@@ -469,7 +469,7 @@ spec: WebRTC; urlPrefix: https://www.w3.org/TR/webrtc/
469
469
1. Let |policy| be a new [=/policy=] with an empty [=policy/directive set=] , a [=policy/source=]
470
470
of |source|, and a [=policy/disposition=] of |disposition|.
471
471
472
- 2. For each |token| returned by [=strictly split a string|strictly splitting=] |serialized| on
472
+ 2. <a for=list> For each</a> |token| returned by [=strictly split a string|strictly splitting=] |serialized| on
473
473
the U+003B SEMICOLON character (`;`):
474
474
475
475
1. [=Strip leading and trailing ASCII whitespace=] from |token|.
@@ -552,7 +552,7 @@ spec: WebRTC; urlPrefix: https://www.w3.org/TR/webrtc/
552
552
|response|'s [=response/header list=] , with a [=policy/source=] of "`header`", and a
553
553
[=policy/disposition=] of "`report`".
554
554
555
- 3. For each |policy| in |policies|:
555
+ 3. <a for=list> For each</a> |policy| of |policies|:
556
556
557
557
1. Set |policy|'s [=policy/self-origin=] to |response|' s [=response/url=] 's
558
558
[=url/origin=] .
@@ -1027,7 +1027,7 @@ spec: WebRTC; urlPrefix: https://www.w3.org/TR/webrtc/
1027
1027
1028
1028
1. Let |CSP list| be |request|'s [=request/policy container=]' s [=policy container/CSP list=] .
1029
1029
1030
- 2. For each |policy| in |CSP list|:
1030
+ 2. <a for=list> For each</a> |policy| of |CSP list|:
1031
1031
1032
1032
1. If |policy|'s <a for="policy">disposition</a> is "`enforce`",
1033
1033
then skip to the next |policy|.
@@ -1051,7 +1051,7 @@ spec: WebRTC; urlPrefix: https://www.w3.org/TR/webrtc/
1051
1051
1052
1052
2. Let |result| be "`Allowed`".
1053
1053
1054
- 3. For each |policy| in |CSP list|:
1054
+ 3. <a for=list> For each</a> |policy| of |CSP list|:
1055
1055
1056
1056
1. If |policy|'s <a for="policy">disposition</a> is "`report`",
1057
1057
then skip to the next |policy|.
@@ -1080,9 +1080,9 @@ spec: WebRTC; urlPrefix: https://www.w3.org/TR/webrtc/
1080
1080
1081
1081
2. Let |result| be "`Allowed`".
1082
1082
1083
- 3. For each |policy| in |CSP list|:
1083
+ 3. <a for=list> For each</a> |policy| of |CSP list|:
1084
1084
1085
- 1. For each |directive| in |policy|:
1085
+ 1. <a for=set> For each</a> |directive| of |policy|:
1086
1086
1087
1087
1. If the result of executing |directive|'s
1088
1088
<a for="directive">post-request check</a> is "`Blocked`", then:
@@ -1162,10 +1162,10 @@ spec: WebRTC; urlPrefix: https://www.w3.org/TR/webrtc/
1162
1162
Given a {{Document}} (|document|), the user agent performs the following
1163
1163
steps in order to initialize CSP for |document|:
1164
1164
1165
- 1. For each |policy| in |document|'s [=Document/policy container=]' s
1165
+ 1. <a for=list> For each</a> |policy| of |document|'s [=Document/policy container=]' s
1166
1166
[=policy container/CSP list=] :
1167
1167
1168
- 1. For each |directive| in |policy|:
1168
+ 1. <a for=set> For each</a> |directive| of |policy|:
1169
1169
1170
1170
1. Execute |directive|'s <a for="directive">initialization</a>
1171
1171
algorithm on |document|, and assert: its returned value is
@@ -1203,10 +1203,10 @@ spec: WebRTC; urlPrefix: https://www.w3.org/TR/webrtc/
1203
1203
1204
1204
2. Let |result| be "`Allowed`".
1205
1205
1206
- 3. For each |policy| in |element|'s {{Document}}' s <a for="/">global object</a> 's
1206
+ 3. <a for=list> For each</a> |policy| of |element|'s {{Document}}' s <a for="/">global object</a> 's
1207
1207
<a for="global object">CSP list</a> :
1208
1208
1209
- 1. For each |directive| in |policy|'s <a for="policy">directive set</a> :
1209
+ 1. <a for=set> For each</a> |directive| of |policy|'s <a for="policy">directive set</a> :
