01:13:27 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 01:13:27 +0000 |
commit | 40a355a42d4a9444dc753c04c6608dade2f06a23 (patch) | |
tree | 871fc667d2de662f171103ce5ec067014ef85e61 /l10n-en-CA/dom/chrome/security | |
parent | Adding upstream version 124.0.1. (diff) | |
download | firefox-40a355a42d4a9444dc753c04c6608dade2f06a23.tar.xz firefox-40a355a42d4a9444dc753c04c6608dade2f06a23.zip |
Adding upstream version 125.0.1.upstream/125.0.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'l10n-en-CA/dom/chrome/security')
-rw-r--r-- | l10n-en-CA/dom/chrome/security/csp.properties | 99 | ||||
-rw-r--r-- | l10n-en-CA/dom/chrome/security/security.properties | 5 |
2 files changed, 104 insertions, 0 deletions
diff --git a/l10n-en-CA/dom/chrome/security/csp.properties b/l10n-en-CA/dom/chrome/security/csp.properties index 0333737e25..3c32e025f4 100644 --- a/l10n-en-CA/dom/chrome/security/csp.properties +++ b/l10n-en-CA/dom/chrome/security/csp.properties @@ -17,6 +17,105 @@ CSPROViolation = A violation occurred for a report-only CSP policy (“%1$S”). # %1$S is the directive that has been violated. # %2$S is the URI of the resource which violated the directive. CSPROViolationWithURI = The page’s settings observed the loading of a resource at %2$S (“%1$S”). A CSP report is being sent. + +# CSP Warnings: + +# LOCALIZATION NOTE (CSPInlineStyleViolation): +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the type of directive used by the resource (e.g. style-src-elem) +CSPInlineStyleViolation = The page’s settings blocked an inline style (%2$S) from being applied because it violates the following directive: “%1$S” +# LOCALIZATION NOTE (CSPROInlineStyleViolation): +# Don't translate "Report-Only" as it's part of the name Content-Security-Policy-Report-Only. +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the type of directive used by the resource (e.g. style-src-elem) +CSPROInlineStyleViolation = (Report-Only policy) The page’s settings would block an inline style (%2$S) from being applied because it violates the following directive: “%1$S” +# LOCALIZATION NOTE (CSPInlineScriptViolation): +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the type of directive used by the resource (e.g. script-src-elem) +CSPInlineScriptViolation = The page’s settings blocked an inline script (%2$S) from being executed because it violates the following directive: “%1$S” +# LOCALIZATION NOTE (CSPROInlineScriptViolation): +# Don't translate "Report-Only" as it's part of the name Content-Security-Policy-Report-Only. +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the type of directive used by the resource (e.g. script-src-elem) +CSPROInlineScriptViolation = (Report-Only policy) The page’s settings would block an inline script (%2$S) from being executed because it violates the following directive: “%1$S” +# LOCALIZATION NOTE (CSPEventHandlerScriptViolation): +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the type of directive used by the resource (e.g. script-src-attr) +CSPEventHandlerScriptViolation = The page’s settings blocked an event handler (%2$S) from being executed because it violates the following directive: “%1$S” +# LOCALIZATION NOTE (CSPROEventHandlerScriptViolation): +# Don't translate "Report-Only" as it's part of the name Content-Security-Policy-Report-Only. +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the type of directive used by the resource (e.g. script-src-attr) +CSPROEventHandlerScriptViolation = (Report-Only policy) The page’s settings would block an event handler (%2$S) from being executed because it violates the following directive: “%1$S” +# LOCALIZATION NOTE (CSPEvalScriptViolation): +# Don't translate/change "'unsafe-eval'", including the single quote. +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the type of directive used by the resource (e.g. script-src) +CSPEvalScriptViolation = The page’s settings blocked a JavaScript eval (%2$S) from being executed because it violates the following directive: “%1$S” (Missing 'unsafe-eval') +# LOCALIZATION NOTE (CSPROEvalScriptViolation): +# Don't translate "Report-Only" as it's part of the name Content-Security-Policy-Report-Only. +# Don't translate/change "'unsafe-eval'", including the single quote. +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the type of directive used by the resource (e.g. script-src) +CSPROEvalScriptViolation = (Report-Only policy) The page’s settings would block a JavaScript eval (%2$S) from being executed because it violates the following directive: “%1$S” (Missing 'unsafe-eval') +# LOCALIZATION NOTE (CSPWasmEvalScriptViolation): +# WebAssembly is a feature name. +# Don't translate/change "'wasm-unsafe-eval'" or "'unsafe-eval'", including the single quote. +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the type of directive used by the resource (e.g. script-src) +CSPWasmEvalScriptViolation = The page’s settings blocked WebAssembly (%2$S) from being executed because it violates the following directive: “%1$S” (Missing 'wasm-unsafe-eval' or 'unsafe-eval') +# LOCALIZATION NOTE (CSPROWasmEvalScriptViolation): +# Don't translate "Report-Only" as it's part of the name Content-Security-Policy-Report-Only. +# WebAssembly is a feature name. +# Don't translate/change "'wasm-unsafe-eval'" or "'unsafe-eval'", including the single quote. +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the type of directive used by the resource (e.g. script-src) +CSPROWasmEvalScriptViolation = (Report-Only policy) The page’s settings would block WebAssembly (%2$S) from being executed because it violates the following directive: “%1$S” (Missing 'wasm-unsafe-eval' or 'unsafe-eval') +# LOCALIZATION NOTE (CSPStyleViolation): +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the URI of the resource which violated the directive. +# %3$S is the type of directive used by the resource (e.g. style-src) +CSPStyleViolation = The page’s settings blocked a style (%3$S) at %2$S from being applied because it violates the following directive: “%1$S” +# LOCALIZATION NOTE (CSPROStyleViolation): +# Don't translate "Report-Only" as it's part of the name Content-Security-Policy-Report-Only. +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the URI of the resource which violated the directive. +# %3$S is the type of directive used by the resource (e.g. style-src) +CSPROStyleViolation = (Report-Only policy) The page’s settings would block a style (%3$S) at %2$S from being applied because it violates the following directive: “%1$S” +# LOCALIZATION NOTE (CSPScriptViolation): +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the URI of the resource which violated the directive. +# %3$S is the type of directive used by the resource (e.g. script-src-elem) +CSPScriptViolation = The page’s settings blocked a script (%3$S) at %2$S from being executed because it violates the following directive: “%1$S” +# LOCALIZATION NOTE (CSPROScriptViolation): +# Don't translate "Report-Only" as it's part of the name Content-Security-Policy-Report-Only. +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the URI of the resource which violated the directive. +# %3$S is the type of directive used by the resource (e.g. script-src-elem) +CSPROScriptViolation = (Report-Only policy) The page’s settings would block a script (%3$S) at %2$S from being executed because it violates the following directive: “%1$S” +# LOCALIZATION NOTE (CSPWorkerViolation): +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the URI of the resource which violated the directive. +# %3$S is the type of directive used by the resource (e.g. worker-src) +CSPWorkerViolation = The page’s settings blocked a worker script (%3$S) at %2$S from being executed because it violates the following directive: “%1$S” +# LOCALIZATION NOTE (CSPROWorkerViolation): +# Don't translate "Report-Only" as it's part of the name Content-Security-Policy-Report-Only. +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the URI of the resource which violated the directive. +# %3$S is the type of directive used by the resource (e.g. worker-src) +CSPROWorkerViolation = (Report-Only policy) The page’s settings would block a worker script (%3$S) at %2$S from being executed because it violates the following directive: “%1$S” +# LOCALIZATION NOTE (CSPGenericViolation): +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the URI of the resource which violated the directive. +# %3$S is the type of directive used by the resource (e.g. image-src) +CSPGenericViolation = The page’s settings blocked the loading of a resource (%3$S) at %2$S because it violates the following directive: “%1$S” +# LOCALIZATION NOTE (CSPROGenericViolation): +# Don't translate "Report-Only" as it's part of the name Content-Security-Policy-Report-Only. +# %1$S is the entire directive that has been violated. (e.g. "default-src 'none'") +# %2$S is the URI of the resource which violated the directive. +# %3$S is the type of directive used by the resource (e.g. image-src) +CSPROGenericViolation = (Report-Only policy) The page’s settings would block the loading of a resource (%3$S) at %2$S because it violates the following directive: “%1$S” + # LOCALIZATION NOTE (triedToSendReport): # %1$S is the URI we attempted to send a report to. triedToSendReport = Tried to send report to invalid URI: “%1$S” diff --git a/l10n-en-CA/dom/chrome/security/security.properties b/l10n-en-CA/dom/chrome/security/security.properties index a45c39db31..18203b34b2 100644 --- a/l10n-en-CA/dom/chrome/security/security.properties +++ b/l10n-en-CA/dom/chrome/security/security.properties @@ -46,6 +46,9 @@ LoadingMixedDisplayObjectSubrequestDeprecation=Loading mixed (insecure) content # LOCALIZATION NOTE: "%S" is the URI of the insecure mixed content download MixedContentBlockedDownload = Blocked downloading insecure content “%S”. +# LOCALIZATION NOTE: "%S" is the URI of the insecure mixed content download +BlockedInsecureDownload = We blocked a download that’s not secure: “%S”. + # LOCALIZATION NOTE: Do not translate "allow-scripts", "allow-same-origin", "sandbox" or "iframe" BothAllowScriptsAndSameOriginPresent=An iframe which has both allow-scripts and allow-same-origin for its sandbox attribute can remove its sandboxing. # LOCALIZATION NOTE: Do not translate "allow-top-navigation-by-user-activation", "allow-top-navigation", "sandbox" or "iframe" @@ -154,6 +157,8 @@ HTTPSOnlyFailedDowngradeAgain = Upgrading insecure request “%S” failed. Down # %1$S is the URL of the upgraded speculative TCP connection; %2$S is the upgraded scheme. HTTPSOnlyUpgradeSpeculativeConnection = Upgrading insecure speculative TCP connection “%1$S” to use “%2$S”. +HTTPSFirstSchemeless = Upgrading URL loaded in the address bar without explicit protocol scheme to use HTTPS. + # LOCALIZATION NOTE: %S is the URL of the blocked request; IframeSandboxBlockedDownload = Download of “%S” was blocked because the triggering iframe has the sandbox flag set. |