@@ -1937,11 +1937,6 @@ message as HTTP/2 does not support them.
1937
1937
<!-- If we ever expand the utility of this we need to carefully consider whether filtered responses
1938
1938
need to mask it, whether the cache API needs to store it, etc. -->
1939
1939
1940
- <p> A <a for=/>response</a> has an associated
1941
- <dfn export for=response id=concept-response-csp-list>CSP list</dfn> , which is a <a for=/>list</a>
1942
- of <a>Content Security Policy objects</a> for the <a for=/>response</a> . The list is empty unless
1943
- otherwise specified. [[!CSP]]
1944
-
1945
1940
<p> A <a for=/>response</a> has an associated
1946
1941
<dfn export for=response id=concept-response-cors-exposed-header-name-list>CORS-exposed header-name list</dfn>
1947
1942
(a list of zero or more <a for=/>header</a>
@@ -3758,8 +3753,7 @@ steps:
3758
3753
3759
3754
<li>
3760
3755
<p> Return a new <a for=/>response</a> whose <a for=response>status</a> is
3761
- <var> noCorsResponse</var> 's <a for=response>status</a> , and <a for=response>CSP list</a>
3762
- is <var> noCorsResponse</var> 's <a for=response>CSP list</a> .
3756
+ <var> noCorsResponse</var> 's <a for=response>status</a> .
3763
3757
3764
3758
<p class="warning"> This is only an effective defense against side channel attacks if
3765
3759
<var> noCorsResponse</var> is kept isolated from the process that initiated the request.
@@ -3861,8 +3855,6 @@ steps:
3861
3855
<li><p> If <var> request</var> 's <a for=request>timing allow failed flag</a> is unset, then set
3862
3856
<var> internalResponse</var> 's <a for=response>timing allow passed flag</a> .
3863
3857
3864
- <li><p> <a lt="Set response's CSP list">Set <var>internalResponse</var>'s CSP list</a> .
3865
-
3866
3858
<li>
3867
3859
<p> If <var> response</var> is not a <a>network error</a> and any of the following returns
3868
3860
<b> blocked</b>
0 commit comments