1210
1210
1211
1211
1. If |directive|'s <a for="directive">inline check</a> returns
1212
1212
"`Allowed`" when executed upon |element|, |type|, |policy| and |source|,
@@ -1249,10 +1249,10 @@ spec: WebRTC; urlPrefix: https://www.w3.org/TR/webrtc/
1249
1249
<ol class="algorithm">
1250
1250
1. Let |result| be "`Allowed`".
1251
1251
1252
- 2. For each |policy| in |navigation request|'s <a for="request">policy container</a>' s
1252
+ 2. <a for=list> For each</a> |policy| of |navigation request|'s <a for="request">policy container</a>' s
1253
1253
<a for="policy container">CSP list</a> :
1254
1254
1255
- 1. For each |directive| in |policy|:
1255
+ 1. <a for=set> For each</a> |directive| of |policy|:
1256
1256
1257
1257
1. If |directive|'s <a for="directive">pre-navigation check</a>
1258
1258
returns "`Allowed`" when executed upon |navigation request|,
@@ -1274,11 +1274,11 @@ spec: WebRTC; urlPrefix: https://www.w3.org/TR/webrtc/
1274
1274
3. If |result| is "`Allowed`", and if |navigation request|'s
1275
1275
<a for="request">current URL</a> 's <a for="url">scheme</a> is `javascript`:
1276
1276
1277
- 1. For each |policy| in |navigation request|'s <a for="request">client</a>' s
1277
+ 1. <a for=list> For each</a> |policy| of |navigation request|'s <a for="request">client</a>' s
1278
1278
<a for="environment settings object">global object</a> 's
1279
1279
<a for="global object">CSP list</a> :
1280
1280
1281
- 1. For each |directive| in |policy|:
1281
+ 1. <a for=set> For each</a> |directive| of |policy|:
1282
1282
1283
1283
1. Let |directive-name| be the result of executing
1284
1284
[[#effective-directive-for-inline-check]] on |type|.
@@ -1318,12 +1318,12 @@ spec: WebRTC; urlPrefix: https://www.w3.org/TR/webrtc/
1318
1318
<ol class="algorithm">
1319
1319
1. Let |result| be "`Allowed`".
1320
1320
1321
- 2. For each |policy| in |response CSP list|:
1321
+ 2. <a for=list> For each</a> |policy| of |response CSP list|:
1322
1322
1323
1323
Note: Some directives (like <a>frame-ancestors</a> ) allow a |response|'s
1324
1324
<a>Content Security Policy</a> to act on the navigation.
1325
1325
1326
- 1. For each |directive| in |policy|:
1326
+ 1. <a for=set> For each</a> |directive| of |policy|:
1327
1327
1328
1328
1. If |directive|'s <a for="directive">navigation response check</a>
1329
1329
returns "`Allowed`" when executed upon |navigation request|, |type|,
@@ -1345,13 +1345,13 @@ spec: WebRTC; urlPrefix: https://www.w3.org/TR/webrtc/
1345
1345
5. If |policy|'s <a for="policy">disposition</a> is "`enforce`", then
1346
1346
set |result| to "`Blocked`".
1347
1347
1348
- 3. For each |policy| in |navigation request|'s <a for="request">policy container</a>' s
1348
+ 3. <a for=list> For each</a> |policy| of |navigation request|'s <a for="request">policy container</a>' s
1349
1349
<a for="policy container">CSP list</a> :
1350
1350
1351
1351
Note: Some directives in the |navigation request|'s context (like <a>frame-ancestors</a> )
1352
1352
need the |response| before acting on the navigation.
1353
1353
1354
- 1. For each |directive| in |policy|:
1354
+ 1. <a for=set> For each</a> |directive| of |policy|:
1355
1355
1356
1356
1. If |directive|'s <a for="directive">navigation response check</a>
1357
1357
returns "`Allowed`" when executed upon |navigation request|, |type|,
@@ -1385,9 +1385,9 @@ spec: WebRTC; urlPrefix: https://www.w3.org/TR/webrtc/
1385
1385
<ol class="algorithm">
1386
1386
1. Let |result| be "`Allowed`".
1387
1387
1388
- 2. For each |policy| in |global|'s [=global object/CSP list=] :
1388
+ 2. <a for=list> For each</a> |policy| of |global|'s [=global object/CSP list=] :
1389
1389
1390
- 1. For each |directive| in |policy|:
1390
+ 1. <a for=set> For each</a> |directive| of |policy|:
