diff --git a/source b/source index 19ba05564e6..b3081905a65 100644 --- a/source +++ b/source @@ -3860,7 +3860,7 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute
  • The Content Security Policy syntax
  • enforce the policy
  • The parse a serialized Content Security Policy algorithm
  • -
  • The Initialize a Document's CSP list algorithm
  • +
  • The Run CSP initialization for a Document algorithm
  • The Should element's inline behavior be blocked by Content Security Policy? algorithm
  • The Should navigation request of type be blocked by Content Security Policy? algorithm
  • The Should navigation response to navigation request of type in target be blocked by Content Security Policy? algorithm
  • @@ -82837,23 +82837,23 @@ interface BarProp { "coep" report type for endpoint on settings. -

    Policy container

    +

    Policy containers

    A policy container is a struct containing policies that apply to a Document, a WorkerGlobalScope, or a WorkletGlobalScope. It has the following items:

    + + -

    Each item has to define a default value for creating a new policy container.

    -

    Move other policies into the policy container.

    -

    To clone a policy container from a given - policy container policyContainer:

    +

    To clone a policy container given a policy + container policyContainer:

    1. Let clone be a new policy container.

    2. @@ -82878,7 +82878,7 @@ interface BarProp { must have been deleted, too. We might want to store the policy container alongside the blob URL entry directly (https://github.com/w3c/FileAPI/issues/142), and then reconsider this. --> -
    3. If url is "about:srcdoc", then return false.

    4. +
    5. If url is about:srcdoc, then return false.

    6. If url is local, then return true.

    7. @@ -82886,7 +82886,7 @@ interface BarProp {

    To create a policy container - from a fetch response from a given response + from a fetch response given a response response:

      @@ -82907,8 +82907,8 @@ interface BarProp {

    To determine navigation params - policy container from a given URL responseURL and four optional - policy containers historyPolicyContainer, + policy container given a URL responseURL and four policy container-or-nulls historyPolicyContainer, initiatorPolicyContainer, parentPolicyContainer, and responsePolicyContainer:

    @@ -82953,7 +82953,8 @@ interface BarProp {
    1. If workerGlobalScope's url - is local but not "blob":

      + is local but its scheme + is not "blob":

      1. Assert: workerGlobalScope's owner set's Location { // but see also origin

        an origin to use for the new Document
        -
        policy container
        a - policy container to use for the new Document
        +
        policy container
        +
        a policy container to use for the new Document
        final sandboxing flag set
        a sandboxing flag set to impose on the new Document
        @@ -84809,10 +84810,10 @@ interface Location { // but see also
        exceptionsEnabled (default false), an optional history handling behavior historyHandling (default "default"), an optional policy container - historyPolicyContainer, and an optional string navigationType (default "other"):

        + data-x="hh-default">default"), an optional policy container-or-null historyPolicyContainer (default null) and an + optional string navigationType (default + "other"):

        1. If resource is a URL, then set resource to a new Location { // but see also clone of the source browsing context's active document's policy - container if there is a source browsing context, or null otherwise.

        2. + container.

        3. Cancel any preexisting but not yet mature attempt to navigate browsingContext, including canceling any instances of the Location { // but see also response is response, origin is activeDocumentNavigationOrigin, policy container is - browsingContext's active document's current policy - container, final sandboxing flag - set is finalSandboxFlags, cross-origin opener policy is - browsingContext's active document's browsingContext's active document's policy container, + final sandboxing flag set is + finalSandboxFlags, cross-origin opener + policy is browsingContext's active document's cross-origin opener policy, COOP enforcement result is coopEnforcementResult, Location { // but see also url, finalSandboxFlags, incumbentNavigationOrigin, and activeDocumentNavigationOrigin.

        4. -
        5. Set responsePolicyContainer to be the result of creating a policy - container from a fetch response response.

        6. -
        7. If browsingContext is a top-level browsing context, then:

          @@ -85380,6 +85377,9 @@ interface Location { // but see also
          URL, historyPolicyContainer, @@ -85860,7 +85860,7 @@ interface Location { // but see also unsafe-none".

        8. -
        9. Initialize a Document's CSP list given +

        10. Run CSP initialization for a Document given document.

        11. @@ -86630,11 +86630,11 @@ new PaymentRequest(…); // Allowed to use
        12. Navigate the browsing context to request with historyHandling - set to "entry update" and with - historyPolicyContainer set to entry's policy container. The navigation must be done using the - same source browsing context as was used the first time entry was - created.

          + set to "entry update" and with historyPolicyContainer set to + entry's policy container. The navigation + must be done using the same source browsing context as was used the first time + entry was created.

          The "navigate" algorithm reinvokes this "traverse" algorithm to complete the traversal, at which point entry's BeforeUnloadEvent : Event { true.

        13. -

          For each policy of navigationParams' - policy container's CSP list:

          +

          For each policy of + navigationParams's policy + container's CSP list:

          1. If policy's disposition is not "