mirror of
https://github.com/RGBCube/serenity
synced 2025-07-26 04:27:44 +00:00
LibWeb/Fetch: Use tuple syntax for headers in spec comments
This is an editorial change in the Fetch spec.
See: b482186
This commit is contained in:
parent
b3b51a5001
commit
011f6a6cb4
2 changed files with 5 additions and 5 deletions
|
@ -154,7 +154,7 @@ WebIDL::ExceptionOr<void> Headers::set(DeprecatedString const& name_string, Depr
|
||||||
if (m_guard == Guard::Request && Infrastructure::is_forbidden_header_name(name))
|
if (m_guard == Guard::Request && Infrastructure::is_forbidden_header_name(name))
|
||||||
return {};
|
return {};
|
||||||
|
|
||||||
// 5. Otherwise, if this’s guard is "request-no-cors" and name/value is not a no-CORS-safelisted request-header, return.
|
// 5. Otherwise, if this’s guard is "request-no-cors" and (name, value) is not a no-CORS-safelisted request-header, return.
|
||||||
if (m_guard == Guard::RequestNoCORS && !Infrastructure::is_no_cors_safelisted_request_header(header))
|
if (m_guard == Guard::RequestNoCORS && !Infrastructure::is_no_cors_safelisted_request_header(header))
|
||||||
return {};
|
return {};
|
||||||
|
|
||||||
|
@ -253,7 +253,7 @@ WebIDL::ExceptionOr<void> Headers::append(Infrastructure::Header header)
|
||||||
.value = temporary_value.release_value(),
|
.value = temporary_value.release_value(),
|
||||||
};
|
};
|
||||||
|
|
||||||
// 4. If name/temporaryValue is not a no-CORS-safelisted request-header, then return.
|
// 4. If (name, temporaryValue) is not a no-CORS-safelisted request-header, then return.
|
||||||
if (!Infrastructure::is_no_cors_safelisted_request_header(temporary_header))
|
if (!Infrastructure::is_no_cors_safelisted_request_header(temporary_header))
|
||||||
return {};
|
return {};
|
||||||
}
|
}
|
||||||
|
|
|
@ -569,13 +569,13 @@ bool is_no_cors_safelisted_request_header_name(ReadonlyBytes header_name)
|
||||||
// https://fetch.spec.whatwg.org/#no-cors-safelisted-request-header
|
// https://fetch.spec.whatwg.org/#no-cors-safelisted-request-header
|
||||||
bool is_no_cors_safelisted_request_header(Header const& header)
|
bool is_no_cors_safelisted_request_header(Header const& header)
|
||||||
{
|
{
|
||||||
// To determine whether a header header is a no-CORS-safelisted request-header, run these steps:
|
// To determine whether a header (name, value) is a no-CORS-safelisted request-header, run these steps:
|
||||||
|
|
||||||
// 1. If header’s name is not a no-CORS-safelisted request-header name, then return false.
|
// 1. If name is not a no-CORS-safelisted request-header name, then return false.
|
||||||
if (!is_no_cors_safelisted_request_header_name(header.name))
|
if (!is_no_cors_safelisted_request_header_name(header.name))
|
||||||
return false;
|
return false;
|
||||||
|
|
||||||
// 2. Return whether header is a CORS-safelisted request-header.
|
// 2. Return whether (name, value) is a CORS-safelisted request-header.
|
||||||
return is_cors_safelisted_request_header(header);
|
return is_cors_safelisted_request_header(header);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue