Skip to content

Commit f19e64c

Browse files
authored
Meta: remove remaining TOPIC comments
They have been useless for many years now.
1 parent 737229e commit f19e64c

File tree

1 file changed

+0
-32
lines changed

1 file changed

+0
-32
lines changed

source

Lines changed: 0 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -779,7 +779,6 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute
779779

780780

781781

782-
<!--ADD-TOPIC:Security-->
783782
<h4>Writing secure applications with HTML</h4>
784783

785784
<!-- NON-NORMATIVE SECTION -->
@@ -899,7 +898,6 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute
899898
attribute).</p>
900899
</dd>
901900
</dl>
902-
<!--REMOVE-TOPIC:Security-->
903901

904902

905903
<h4>Common pitfalls to avoid when using the scripting APIs</h4>
@@ -1190,7 +1188,6 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute
11901188
</dd>
11911189

11921190

1193-
<!--ADD-TOPIC:Security-->
11941191
<dt>Errors that risk exposing authors to security attacks</dt>
11951192

11961193
<dd>
@@ -1203,7 +1200,6 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute
12031200

12041201
</div>
12051202
</dd>
1206-
<!--REMOVE-TOPIC:Security-->
12071203

12081204

12091205
<dt>Cases where the author's intent is unclear</dt>
@@ -4489,15 +4485,13 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute
44894485
neutral; leaving them in the DOM (for DOM processors), and styling them according to CSS (for CSS
44904486
processors), but not inferring any meaning from them.</p>
44914487

4492-
<!--ADD-TOPIC:Security-->
44934488
<p>When support for a feature is disabled (e.g. as an emergency measure to mitigate a security
44944489
problem, or to aid in development, or for performance reasons), user agents must act as if they
44954490
had no support for the feature whatsoever, and as if the feature was not mentioned in this
44964491
specification. For example, if a particular feature is accessed via an attribute in a Web IDL
44974492
interface, the attribute itself would be omitted from the objects that implement that interface
44984493
&mdash; leaving the attribute on the object but making it return null or throw an exception is
44994494
insufficient.</p>
4500-
<!--REMOVE-TOPIC:Security-->
45014495

45024496
</div>
45034497

@@ -39939,7 +39933,6 @@ dictionary <dfn dictionary>TrackEventInit</dfn> : <span>EventInit</span> {
3993939933
</table>
3994039934

3994139935

39942-
<!--ADD-TOPIC:Security-->
3994339936
<div w-nodev>
3994439937

3994539938
<h5>Security and privacy considerations</h5>
@@ -39981,7 +39974,6 @@ dictionary <dfn dictionary>TrackEventInit</dfn> : <span>EventInit</span> {
3998139974
product, then being able to read the subtitles would present a serious confidentiality breach.</p>
3998239975

3998339976
</div>
39984-
<!--REMOVE-TOPIC:Security-->
3998539977

3998639978

3998739979
<h5>Best practices for authors using media elements</h5>
@@ -59194,7 +59186,6 @@ interface <dfn interface>HTMLDialogElement</dfn> : <span>HTMLElement</span> {
5919459186
</dd>
5919559187
</dl>
5919659188

59197-
<!--ADD-TOPIC:CSS-->
5919859189

5919959190
<div w-nodev>
5920059191

@@ -62025,11 +62016,9 @@ callback <dfn callback>BlobCallback</dfn> = undefined (<span>Blob</span>? blob);
6202562016
when invoked, must run these steps:</p>
6202662017

6202762018
<ol>
62028-
<!--ADD-TOPIC:Security-->
6202962019
<li><p>If this <code>canvas</code> element's bitmap's <span
6203062020
data-x="concept-canvas-origin-clean">origin-clean</span> flag is set to false, then throw a
6203162021
<span>"<code>SecurityError</code>"</span> <code>DOMException</code>.</p>
62032-
<!--REMOVE-TOPIC:Security-->
6203362022

