Skip to content

Commit ecbf1c5

Browse files
s/unsafe-no-cors/user-agent-no-cors/g
1 parent 7356349 commit ecbf1c5

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

fetch.bs

+12-12
Original file line numberDiff line numberDiff line change
@@ -1777,7 +1777,7 @@ to not have to set <a for=/>request</a>'s <a for=request>referrer</a>.
17771777
<p>A <a for=/>request</a> has an associated
17781778
<dfn export for=request id=concept-request-mode>mode</dfn>, which is
17791779
"<code>same-origin</code>", "<code>cors</code>", "<code>no-cors</code>",
1780-
"<code>navigate</code>", "<code>unsafe-no-cors</code>", or "<code>websocket</code>".
1780+
"<code>navigate</code>", "<code>user-agent-no-cors</code>", or "<code>websocket</code>".
17811781
Unless stated otherwise, it is "<code>no-cors</code>".
17821782

17831783
<div class="note no-backref">
@@ -1800,7 +1800,7 @@ Unless stated otherwise, it is "<code>no-cors</code>".
18001800
<dt>"<code>navigate</code>"
18011801
<dd>This is a special mode used only when <a>navigating</a> between documents.
18021802

1803-
<dt>"<code>unsafe-no-cors</code>"
1803+
<dt>"<code>user-agent-no-cors</code>"
18041804
<dd>This is a special mode for the [=user agent=] to use internally to wittingly make
18051805
requests that are unsafe. It restricts a <a for=/>request</a> to using <a>CORS-safelisted methods</a>,
18061806
<a>CORS-safelisted request-headers</a>, and the <a for=/>request</a> must have a <a>parallel queue</a>
@@ -1810,7 +1810,7 @@ Unless stated otherwise, it is "<code>no-cors</code>".
18101810
<a>Cross-Origin-Embedder-Policy allows credentials</a>. Upon success a fetch will
18111811
return a <a>basic filtered response</a>.
18121812

1813-
<p class=warning> Using <a for=/>request</a> <a for=request>mode</a> "<code>unsafe-no-cors</code>"
1813+
<p class=warning> Using <a for=/>request</a> <a for=request>mode</a> "<code>user-agent-no-cors</code>"
18141814
is even more discouraged and unsafe than "<code>no-cors</code>". Any use of this mode must be
18151815
memory-isolated to the [=user agent=] to contain its results and prevent their disclosure or misuse.
18161816
This <a for=request>mode</a> is deliberately not exposed in the {{RequestMode}}.
@@ -1830,7 +1830,7 @@ Unless stated otherwise, it is "<code>no-cors</code>".
18301830
<dfn for=request>omit origin flag</dfn>. Unless stated otherwise it is unset.
18311831

18321832
<p class="note no-backref">The <a for=request>omit origin flag</a> only has effect when
1833-
<a for=/>request</a>'s <a for=request>mode</a> is "<code>unsafe-no-cors</code>".
1833+
<a for=/>request</a>'s <a for=request>mode</a> is "<code>user-agent-no-cors</code>".
18341834

18351835
<p>A <a for=/>request</a> has an associated
18361836
<dfn id=use-cors-preflight-flag export for=request>use-CORS-preflight flag</dfn>. Unless stated
@@ -3102,7 +3102,7 @@ given a <a for=/>request</a> <var>request</var>, run these steps:
31023102

31033103
<li><p>If <var>request</var>'s <a for=request>response tainting</a> is "<code>cors</code>" or
31043104
<var>request</var>'s <a for=request>mode</a> is "<code>websocket</code>" or
3105-
"<code>unsafe-no-cors</code>", then <a for="header list">append</a>
3105+
"<code>user-agent-no-cors</code>", then <a for="header list">append</a>
31063106
(`<code>Origin</code>`, <var>serializedOrigin</var>) to
31073107
<var>request</var>'s <a for=request>header list</a>.
31083108

@@ -4010,7 +4010,7 @@ the request.
40104010
<var>processEarlyHintsResponse</var> is null.
40114011

