Skip to content

Commit ddd5952

Browse files
Use “navigable”+“parent”, not “parent browsing context”; fix fetch() refs
Fixes #213
1 parent c009d69 commit ddd5952

File tree

1 file changed

+11
-10
lines changed

1 file changed

+11
-10
lines changed

index.bs

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,7 @@ spec: web-otp; urlPrefix: https://wicg.github.io/web-otp
7676
<pre class="link-defaults">
7777
spec:html; type:dfn; for:html-origin-def; text:origin
7878
spec:html; type:dfn; for:environment settings object; text:global object
79+
spec:html; type:dfn; for:navigable; text:parent
7980
spec:fetch; type:dfn; for:/; text:request
8081
spec:fetch; type:dictionary; for:/; text:RequestInit
8182
spec:infra; type:dfn; for:/; text:set
@@ -294,13 +295,13 @@ spec:css-syntax-3;
294295

295296
4. Let |origin| be |settings|' [=environment settings object/origin=].
296297

297-
5. Let |current| be |document|'s [=document/browsing context=].
298+
5. Let |navigable| be |document|'s [=node navigable=].
298299

299-
6. While |current| has a [=parent browsing context=]:
300+
6. While |navigable| has a [=parent=]:
300301

301-
1. Set |current| to |current|'s [=parent browsing context=].
302+
1. Set |navigable| to |navigable|'s [=parent=].
302303

303-
2. If |current|'s [=active document=]'s [=origin=] is not [=same origin=] with |origin|,
304+
2. If |navigable|'s [=active document=]'s [=origin=] is not [=same origin=] with |origin|,
304305
return `false`.
305306

306307
7. Return `true`.
@@ -1335,8 +1336,8 @@ spec:css-syntax-3;
13351336
to be passed to {{CredentialsContainer/store()}}.
13361337

13371338
<div class="example">
1338-
If a user is signed in by submitting the credentials to a sign-in endpoint via {{fetch()}},
1339-
we can check the response to determine whether the user
1339+
If a user is signed in by submitting the credentials to a sign-in endpoint via
1340+
<a lt=fetch(input)><code>fetch()</code></a>, we can check the response to determine whether the user
13401341
was signed in successfully, and notify the user agent accordingly. Given a sign-in form like the
13411342
following:
13421343

@@ -2187,8 +2188,8 @@ spec:css-syntax-3;
21872188
it less likely that a cross-site scripting attack will succeed in the first place. If sites
21882189
are populating <{form}> elements, also <a>`form-action`</a> directives should be set.
21892190

2190-
* <a>`connect-src`</a> restricts the origins to which {{fetch()}} may submit data (which
2191-
mitigates the risk that credentials could be exfiltrated to `evil.com`.
2191+
* <a>`connect-src`</a> restricts the origins to which <a lt=fetch(input)><code>fetch()</code></a>
2192+
may submit data (which mitigates the risk that credentials could be exfiltrated to `evil.com`.
21922193

21932194
* <a>`child-src`</a> restricts the nested browsing contexts which may be embedded in a page,
21942195
making it more difficult to inject a malicious `postMessage()` target. [[HTML]]
@@ -2312,8 +2313,8 @@ spec:css-syntax-3;
23122313
ISSUE(w3c/webappsec#290): Add some thoughts here about when and how the API
23132314
should be used, especially with regard to {{CredentialRequestOptions/mediation}}.
23142315

2315-
ISSUE: Describe encoding restrictions of submitting credentials by {{fetch()}} with
2316-
a {{FormData}} body.
2316+
ISSUE: Describe encoding restrictions of submitting credentials by
2317+
<a lt=fetch(input)><code>fetch()</code></a> with a {{FormData}} body.
23172318

23182319
When performing feature detection for a given credential type, developers are encouraged to verify
23192320
that the relevant {{Credential}} specialization is present, rather than relying on the presence of

0 commit comments

Comments
 (0)