6203462023
<li><p>If this <code>canvas</code> element's bitmap has no pixels (i.e. either its horizontal
6203562024
dimension or its vertical dimension is zero) then return the string "<code
@@ -62118,7 +62107,6 @@ callback <dfn callback>BlobCallback</dfn> = undefined (<span>Blob</span>? blob);
6211862107

6211962108
</div>
6212062109

62121-
<!--REMOVE-TOPIC:DOM APIs-->
6212262110

6212362111
<h5 id="2dcontext">The 2D rendering context</h5>
6212462112

@@ -62467,12 +62455,10 @@ interface <dfn interface>Path2D</dfn> {
6246762455
<p>A <code>CanvasRenderingContext2D</code> object has an <dfn>output bitmap</dfn> that
6246862456
is initialized when the object is created.</p>
6246962457

62470-
<!--ADD-TOPIC:Security-->
6247162458
<p>The <span>output bitmap</span> has an <span
6247262459
data-x="concept-canvas-origin-clean">origin-clean</span> flag, which can be set to true or false.
6247362460
Initially, when one of these bitmaps is created, its <span
6247462461
data-x="concept-canvas-origin-clean">origin-clean</span> flag must be set to true.</p>
62475-
<!--REMOVE-TOPIC:Security-->
6247662462

6247762463
<p>The <code>CanvasRenderingContext2D</code> object also has an <dfn
6247862464
data-x="concept-canvas-alpha">alpha</dfn> boolean. When a
@@ -80826,7 +80812,6 @@ dictionary <dfn dictionary>DragEventInit</dfn> : <span>MouseEventInit</span> {
8082680812

8082780813

8082880814

80829-
<!--ADD-TOPIC:Security-->
8083080815
<div w-nodev>
8083180816

8083280817
<h4>Security risks in the drag-and-drop model</h4>
@@ -80865,7 +80850,6 @@ dictionary <dfn dictionary>DragEventInit</dfn> : <span>MouseEventInit</span> {
8086580850
</div>
8086680851

8086780852
</div>
80868-
<!--REMOVE-TOPIC:Security-->
8086980853

8087080854

8087180855

@@ -105618,7 +105602,6 @@ function receiver(e) {
105618105602
</div>
105619105603

105620105604

105621-
<!--ADD-TOPIC:Security-->
105622105605
<h4 id="security-postmsg">Security</h4>
105623105606

105624105607
<div w-nodev>
@@ -105675,7 +105658,6 @@ function receiver(e) {
105675105658
attacks.</p>
105676105659

105677105660
</div>
105678-
<!--REMOVE-TOPIC:Security-->
105679105661

105680105662

105681105663

@@ -106666,8 +106648,6 @@ function showLogout() {
106666106648

106667106649

106668106650

106669-
<!--ADD-TOPIC:Workers-->
106670-
106671106651
<h2 split-filename="workers" id="workers" dfn data-lt="web worker">Web workers</h2>
106672106652

