@@ -2846,7 +2846,7 @@ steps:
2846
2846
<a>connection</a> .
2847
2847
</ol>
2848
2848
2849
- <li><p> Let <var> proxies</var> of calling <a>resolve proxies</a> .
2849
+ <li><p> Let <var> proxies</var> of calling <a>resolve proxies</a> given <var> url </var> .
2850
2850
2851
2851
<li><p> Let <var> timingInfo</var> be a new <a for=/>connection timing info</a> .
2852
2852
@@ -2904,8 +2904,9 @@ reused across <a>connections</a> whose <a for=connection>credentials</a> are fal
2904
2904
<hr>
2905
2905
2906
2906
<div algorithm>
2907
- <p> To <dfn>resolve proxies</dfn> , return the result of finding proxies for <var> url</var> in an
2908
- <a>implementation-defined</a> manner. If there are no proxies, return « "<code> DIRECT</code> " ».
2907
+ <p> To <dfn>resolve proxies</dfn> given a <a for=/>URL</a> <var> url</var> , return the result of
2908
+ finding proxies for <var> url</var> in an <a>implementation-defined</a> manner. If there are no
2909
+ proxies, return « "<code> DIRECT</code> " ».
2909
2910
2910
2911
<p class=note> This is where non-standard technology such as
2911
2912
<a href="https://en.wikipedia.org/wiki/Web_Proxy_Auto-Discovery_Protocol">Web Proxy Auto-Discovery Protocol (WPAD)</a>
@@ -3029,7 +3030,7 @@ details of reused connections are not exposed and time values are coarsened.
3029
3030
3030
3031
<h3 id=preemptive-connections>Preemptive connections</h3>
3031
3032
3032
- <div algorithm="preemmptively-obtain-a-connection" >
3033
+ <div algorithm>
3033
3034
<p> To <dfn export>preemptively obtain a connection</dfn> , given an
3034
3035
<a>environment settings object</a> <var> environment</var> , a <a for=/>URL</a> <var> url</var> , and a
3035
3036
boolean <var> credentials</var> , run these steps:
@@ -3039,9 +3040,9 @@ boolean <var>credentials</var>, run these steps:
3039
3040
<var> environment</var> .
3040
3041
3041
3042
<li>
3042
- <p> <a>Check CSP for preemptive operation</a> with <var> environment </var> and <var> url </var> . If
3043
- that returns <b> allowed </b> , <a>obtain a connection</a> with < var>key </var> , <var> url </var> and
3044
- <var> credentials</var> .
3043
+ <p> Run <a>Should connection be allowed by Content Security Policy?</a> with
3044
+ <var> environment </var> and < var>url </var> . If that returns <b> allowed </b> ,
3045
+ <a>obtain a connection</a> with <var> key </var> , <var> url </var> , and < var> credentials</var> .
3045
3046
3046
3047
<p class=note> This connection is obtained but not used directly. It will remain in the
3047
3048
<a>connection pool</a> for subsequent use.
@@ -3058,7 +3059,7 @@ boolean <var>credentials</var>, run these steps:
3058
3059
</ol>
3059
3060
</div>
3060
3061
3061
- <div algorithm="preemmptively-resolve-an-origin" >
3062
+ <div>
3062
3063
<p> To <dfn export>preemptively resolve an origin</dfn> , given an
3063
3064
<a>environment settings object</a> <var> environment</var> and a <a for=/>URL</a> <var> url</var> , run
3064
3065
these steps:
@@ -3067,8 +3068,8 @@ these steps:
3067
3068
<li><p> Let <var> key</var> be the result of <a for=/>determining the network partition key</a> given
3068
3069
<var> environment</var> .
3069
3070
3070
- <li><p> <a>Check CSP for preemptive operation</a> with <var> environment </var> and <var> url </var> . If
3071
- that returns <b> blocked</b> , return.
3071
+ <li> Run <p> <a>Should connection be allowed by Content Security Policy?</a> with
3072
+ <var> environment </var> and <var> url </var> . If that returns <b> blocked</b> , return.
3072
3073
3073
3074
<li><p> Let <var> proxies</var> be the result of calling <a>resolve proxies</a> .
3074
3075
@@ -3081,7 +3082,7 @@ these steps:
3081
3082
</div>
3082
3083
3083
3084
<div algorithm="check-preemptive-operation-csp">
3084
- <p> To <dfn>check CSP for preemptive operation </dfn> , given an
3085
+ <p> To <dfn>Should connection be allowed by Content Security Policy? </dfn> , given an
3085
3086
<a>environment settings object</a> <var> environment</var> , and a <a for=/>URL</a> <var> url</var> ,
3086
3087
run these steps:
3087
3088
0 commit comments