1391
1391
1392
1392
1. Execute |directive|'s <a for="directive">initialization</a> algorithm on
1393
1393
|global|. If its returned value is "`Blocked`", then set |result| to
@@ -1411,8 +1411,8 @@ spec: WebRTC; urlPrefix: https://www.w3.org/TR/webrtc/
1411
1411
<ol class="algorithm">
1412
1412
1. Let |result| be "`Allowed`".
1413
1413
1414
- 2. For each |policy| in |global|'s [=global object/CSP list=] :
1415
- 1. For each |directive| in |policy|:
1414
+ 2. <a for=list> For each</a> |policy| of |global|'s [=global object/CSP list=] :
1415
+ 1. <a for=set> For each</a> |directive| of |policy|:
1416
1416
1. If |directive|'s <a for="directive">webrtc pre-connect check</a>
1417
1417
returns "`Allowed`", [=iteration/continue=] .
1418
1418
@@ -1450,7 +1450,7 @@ spec: WebRTC; urlPrefix: https://www.w3.org/TR/webrtc/
1450
1450
1451
1451
2. Let |global| be |realm|'s [=realm/global object=] .
1452
1452
1453
- 3. For each |policy| in |global|'s [=global object/CSP list=] :
1453
+ 3. <a for=list> For each</a> |policy| of |global|'s [=global object/CSP list=] :
1454
1454
1455
1455
1. Let |source-list| be `null`.
1456
1456
@@ -1504,7 +1504,7 @@ this algorithm returns normally if compilation is allowed, and throws a
1504
1504
1505
1505
2. Let |result| be "`Allowed`".
1506
1506
1507
- 3. For each |policy| in |global|'s [=global object/CSP list=] :
1507
+ 3. <a for=list> For each</a> |policy| of |global|'s [=global object/CSP list=] :
1508
1508
1509
1509
1. Let |source-list| be `null`.
1510
1510
@@ -1791,9 +1791,8 @@ this algorithm returns normally if compilation is allowed, and throws a
1791
1791
<a for="policy">directive set</a> contains a <a>directive</a> named
1792
1792
"<a>`report-to`</a> ", skip the remaining substeps.
1793
1793
1794
- 2. For each |token| returned by <a lt="split a string on ASCII whitespace">
1795
- splitting a string on ASCII whitespace</a> with |directive|'s
1796
- <a for="directive">value</a> as the `input`.
1794
+ 2. <a for=set>For each</a> |token| of |directive|'s
1795
+ <a for="directive">value</a> :
1797
1796
1798
1797
1. Let |endpoint| be the result of executing the <a>URL parser</a>
1799
1798
with |token| as the input, and |violation|'s
@@ -3412,7 +3411,7 @@ this algorithm returns normally if compilation is allowed, and throws a
3412
3411
returns "`Allowed`" if |base| may be used as the value of a <{base}>
3413
3412
element's <{base/href}> attribute, and "`Blocked`" otherwise:
3414
3413
3415
- 1. For each |policy| in |document|'s <a for="/">global object</a>' s
3414
+ 1. <a for=list> For each</a> |policy| of |document|'s <a for="/">global object</a>' s
3416
3415
<a for="global object">csp list</a> :
3417
3416
3418
3417
1. Let |source list| be `null`.
@@ -3721,7 +3720,7 @@ this algorithm returns normally if compilation is allowed, and throws a
3721
3720
3722
3721
3. Let |bypass due to integrity match| be `true`.
3723
3722
3724
- 4. For each |source| in |integrity sources|:
3723
+ 4. <a for=set> For each</a> |source| of |integrity sources|:
3725
3724
3726
3725
1. If |directive|'s <a for="directive">value</a> does not
3727
3726
contain a <a>source expression</a> whose
@@ -3797,7 +3796,7 @@ this algorithm returns normally if compilation is allowed, and throws a
3797
3796
3798
3797
1. Let |violates| be "`Does Not Violate`".
3799
3798
3800
- 2. For each |directive| in |policy|:
3799
+ 2. <a for=set> For each</a> |directive| of |policy|:
3801
3800
3802
3801
1. Let |result| be the result of executing |directive|'s
3803
3802
<a for="directive">pre-request check</a> on |request| and |policy|.