40124012
<p>If <var>fetchParams</var>'s <a for="fetch params">request</a>'s <a for=request>mode</a> is
4013-
"<code>unsafe-no-cors</code>": <a for=/>assert</a>: <var>fetchParams</var>'s
4013+
"<code>user-agent-no-cors</code>": <a for=/>assert</a>: <var>fetchParams</var>'s
40144014
<a for="fetch params">task destination</a> is a <a for=/>parallel queue</a>.
40154015

40164016
<p class=note>Processing of early hints (<a for=/>responses</a> whose <a for=response>status</a>
@@ -4072,7 +4072,7 @@ the request.
40724072
"<code>no-window</code>".
40734073

40744074
<li><p>If <var>request</var>'s <a for=request>origin</a> is "<code>client</code>" and either
4075-
<var>request</var>'s <a for=request>mode</a> is not "<code>unsafe-no-cors</code>" or
4075+
<var>request</var>'s <a for=request>mode</a> is not "<code>user-agent-no-cors</code>" or
40764076
and <var>request</var>'s <a for=request>omit origin flag</a> is unset, then set
40774077
<var>request</var>'s <a for=request>origin</a> to <var>request</var>'s <a for=request>client</a>'s
40784078
<a for="environment settings object">origin</a>.
@@ -4085,7 +4085,7 @@ the request.
40854085
<a>HTTP(S) scheme</a>
40864086

40874087
<li><p><var>request</var>'s <a for=request>mode</a> is "<code>same-origin</code>",
4088-
"<code>cors</code>", "<code>no-cors</code>", or "<code>unsafe-no-cors</code>"
4088+
"<code>cors</code>", "<code>no-cors</code>", or "<code>user-agent-no-cors</code>"
40894089

40904090
<li><p><var>request</var>'s <a for=request>window</a> is not null
40914091

@@ -4101,7 +4101,7 @@ the request.
41014101
<li><p><a for=/>Assert</a>: <var>request</var>'s <a for=request>origin</a> is <a>same origin</a>
41024102
with <var>request</var>'s <a for=request>client</a>'s
41034103
<a for="environment settings object">origin</a> or <var>request</var>'s <a for=request>mode</a>
4104-
is "<code>unsafe-no-cors</code>".
4104+
is "<code>user-agent-no-cors</code>".
41054105

41064106
<li><p>Let <var>onPreloadedResponseAvailable</var> be an algorithm that runs the following
41074107
step given a <a for=/>response</a> <var>response</var>: set <var>fetchParams</var>'s
@@ -4337,7 +4337,7 @@ steps:
43374337
<li><p>Return <var>corsWithPreflightResponse</var>.
43384338
</ol>
43394339

4340-
<dt><var>request</var>'s <a for=request>mode</a> is "<code>unsafe-no-cors</code>"
4340+
<dt><var>request</var>'s <a for=request>mode</a> is "<code>user-agent-no-cors</code>"
43414341
<dd>
43424342
<ol>
43434343
<li><p>Set <var>request</var>'s <a for=request>response tainting</a> to
@@ -4832,7 +4832,7 @@ these steps:
48324832
<li><p><var>request</var>'s <a for=request>mode</a> is not "<code>no-cors</code>" and
48334833
<var>response</var>'s <a for=response>type</a> is "<code>opaque</code>"
48344834

4835-
<li><p><var>request</var>'s <a for=request>mode</a> is "<code>unsafe-no-cors</code>"
4835+
<li><p><var>request</var>'s <a for=request>mode</a> is "<code>user-agent-no-cors</code>"
48364836

48374837
<li><var>request</var>'s <a for=request>redirect mode</a> is not "<code>manual</code>" and
48384838
<var>response</var>'s <a for=response>type</a> is "<code>opaqueredirect</code>"
@@ -5190,7 +5190,7 @@ run these steps:
51905190
<var>httpRequest</var>'s <a for=request>header list</a>.
51915191
</ol>
51925192

5193-
<li>If either <var>request</var>'s <a for=request>mode</a> is not "<code>unsafe-no-cors</code>"
5193+
<li>If either <var>request</var>'s <a for=request>mode</a> is not "<code>user-agent-no-cors</code>"
51945194
or <var>request</var>'s <a for=request>omit origin flag</a> is not set,
51955195
<p><a>append a request `<code>Origin</code>` header</a> for <var>httpRequest</var>.
51965196

0 commit comments

Comments
 (0)