This is an automated email from the ASF dual-hosted git repository. git-site-role pushed a commit to branch asf-staging in repository https://gitbox.apache.org/repos/asf/struts-site.git
The following commit(s) were added to refs/heads/asf-staging by this push: new c4c240e8b Updates stage by Jenkins c4c240e8b is described below commit c4c240e8b8728476bd693276e85ef162ee7b2c38 Author: jenkins <bui...@apache.org> AuthorDate: Fri Jul 14 06:07:02 2023 +0000 Updates stage by Jenkins --- content/security/index.html | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/content/security/index.html b/content/security/index.html index 70fc2fe3f..c9df55726 100644 --- a/content/security/index.html +++ b/content/security/index.html @@ -433,6 +433,10 @@ more in the Strict Method Invocation section of <a href="../core-developers/acti <h3 id="resource-isolation-using-fetch-metadata">Resource Isolation Using Fetch Metadata</h3> +<blockquote> + <p>Note: since Struts 6.0.0</p> +</blockquote> + <p>Fetch Metadata is a mitigation against common cross origin attacks such as Cross-Site Request Forgery (CSRF). It is a web platform security feature designed to help servers defend themselves against cross-origin attacks based on the preferred resource isolation policy. The browser provides information about the context of an HTTP request @@ -450,7 +454,7 @@ can be exempted from applying the policy. Read more about Fetch Metadata and res <h3 id="cross-origin-isolation-with-coop-and-coep">Cross Origin Isolation with COOP and COEP</h3> <blockquote> - <p>Note: since Struts 2.6.</p> + <p>Note: since Struts 6.0.0</p> </blockquote> <p><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Cross-Origin-Opener-Policy">Cross-Origin Opener Policy</a> is