Skip to content

Commit 151bede

Browse files
committed
fix(docs): broken links
1 parent 9d37604 commit 151bede

File tree

7 files changed

+21
-21
lines changed

7 files changed

+21
-21
lines changed

docs/content/1.getting-started/1.installation.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -22,4 +22,4 @@ security: {
2222
}
2323
```
2424

25-
You can find more about configuring `nuxt-security` [here](/documentation/getting-started/configuration).
25+
You can find more about configuring `nuxt-security` [here](/getting-started/configuration).

docs/content/1.getting-started/2.configuration.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ security: {
124124
```
125125

126126
::callout{icon="i-heroicons-exclamation-triangle" color="amber"}
127-
To modify these default settings and further increase the security of your application, read about our `strict` mode and our user-friendly approach on how to [Improve Security](/documentation/advanced/improve-security)
127+
To modify these default settings and further increase the security of your application, read about our `strict` mode and our user-friendly approach on how to [Improve Security](/advanced/improve-security)
128128
::
129129

130130
## Overriding a layer's configuration

docs/content/1.getting-started/3.usage.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ Nuxt-Security applies your rules in the following prority order:
115115
1. Default rules
116116

117117
Nuxt-Security default values.
118-
See [here](/documentation/getting-started/configuration#default)
118+
See [here](/getting-started/configuration#default)
119119

120120

121121
2. Inline module options
@@ -293,7 +293,7 @@ In the example above,
293293
- All existing security options for `/some/route` will be maintained, and only the `script-src` CSP directive will be modified.
294294
- The existing content of the `script-src` directive will be erased and replaced by your values
295295

296-
Read more about [`defuReplaceArray`](/documentation/advanced/auto-imports/#defuReplaceArray)
296+
Read more about [`defuReplaceArray`](/advanced/auto-imports/#defuReplaceArray)
297297

298298
::callout{icon="i-heroicons-light-bulb"}
299299
`defuReplaceArray` is auto-imported by Nuxt Security. You can use this utility anywhere in your /server folder.

docs/content/2.headers/1.csp.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ type CSPSandboxValue =
133133

134134
Nuxt Security helps you increase the security of your site by enabling **Strict CSP** support for both SSR and SSG applications.
135135

136-
For further reading about Strict CSP and how to handle specific cases, please consult our [Adanced Section about Strict CSP](/documentation/advanced/strict-csp)
136+
For further reading about Strict CSP and how to handle specific cases, please consult our [Adanced Section about Strict CSP](/advanced/strict-csp)
137137

138138
- For SSR applications, Nuxt Security implements strict CSP via nonces. A one-time cryptographically-generated random nonce is generated at runtime by the server for each request of a page.
139139
- For SSG applications, Nuxt Security implements strict CSP via hashes. At static build-time, Nuxt Security computes the SHA hashes of the elements that are allowed to execute on your site.
@@ -287,7 +287,7 @@ Our default recommendation is to avoid setting the `ssg: hashStyles` option to `
287287
<br>
288288
⚠ This is because Nuxt's mechanism for Client-Side hydration of styles could be blocked by CSP in that case.
289289
<br>
290-
For further discussion and alternatives, please refer to our [Advanced Section on CSP](/documentation/advanced/strict-csp).
290+
For further discussion and alternatives, please refer to our [Advanced Section on CSP](/advanced/strict-csp).
291291
::
292292

293293
::callout{icon="i-heroicons-light-bulb"}
@@ -356,7 +356,7 @@ You can include any external script (Google Analytics, Stripe, Cloudflare Turnst
356356
::callout{icon="i-heroicons-light-bulb"}
357357
You will need to have default values for the `'strict-dynamic'`, `nonce` and `ssg` options.
358358
<br>
359-
If you change these default values, please refer to our [Advanced Section on CSP](/documentation/advanced/strict-csp) for alternatives.
359+
If you change these default values, please refer to our [Advanced Section on CSP](/advanced/strict-csp) for alternatives.
360360
::
361361