106673106653
<h3>Introduction</h3>
@@ -126087,7 +126067,6 @@ interface <dfn interface>External</dfn> {
126087126067
8bit (see the section on <span data-x="character encoding declaration">character encoding
126088126068
declarations</span>)
126089126069
</dd>
126090-
<!--ADD-TOPIC:Security-->
126091126070
<dt>Security considerations:</dt>
126092126071
<dd>
126093126072
<p>Entire novels have been written about the security considerations that apply to HTML
@@ -126119,7 +126098,6 @@ interface <dfn interface>External</dfn> {
126119126098
protected from cross-site request forgery attacks by unique tokens, and make use of any
126120126099
third-party resources exposed to or rights granted to that origin.</p>
126121126100
</dd>
126122-
<!--REMOVE-TOPIC:Security-->
126123126101
<dt>Interoperability considerations:</dt>
126124126102
<dd>
126125126103
Rules for processing both conforming and non-conforming content
@@ -126195,14 +126173,12 @@ interface <dfn interface>External</dfn> {
126195126173
<dd>No optional parameters.</dd>
126196126174
<dt>Encoding considerations:</dt>
126197126175
<dd>binary</dd>
126198-
<!--ADD-TOPIC:Security-->
126199126176
<dt>Security considerations:</dt>
126200126177
<dd>
126201126178
Subresources of a <code>multipart/x-mixed-replace</code>
126202126179
resource can be of any type, including types with non-trivial
126203126180
security implications such as <code>text/html</code>.
126204126181
</dd>
126205-
<!--REMOVE-TOPIC:Security-->
126206126182
<dt>Interoperability considerations:</dt>
126207126183
<dd>
126208126184
None.
@@ -126270,10 +126246,8 @@ interface <dfn interface>External</dfn> {
126270126246
<dd>Same as for <code>application/xml</code> <ref spec=RFC7303></dd>
126271126247
<dt>Encoding considerations:</dt>
126272126248
<dd>Same as for <code>application/xml</code> <ref spec=RFC7303></dd>
126273-
<!--ADD-TOPIC:Security-->
126274126249
<dt>Security considerations:</dt>
126275126250
<dd>Same as for <code>application/xml</code> <ref spec=RFC7303></dd>
126276-
<!--REMOVE-TOPIC:Security-->
126277126251
<dt>Interoperability considerations:</dt>
126278126252
<dd>Same as for <code>application/xml</code> <ref spec=RFC7303></dd>
126279126253
<dt id="authors-using-xhtml">Published specification:</dt>
@@ -126343,14 +126317,12 @@ interface <dfn interface>External</dfn> {
126343126317
</dd>
126344126318
<dt>Encoding considerations:</dt>
126345126319
<dd>Not applicable.</dd>
126346-
<!--ADD-TOPIC:Security-->
126347126320
<dt>Security considerations:</dt>
126348126321
<dd>
126349126322
<p>If used exclusively in the fashion described in the context of
126350126323
<span>hyperlink auditing</span>, this type introduces no new
126351126324
security concerns.</p>
126352126325
</dd>
126353-
<!--REMOVE-TOPIC:Security-->
126354126326
<dt>Interoperability considerations:</dt>
126355126327
<dd>
126356126328
Rules applicable to this type are defined in this specification.
@@ -126414,10 +126386,8 @@ interface <dfn interface>External</dfn> {
126414126386
<dd>Same as for <code>application/json</code> <ref spec=JSON></dd>
126415126387
<dt>Encoding considerations:</dt>
126416126388
<dd>8bit (always UTF-8)</dd>
126417-
<!--ADD-TOPIC:Security-->
126418126389
<dt>Security considerations:</dt>
126419126390
<dd>Same as for <code>application/json</code> <ref spec=JSON></dd>
126420-
<!--REMOVE-TOPIC:Security-->
126421126391
<dt>Interoperability considerations:</dt>
126422126392
<dd>Same as for <code>application/json</code> <ref spec=JSON></dd>
126423126393
<dt>Published specification:</dt>
@@ -126496,7 +126466,6 @@ interface <dfn interface>External</dfn> {
126496126466
</dd>
126497126467
<dt>Encoding considerations:</dt>
126498126468
<dd>8bit (always UTF-8)</dd>
126499-
<!--ADD-TOPIC:Security-->
126500126469
<dt>Security considerations:</dt>
126501126470
<dd>
126502126471
<p>An event stream from an origin distinct from the origin of the content consuming the event
@@ -126511,7 +126480,6 @@ interface <dfn interface>External</dfn> {
126511126480
reconnect rapidly. Servers should use a 5xx status code to indicate capacity problems, as this
126512126481
will prevent conforming clients from reconnecting automatically.</p>
126513126482
</dd>
126514-
<!--REMOVE-TOPIC:Security-->
126515126483
<dt>Interoperability considerations:</dt>
126516126484
<dd>
126517126485
Rules for processing both conforming and non-conforming content are defined in this

0 commit comments

Comments
 (0)