@@ -2857,16 +2857,13 @@ with a <i>CORS flag</i> and <i>recursive flag</i>, run these steps:
2857
2857
<var> noCorsResponse</var> .
2858
2858
2859
2859
<li>
2860
- <p> Set <var> corbSanitizedResponse</var> to a new <a for=/>response</a> whose
2861
- <a for=response>status</a> is <var> noCorsResponse</var> 's <a for=response>status</a> ,
2862
- <a for=response>HTTPS state</a> is <var> noCorsResponse</var> 's
2863
- <a for=response>HTTPS state</a> , and <a for=response>CSP list</a> is
2864
- <var> noCorsResponse</var> 's <a for=response>CSP list</a> .
2860
+ <p> Return a new <a for=/>response</a> whose <a for=response>status</a> is
2861
+ <var> noCorsResponse</var> 's <a for=response>status</a> , <a for=response>HTTPS state</a> is
2862
+ <var> noCorsResponse</var> 's <a for=response>HTTPS state</a> , and <a for=response>CSP list</a>
2863
+ is <var> noCorsResponse</var> 's <a for=response>CSP list</a> .
2865
2864
2866
2865
<p class="warning"> This is only an effective defense against side channel attacks if
2867
2866
<var> noCorsResponse</var> is kept isolated from the process that initiated the request.
2868
-
2869
- <li><p> Return <var> corbSanitizedResponse</var> .
2870
2867
</ol>
2871
2868
2872
2869
<dt><var> request</var> 's <a for=request>current url</a>' s
@@ -3500,6 +3497,12 @@ Range Requests</cite>. [[HTTP-RANGE]] However, this is not widely supported by b
3500
3497
<ol>
3501
3498
<li><p> Let <var> httpRequest</var> be null.
3502
3499
3500
+ <li><p> Let <var> response</var> be null.
3501
+
3502
+ <li><p> Let <var> storedResponse</var> be null.
3503
+
3504
+ <li><p> Let the <var> revalidatingFlag</var> be unset.
3505
+
3503
3506
<li>
3504
3507
<p> Run these steps, but <a>abort when</a> the ongoing fetch is <a for=fetch>terminated</a> :
3505
3508
@@ -3719,10 +3722,6 @@ Range Requests</cite>. [[HTTP-RANGE]] However, this is not widely supported by b
3719
3722
<var> httpRequest</var> 's
3720
3723
<a for=request>credentials mode</a> .
3721
3724
3722
- <li><p> Let <var> response</var> and <var> storedResponse</var> be null.
3723
-
3724
- <li><p> Let the <var> revalidatingFlag</var> be unset.
3725
-
3726
3725
<li>
3727
3726
<p> If <var> httpRequest</var> 's <a for=request>cache mode</a> is neither "<code> no-store</code> "
3728
3727
nor "<code> reload</code> ", then:
@@ -3791,10 +3790,10 @@ Range Requests</cite>. [[HTTP-RANGE]] However, this is not widely supported by b
3791
3790
<li><p> If <var> httpRequest</var> 's <a for=request>cache mode</a> is
3792
3791
"<code> only-if-cached</code> ", then return a <a>network error</a> .
3793
3792
3794
- <li><p> Set <var> forwardResponse</var> to the result of making an <a>HTTP-network fetch</a> using
3793
+ <li><p> Let <var> forwardResponse</var> be the result of making an <a>HTTP-network fetch</a> using
3795
3794
<var> httpRequest</var> with <i> credentials flag</i> if set.
3796
3795
3797
- <li><p> If <var> httpRequest</var> 's <var > method</var > is
3796
+ <li><p> If <var> httpRequest</var> 's <a for=request >method</a > is
3798
3797
<a href=https://tools.ietf.org/html/rfc7231#safe.methods>unsafe</a> and
3799
3798
<var> forwardResponse</var> 's <a for=response>status</a> is in the range <code> 200</code> to
3800
3799
<code> 399</code> , inclusive, invalidate appropriate stored responses in the HTTP cache, as per
0 commit comments