@@ -2281,7 +2281,7 @@ or "<code>object</code>".
2281
2281
<li> Set <var> lastURL</var> to <var> url</var> .
2282
2282
</ol>
2283
2283
2284
- <li> Return <var> computedTaint</var> .
2284
+ <li><p> Return <var> computedTaint</var> .
2285
2285
</ol>
2286
2286
</div>
2287
2287
@@ -2393,20 +2393,20 @@ source of security bugs. Please seek security review for features that deal with
2393
2393
"<code> client</code> ".
2394
2394
2395
2395
<li><p> If <var> request</var> 's <a for=request>mode</a> is not "<code> no-cors</code> ", then return
2396
- true.</p>
2396
+ true.
2397
2397
2398
- <li><p> If <var> request</var> 's <a for=request>client</a> is null, then return true.</p>
2398
+ <li><p> If <var> request</var> 's <a for=request>client</a> is null, then return true.
2399
2399
2400
2400
<li><p> If <var> request</var> 's <a for=request>client</a>' s
2401
2401
<a for="environment settings object">policy container</a> 's
2402
2402
<a for="policy container">embedder policy</a> 's <a for="embedder policy">value</a> is not
2403
- "<a for="embedder policy value"><code>credentialless</code></a> ", then return true.</p>
2403
+ "<a for="embedder policy value"><code>credentialless</code></a> ", then return true.
2404
2404
2405
2405
<li><p> If <var> request</var> 's <a for=request>origin</a> is <a>same origin</a> with
2406
2406
<var> request</var> 's <a for=request>current URL</a>' s <a for=url>origin</a> and <var> request</var> 's
2407
- <a for=request>redirect-taint</a> is not "<code> same-origin</code> ", then return true.</p>
2407
+ <a for=request>redirect-taint</a> is not "<code> same-origin</code> ", then return true.
2408
2408
2409
- <li><p> Return false.</p>
2409
+ <li><p> Return false.
2410
2410
</ol>
2411
2411
</div>
2412
2412
@@ -4282,9 +4282,8 @@ given a <a for=/>request</a> <var>request</var>, run these steps:
4282
4282
<li>
4283
4283
<p> Let |httpOnlyAllowed| be true.
4284
4284
4285
- <p class=note> Since this algorithm is performed on a <a for=/>request</a> , we know that the
4286
- cookies were comsumed by HTTP, rather than script mechanisms such as
4287
- <code> document.cookie</code> .
4285
+ <p class=note> True follows from this being invoked from <a>fetch</a> , as opposed to the
4286
+ <code> document.cookie</code> getter steps for instance.
4288
4287
4289
4288
<li>
4290
4289
<p> Let |cookies| be the result of running <a>retrieve cookies</a> given |isSecure|,
@@ -4321,9 +4320,8 @@ given a <a for=/>request</a> <var>request</var>, run these steps:
4321
4320
<li>
4322
4321
<p> Let |httpOnlyAllowed| be true.
4323
4322
4324
- <p class=note> Since this algorithm is performed on a <a for=/>request</a> , we know that the
4325
- cookies were produced from HTTP, rather than script mechanisms such as
4326
- <code> document.cookie</code> .
4323
+ <p class=note> True follows from this being invoked from <a>fetch</a> , as opposed to the
4324
+ <code> document.cookie</code> getter steps for instance.
4327
4325
4328
4326
<li><p> Let |sameSiteStrictOrLaxAllowed| be true if the result of [=determine the same-site mode=]
4329
4327
for |request| is "<code> StrictOrLess</code> ", and false otherwise.
0 commit comments