362362
- Since Nuxt 3.11, the easiest and universal way to include external scripts is via `useScript`

docs/content/4.utils/3.subresource-integrity.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ SRI is supported by all modern browsers: [caniuse](https://caniuse.com/subresour
6969

7070
**2. SRI is a critical component of Content Security Policy (CSP) in SSG mode.**
7171

72-
For more information on the relationship between Subresource Integrity and a Strict CSP, please read our [Advanced Section on Integrity Hashes for CSP](/documentation/advanced/strict-csp/#ssg-mode)
72+
For more information on the relationship between Subresource Integrity and a Strict CSP, please read our [Advanced Section on Integrity Hashes for CSP](/advanced/strict-csp/#ssg-mode)
7373

7474
If you use CSP on a statically-generated application, you will need to enable SRI by setting `sri: true`.
7575

docs/content/5.advanced/3.strict-csp.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -684,7 +684,7 @@ Nuxt Security allows you to generate your own headers rules with the `nuxt-secur
684684
685685
If you do not deploy with a Nitro preset, or if you have specific requirements that are not met by the `ssg: exportToPresets` default, you can use this hook to generate your headers configuration file yourself.
686686
687-
See our documentation on the [prerenderedPages hook](/documentation/advanced/hooks/#prerendered-headers-hook)
687+
See our documentation on the [prerenderedPages hook](/advanced/hooks/#prerendered-headers-hook)
688688
689689
::callout{icon="i-heroicons-light-bulb"}
690690
This will allow you to deliver CSP via HTTP headers, in addition to the standard `<meta http-equiv>` approach.
@@ -717,7 +717,7 @@ These considerations are equally true for SSR (where the server needs to be hit
717717
::callout{icon="i-heroicons-exclamation-triangle" color="amber"}
718718
If you implement per-route CSP, you will need to enforce an external reload upon navigation for the new CSP to enter into action.
719719
<br>
720-
Please see our FAQ section on [Updating Headers on a specific route](/documentation/advanced/faq/#updating-headers-on-a-specific-route)
720+
Please see our FAQ section on [Updating Headers on a specific route](/advanced/faq/#updating-headers-on-a-specific-route)
721721
::
722722
723723
::callout{icon="i-heroicons-light-bulb"}
@@ -731,4 +731,4 @@ In order to obtain a Strict CSP on Nuxt apps, we need to use `strict-dynamic`. T
731731
732732
On the other hand, it obliges application developers to adopt a standardized mindset when thinking about CSP. Less configuration options means less potential loopholes that malicious actors can seek to exploit.
733733
734-
With this in mind, we recommend that you implement your Strict CSP policy by starting from our [default configuration values](/documentation/getting-started/configuration#default), and modifying only the required values.
734+
With this in mind, we recommend that you implement your Strict CSP policy by starting from our [default configuration values](/getting-started/configuration#default), and modifying only the required values.

docs/content/5.advanced/7.improve-security.md

+10-10
Original file line numberDiff line numberDiff line change
@@ -39,23 +39,23 @@ The most common issues usually fall into one these categories:
3939

4040
In most cases, this is because you have included an external script in an 'unconventional' way, which is unrecognized by the Content Security Policy settings for the `script-src` directive.
4141

42-
Our recommendation is to always include external scripts via `useScript` and we provide a detailed section on [Including External Scripts](/documentation/headers/csp#including-external-scripts).
42+
Our recommendation is to always include external scripts via `useScript` and we provide a detailed section on [Including External Scripts](/headers/csp#including-external-scripts).
4343

4444
This scenario can also happen if your hosting provider messes with your code. See below.
4545

4646
**2. An image or video is blocked**
4747

4848
By default, Nuxt Security requires you to whitelist your external media sources. For security reasons, the Content Security Policy settings of the `img-src` directive only allows you to include self-hosted files.
4949

50-
If you need to include external media from third-party sites, please refer to our documentation on [Whitelisting External Resources](/documentation/advanced/faq#allowing-images-and-scripts-from-external-domains).
50+
If you need to include external media from third-party sites, please refer to our documentation on [Whitelisting External Resources](/advanced/faq#allowing-images-and-scripts-from-external-domains).
5151