@@ -3819,7 +3818,7 @@ this algorithm returns normally if compilation is allowed, and throws a
3819
3818
3820
3819
2. If |nonce| is the empty string, return "`Does Not Match`".
3821
3820
3822
- 3. For each |expression| in |source list|:
3821
+ 3. <a for=set> For each</a> |expression| of |source list|:
3823
3822
3824
3823
1. If |expression| matches the <a grammar>`nonce-source`</a> grammar,
3825
3824
and |nonce| is <a for="string" lt="is">identical to</a> |expression|'s
@@ -3879,7 +3878,7 @@ this algorithm returns normally if compilation is allowed, and throws a
3879
3878
of « `'none' `, `https://example.com` », on the other hand, would match
3880
3879
`https://example.com/`.
3881
3880
3882
- 4. For each |expression| in |source list|:
3881
+ 4. <a for=set> For each</a> |expression| of |source list|:
3883
3882
3884
3883
1. If [[#match-url-to-source-expression]] returns "`Matches`" when
3885
3884
executed upon |url|, |expression|, |origin|, and |redirect count|, return
@@ -4118,7 +4117,7 @@ this algorithm returns normally if compilation is allowed, and throws a
4118
4117
4119
4118
2. Remove the final item from |path list A|.
4120
4119
4121
- 8. For each |piece A| in |path list A|:
4120
+ 8. <a for=list> For each</a> |piece A| of |path list A|:
4122
4121
4123
4122
1. Let |piece B| be the next item in |path list B|.
4124
4123
@@ -4147,8 +4146,8 @@ this algorithm returns normally if compilation is allowed, and throws a
4147
4146
1. If |element| does not have an attribute named "`nonce`", return "`Not
4148
4147
Nonceable`".
4149
4148
4150
- 2. If |element| is a <{script}> element, then for each |attribute| in
4151
- |element|:
4149
+ 2. If |element| is a <{script}> element, then <a for=list>for each</a> |attribute| of
4150
+ |element|'s <a for=Element>attribute list</a> :
4152
4151
4153
4152
1. If |attribute|'s name is an <a>ASCII case-insensitive</a> match for
4154
4153
the string "<code> <script</code> " or the string
@@ -4191,7 +4190,7 @@ this algorithm returns normally if compilation is allowed, and throws a
4191
4190
4192
4191
1. Let |allow all inline| be `false`.
4193
4192
4194
- 2. For each |expression| in |list|:
4193
+ 2. <a for=set> For each</a> |expression| of |list|:
4195
4194
4196
4195
1. If |expression| matches the <a grammar>`nonce-source`</a> or
4197
4196
<a grammar>`hash-source`</a> grammar, return "`Does Not Allow`".
@@ -4257,7 +4256,7 @@ this algorithm returns normally if compilation is allowed, and throws a
4257
4256
2. If |type| is "`script`" or "`style`", and [[#is-element-nonceable]]
4258
4257
returns "`Nonceable`" when executed upon |element|:
4259
4258
4260
- 1. For each |expression| in |list|:
4259
+ 1. <a for=set> For each</a> |expression| of |list|:
4261
4260
4262
4261
1. If |expression| matches the <a grammar>`nonce-source`</a> grammar,
4263
4262
and |element| has a <{htmlsvg-global/nonce}> attribute whose value
@@ -4269,7 +4268,7 @@ this algorithm returns normally if compilation is allowed, and throws a
4269
4268
4270
4269
3. Let |unsafe-hashes flag| be `false`.
4271
4270
4272
- 4. For each |expression| in |list|:
4271
+ 4. <a for=set> For each</a> |expression| of |list|:
4273
4272
4274
4273
1. If |expression| is an <a>ASCII case-insensitive</a> match for the
4275
4274
<a grammar>`keyword-source`</a>
@@ -4283,7 +4282,7 @@ this algorithm returns normally if compilation is allowed, and throws a
4283
4282
on the result of executing <a for="JavaScript string" data-lt="convert">JavaScript string converting</a>
4284
4283
on |source|.
4285
4284
4286
- 2. For each |expression| in |list|:
4285
+ 2. <a for=set> For each</a> |expression| of |list|:
4287
4286
4288
4287
1. If |expression| matches the <a grammar>`hash-source`</a> grammar:
4289
4288
@@ -4503,7 +4502,7 @@ this algorithm returns normally if compilation is allowed, and throws a
4503
4502
1. Let |directive fallback list| be the result of executing [[#directive-fallback-list]]
4504
4503
on |effective directive name|.
4505
4504
4506
- 2. For each |fallback directive| in |directive fallback list|:
4505
+ 2. <a for=set> For each</a> |fallback directive| of |directive fallback list|:
4507
4506
4508
4507
1. If |directive name| is |fallback directive|, Return "`Yes`".
4509
4508
0 commit comments