@@ -76,6 +76,7 @@ spec: web-otp; urlPrefix: https://wicg.github.io/web-otp
76
76
<pre class="link-defaults">
77
77
spec:html; type:dfn; for:html-origin-def; text:origin
78
78
spec:html; type:dfn; for:environment settings object; text:global object
79
+ spec:html; type:dfn; for:navigable; text:parent
79
80
spec:fetch; type:dfn; for:/; text:request
80
81
spec:fetch; type:dictionary; for:/; text:RequestInit
81
82
spec:infra; type:dfn; for:/; text:set
@@ -294,13 +295,13 @@ spec:css-syntax-3;
294
295
295
296
4. Let |origin| be |settings|' [=environment settings object/origin=] .
296
297
297
- 5. Let |current | be |document|'s [=document/browsing context =] .
298
+ 5. Let |navigable | be |document|'s [=node navigable =] .
298
299
299
- 6. While |current | has a [=parent browsing context =] :
300
+ 6. While |navigable | has a [=parent=] :
300
301
301
- 1. Set |current | to |current |'s [=parent browsing context =] .
302
+ 1. Set |navigable | to |navigable |'s [=parent=] .
302
303
303
- 2. If |current |'s [=active document=]' s [=origin=] is not [=same origin=] with |origin|,
304
+ 2. If |navigable |'s [=active document=]' s [=origin=] is not [=same origin=] with |origin|,
304
305
return `false`.
305
306
306
307
7. Return `true`.
@@ -1335,8 +1336,8 @@ spec:css-syntax-3;
1335
1336
to be passed to {{CredentialsContainer/store()}} .
1336
1337
1337
1338
<div class="example">
1338
- If a user is signed in by submitting the credentials to a sign-in endpoint via {{fetch()}} ,
1339
- we can check the response to determine whether the user
1339
+ If a user is signed in by submitting the credentials to a sign-in endpoint via
1340
+ <a lt=fetch(input)><code>fetch()</code></a> , we can check the response to determine whether the user
1340
1341
was signed in successfully, and notify the user agent accordingly. Given a sign-in form like the
1341
1342
following:
1342
1343
@@ -2187,8 +2188,8 @@ spec:css-syntax-3;
2187
2188
it less likely that a cross-site scripting attack will succeed in the first place. If sites
2188
2189
are populating <{form}> elements, also <a>`form-action`</a> directives should be set.
2189
2190
2190
- * <a>`connect-src`</a> restricts the origins to which {{ fetch()}} may submit data (which
2191
- mitigates the risk that credentials could be exfiltrated to `evil.com`.
2191
+ * <a>`connect-src`</a> restricts the origins to which <a lt= fetch(input)><code>fetch()</code></a>
2192
+ may submit data (which mitigates the risk that credentials could be exfiltrated to `evil.com`.
2192
2193
2193
2194
* <a>`child-src`</a> restricts the nested browsing contexts which may be embedded in a page,
2194
2195
making it more difficult to inject a malicious `postMessage()` target. [[HTML]]
@@ -2312,8 +2313,8 @@ spec:css-syntax-3;
2312
2313
ISSUE(w3c/webappsec#290): Add some thoughts here about when and how the API
2313
2314
should be used, especially with regard to {{CredentialRequestOptions/mediation}} .
2314
2315
2315
- ISSUE: Describe encoding restrictions of submitting credentials by {{fetch()}} with
2316
- a {{FormData}} body.
2316
+ ISSUE: Describe encoding restrictions of submitting credentials by
2317
+ <a lt=fetch(input)><code>fetch()</code></a> with a {{FormData}} body.
2317
2318
2318
2319
When performing feature detection for a given credential type, developers are encouraged to verify
2319
2320
that the relevant {{Credential}} specialization is present, rather than relying on the presence of
0 commit comments