Using Feature Policy
Feature Policy allows you to control which origins can use which features, both in the top-level page and in embedded frames. Essentially, you write a policy, which is an allowed list of origins for each feature. For every feature controlled by Feature Policy, the feature is only enabled in the current document or frame if its origin matches the allowed list of origins.
For each policy-controlled feature, the browser maintains a list of origins for which the feature is enabled, known as an allowlist. If you do not specify a policy for a feature, then a default allowlist will be used. The default allowlist is specific to each feature.
A policy is described using a set of individual policy directives. A policy directive is a combination of a defined feature name, and an allowlist of origins that can use the feature.
'src': (只在iframe中允许) 只要在src 中的URL和加载iframe用的URL相同，则本特性在iframe中允许，
- <origin(s)>: 在特定的源中允许，源URL以空格分割。
Feature Policy provides two ways to specify policies to control features:
The primary difference between the HTTP header and the
allow attribute is that the allow attribute only controls features within an iframe. The header controls features in the response and any embedded content within the page.
You can send the
Feature-Policy HTTP header with the response of a page. The value of this header is a policy to be enforced by the browser for the given page. It has the following structure.
Feature-Policy: <feature name> <allowlist of origin(s)>
For example, to block all content from using the Geolocation API across your site:
Feature-Policy: geolocation 'none'
Several features can be controlled at the same time by sending the HTTP header with a semicolon-separated list of policy directives, or by sending a separate header for each policy.
For example, the following are equivalent:
Feature-Policy: unsized-media 'none'; geolocation 'self' https://example.com; camera *; Feature-Policy: unsized-media 'none' Feature-Policy: geolocation 'self' https://example.com Feature-Policy: camera *;
The second way to use Feature Policy is for controlling content within an iframe. Use the
allow attribute to specify a policy list for embedded content.
For example, allow all browsing contexts within this iframe to use fullscreen:
<iframe src="https://example.com..." allow="fullscreen"></iframe>
This is equivalent to:
<iframe src="https://example.com..." allow="fullscreen 'src'"></iframe>
This example allows
<iframe> content on a particular origin to access the user's location:
<iframe src="https://google-developers.appspot.com/demos/..." allow="geolocation https://google-developers.appspot.com"></iframe>
Similar to the HTTP header, several features can be controlled at the same time by specifying a semicolon-separated list of policy directives.
For example, this blocks the
<iframe> from using the camera and microphone:
<iframe allow="camera 'none'; microphone 'none'">
Scripts inherit the policy of their browsing context, regardless of their origin. That means that top-level scripts inherit the policy from the main document.
All iframes inherit the policy of their parent page. If the iframe has an
allow attribute, the policies of the parent page and the
allow attribute are combined, using the most restrictive subset. For an iframe to have a feature enabled, the origin must be in the allowlist for both the parent page and the allow attribute.
Disabling a feature in a policy is a one-way toggle. If a feature has been disabled for a child frame by its parent frame, the child cannot re-enable it, and neither can any of the child's descendants.
It's difficult to build a website that uses all the latest best practices and provides great performance and user experiences. As the website evolves, it can become even harder to maintain the user experience over time. You can use feature policies to specify the desired best practices, and rely on the browser to enforce the policies to prevent regressions.
There are several policy-controlled features designed to represent functionality that can negatively impact the user experience. These features include:
- Layout-inducing Animations
- Unoptimized (poorly compressed) images
- Oversized images
- Synchronous scripts
- Synchronous XMLHttpRequest
- Unsized media
To avoid breaking existing web content, the default for such policy-controlled features is to allow the functionality to be used by all origins. That is, the default allowlist is
'*' for each feature. Preventing the use of the sub-optimal functionality requires explicitly specifying a policy that disables the features.
For new content, you can start developing with a policy that disables all the features. This approach ensures that none of the functionality is introduced. When applying a policy to existing content, testing is likely required to verify it continues to work as expected. This is especially important for embedded or third-party content that you do not control.
To turn on the enforcement of all the best practices, specify the policy as below.
Send the following the HTTP header:
Feature-Policy: layout-animations 'none'; unoptimized-images 'none'; oversized-images 'none'; sync-script 'none'; sync-xhr 'none'; unsized-media 'none';
<iframe src="https://example.com..." allow="layout-animations 'none'; unoptimized-images 'none'; oversized-images 'none'; sync-script 'none'; sync-xhr 'none'; unsized-media 'none';"></iframe>