@@ -2850,7 +2850,7 @@ steps:
2850
2850
<a>connection</a> .
2851
2851
</ol>
2852
2852
2853
- <li><p> Let <var> proxies</var> of calling <a>resolve proxies</a> .
2853
+ <li><p> Let <var> proxies</var> of calling <a>resolve proxies</a> given <var> url </var> .
2854
2854
2855
2855
<li><p> Let <var> timingInfo</var> be a new <a for=/>connection timing info</a> .
2856
2856
@@ -2908,8 +2908,9 @@ reused across <a>connections</a> whose <a for=connection>credentials</a> are fal
2908
2908
<hr>
2909
2909
2910
2910
<div algorithm>
2911
- <p> To <dfn>resolve proxies</dfn> , return the result of finding proxies for <var> url</var> in an
2912
- <a>implementation-defined</a> manner. If there are no proxies, return « "<code> DIRECT</code> " ».
2911
+ <p> To <dfn>resolve proxies</dfn> given a <a for=/>URL</a> <var> url</var> , return the result of
2912
+ finding proxies for <var> url</var> in an <a>implementation-defined</a> manner. If there are no
2913
+ proxies, return « "<code> DIRECT</code> " ».
2913
2914
2914
2915
<p class=note> This is where non-standard technology such as
2915
2916
<a href="https://en.wikipedia.org/wiki/Web_Proxy_Auto-Discovery_Protocol">Web Proxy Auto-Discovery Protocol (WPAD)</a>
@@ -3033,7 +3034,7 @@ details of reused connections are not exposed and time values are coarsened.
3033
3034
3034
3035
<h3 id=preemptive-connections>Preemptive connections</h3>
3035
3036
3036
- <div algorithm="preemmptively-obtain-a-connection" >
3037
+ <div algorithm>
3037
3038
<p> To <dfn export>preemptively obtain a connection</dfn> , given an
3038
3039
<a>environment settings object</a> <var> environment</var> , a <a for=/>URL</a> <var> url</var> , and a
3039
3040
boolean <var> credentials</var> , run these steps:
@@ -3043,9 +3044,9 @@ boolean <var>credentials</var>, run these steps:
3043
3044
<var> environment</var> .
3044
3045
3045
3046
<li>
3046
- <p> <a>Check CSP for preemptive operation</a> with <var> environment </var> and <var> url </var> . If
3047
- that returns <b> allowed </b> , <a>obtain a connection</a> with < var>key </var> , <var> url </var> and
3048
- <var> credentials</var> .
3047
+ <p> Run <a>Should connection be allowed by Content Security Policy?</a> with
3048
+ <var> environment </var> and < var>url </var> . If that returns <b> allowed </b> ,
3049
+ <a>obtain a connection</a> with <var> key </var> , <var> url </var> , and < var> credentials</var> .
3049
3050
3050
3051
<p class=note> This connection is obtained but not used directly. It will remain in the
3051
3052
<a>connection pool</a> for subsequent use.
@@ -3062,7 +3063,7 @@ boolean <var>credentials</var>, run these steps:
3062
3063
</ol>
3063
3064
</div>
3064
3065
3065
- <div algorithm="preemmptively-resolve-an-origin" >
3066
+ <div>
3066
3067
<p> To <dfn export>preemptively resolve an origin</dfn> , given an
3067
3068
<a>environment settings object</a> <var> environment</var> and a <a for=/>URL</a> <var> url</var> , run
3068
3069
these steps:
@@ -3071,8 +3072,8 @@ these steps:
3071
3072
<li><p> Let <var> key</var> be the result of <a for=/>determining the network partition key</a> given
3072
3073
<var> environment</var> .
3073
3074
3074
- <li><p> <a>Check CSP for preemptive operation</a> with <var> environment </var> and <var> url </var> . If
3075
- that returns <b> blocked</b> , return.
3075
+ <li> Run <p> <a>Should connection be allowed by Content Security Policy?</a> with
3076
+ <var> environment </var> and <var> url </var> . If that returns <b> blocked</b> , return.
3076
3077
3077
3078
<li><p> Let <var> proxies</var> be the result of calling <a>resolve proxies</a> .
3078
3079
@@ -3085,7 +3086,7 @@ these steps:
3085
3086
</div>
3086
3087
3087
3088
<div algorithm="check-preemptive-operation-csp">
3088
- <p> To <dfn>check CSP for preemptive operation </dfn> , given an
3089
+ <p> To <dfn>Should connection be allowed by Content Security Policy? </dfn> , given an
3089
3090
<a>environment settings object</a> <var> environment</var> , and a <a for=/>URL</a> <var> url</var> ,
3090
3091
run these steps:
3091
3092
0 commit comments