@@ -2666,6 +2666,7 @@ functionality.
2666
2666
2667
2667
<h3 id=resolving-domains>Resolving domains</h3>
2668
2668
2669
+ <div algorithm>
2669
2670
<p tracking-vector> To
2670
2671
<dfn export id=resolve-an-origin oldids=resolve-a-domain>resolve an origin</dfn> , given a
2671
2672
<a for=/>network partition key</a> <var> key</var> and an <a for=/>origin</a> <var> origin</var> :
@@ -2710,6 +2711,7 @@ be used as part of the cache key.
2710
2711
system the Fetch Standard establishes. Other documents ought not to build on this primitive without
2711
2712
having a considered discussion with the Fetch Standard community first.
2712
2713
</div>
2714
+ </div>
2713
2715
2714
2716
2715
2717
<h3 id=connections>Connections</h3>
@@ -2742,6 +2744,7 @@ information pertaining to the process of obtaining a connection. It has the foll
2742
2744
<dd> A <a for=/>byte sequence</a> .
2743
2745
</dl>
2744
2746
2747
+ <div algorithm>
2745
2748
<p> To <dfn>clamp and coarsen connection timing info</dfn> , given a
2746
2749
<a for=/>connection timing info</a> <var> timingInfo</var> , a {{DOMHighResTimeStamp}}
2747
2750
<var> defaultStartTime</var> , and a boolean <var> crossOriginIsolatedCapability</var> , run these
@@ -2778,12 +2781,14 @@ steps:
2778
2781
<a for="connection timing info">ALPN negotiated protocol</a> is <var> timingInfo</var> 's
2779
2782
<a for="connection timing info">ALPN negotiated protocol</a> .
2780
2783
</ol>
2784
+ </div>
2781
2785
2782
2786
<hr>
2783
2787
2784
2788
<p> A <dfn>new connection setting</dfn> is "<code> no</code> ", "<code> yes</code> ", or
2785
2789
"<code> yes-and-dedicated</code> ".
2786
2790
2791
+ <div algorithm="obtain a connection">
2787
2792
<p> To <dfn export id=concept-connection-obtain>obtain a connection</dfn> , given a
2788
2793
<a>network partition key</a> <var> key</var> , <a for=/>URL</a> <var> url</var> , boolean
2789
2794
<var> credentials</var> , an optional <a>new connection setting</a> <var> new</var> (default
@@ -2828,7 +2833,8 @@ steps:
2828
2833
<li><p> Set <var> timingInfo</var> 's <a for="connection timing info">domain lookup start time</a>
2829
2834
to the <a for=/>unsafe shared current time</a> .
2830
2835
2831
- <li><p> Let <var> hosts</var> be « <var> origin</var> 's <a for=origin>host</a> ».
2836
+ <li><p> Let <var> hosts</var> be « <var> url</var> 's <a for=url>origin</a>' s
2837
+ <a for=origin>host</a> ».
2832
2838
2833
2839
<li><p> If <var> proxy</var> is "<code> DIRECT</code> ", then set <var> hosts</var> to the result of
2834
2840
running <a>resolve an origin</a> given <var> key</var> and <var> url</var> 's <a for=url>origin</a> .
@@ -2869,9 +2875,11 @@ management that are best left to the discretion of implementers. Describing this
2869
2875
keyed on <a for=/>credentials</a> . The latter clarifies that, e.g., TLS session identifiers are not
2870
2876
reused across <a>connections</a> whose <a for=connection>credentials</a> are false with
2871
2877
<a>connections</a> whose <a for=connection>credentials</a> are true.
2878
+ </div>
2872
2879
2873
2880
<hr>
2874
2881
2882
+ <div algorithm>
2875
2883
<p> To <dfn>create a connection</dfn> , given a <a for=/>network partition key</a> <var> key</var> ,
2876
2884
<a for=/>origin</a> <var> origin</var> , boolean <var> credentials</var> , string <var> proxy</var> ,
2877
2885
<a for=/>host</a> <var> host</var> , <a for=/>connection timing info</a> <var> timingInfo</var> , and
@@ -2925,9 +2933,11 @@ boolean <var>http3Only</var>, run these steps:
2925
2933
2926
2934
<li><p> Return <var> connection</var> .
2927
2935
</ol>
2936
+ </div>
2928
2937
2929
2938
<hr>
2930
2939
2940
+ <div algorithm>
2931
2941
<p> To <dfn>record connection timing info</dfn> given a <a for=/>connection</a>
2932
2942
<var> connection</var> , let <var> timingInfo</var> be <var> connection</var> 's
2933
2943
<a for=connection>timing info</a> and observe these requirements:
@@ -2977,6 +2987,7 @@ boolean <var>http3Only</var>, run these steps:
2977
2987
2978
2988
<p class=note> The <a for=/>clamp and coarsen connection timing info</a> algorithm ensures that
2979
2989
details of reused connections are not exposed and time values are coarsened.
2990
+ </div>
2980
2991
2981
2992
2982
2993
<h3 id=network-partition-keys>Network partition keys</h3>
0 commit comments