5252
This scenario can also happen if your hosting provider messes with your code. See below.
5353

5454
**3. A frame is blocked**
5555

5656
In the vast majority of cases, this is due to Cross Origin Isolation restrictions on third-party frames. For maximum compatibility, Nuxt Security applies the `credentialless` policy to the COEP header. However, some third-party resources are incompatible with COEP/COOP requirements, which is beyond your control.
5757

58-
In that case, please follow our instructions on [Cross-Origin Isolation Issues](/documentation/headers/crossoriginembedderpolicy#cross-origin-isolation-issues).
58+
In that case, please follow our instructions on [Cross-Origin Isolation Issues](/headers/crossoriginembedderpolicy#cross-origin-isolation-issues).
5959

6060
This scenario can also happen if your hosting provider messes with your code. See below.
6161

@@ -64,23 +64,23 @@ The most common issues usually fall into one these categories:
6464
Some hosting providers will modify your code upon deployment. Usually this is intended to minify your files, or to inject trackers that provide additional services. By default, Nuxt Security will detect that your code has been modified and our Content Security Policy will block the application from running.
6565

6666
Please make sure that you disable all Post-Build Modification services that may be applied by your hosting platform. You can refer to our resources here:
67-
- [Disabling Post-Build Processing](/documentation/utils/subresource-integrity#cdn-post-build-processing)
68-
- [An example for Cloudflare](/documentation/advanced/faq#cloudflare).
67+
- [Disabling Post-Build Processing](/utils/subresource-integrity#cdn-post-build-processing)
68+
- [An example for Cloudflare](/advanced/faq#cloudflare).
6969

7070
**5. Camera, microphone, etc. access is denied**
7171

7272
By default, Nuxt Security sets Permissions Policies that protect your users against unintended image, sound, location or screen captures.
7373

74-
If your application requires using one of these features, please modify your [Permission Policies](/documentation/headers/permissions-policy).
74+
If your application requires using one of these features, please modify your [Permission Policies](/headers/permissions-policy).
7575

7676
**6. SSL, TLS, and other HTTPS denials**
7777

7878
You will face this issue if you are trying to connect to non-HTTPS resources. This happen because Nuxt Security makes sure that only secure, encrypted connections are allowed, via both its `upgrade-insecure-requests` Content Security Policy, and its `strictTransportSecurity` settings.
7979

8080
In general, you should not connect to non-HTTPS resources. If you need to disable SSL upgrading in development mode, we provide instructions on several standard use cases:
81-
- [Running with --host flag](/documentation/advanced/faq#running-app-with-host-flag)
82-
- [Hot Reload during development](/documentation/headers/csp#hot-reload-during-development)
83-
- [Nuxt Devtools](/documentation/getting-started/setup#using-with-nuxt-devtools)
81+
- [Running with --host flag](/advanced/faq#running-app-with-host-flag)
82+
- [Hot Reload during development](/headers/csp#hot-reload-during-development)
83+
- [Nuxt Devtools](/getting-started/setup#using-with-nuxt-devtools)
8484

8585

8686

@@ -224,7 +224,7 @@ These settings enforce two additional security measures in relation to iframes:
224224
1. You will only be able to embed external frames that are individually whitelisted in the `frame-src` directive
225225
2. Any such frame will be cross-origin isolated, due to the application of the `require-corp` COEP value
226226

227-
Cross-origin isolation requires the embedded frame to be delivered with matching COEP/COOP headers. Your browser's Developer Tools will tell you if it's not the case. Please refer to [Cross-Origin Isolation Issues](/documentation/headers/crossoriginembedderpolicy#cross-origin-isolation-issues) for remediation solutions.
227+
Cross-origin isolation requires the embedded frame to be delivered with matching COEP/COOP headers. Your browser's Developer Tools will tell you if it's not the case. Please refer to [Cross-Origin Isolation Issues](/headers/crossoriginembedderpolicy#cross-origin-isolation-issues) for remediation solutions.
228228

229229
### Enforcing a Stricter HSTS Policy
230230

0 commit comments

Comments
 (0)