@@ -2141,7 +2141,7 @@ Unless stated otherwise, it is false.
2141
2141
<p> A <a for=/>request</a> has an associated
2142
2142
<dfn export for=request id=https-upgrade-fallback-url>https-upgrade-fallback-url</dfn> . It is a copy
2143
2143
of the <a for=/>request</a> 's original <a for=/>URL</a> before <a for=/>request</a> is
2144
- <a for ="#https-upgrades-upgrade">optionally upgraded to HTTPS</a> . Unless stated otherwise, it is
2144
+ <a href ="#https-upgrades-upgrade">optionally upgraded to HTTPS</a> . Unless stated otherwise, it is
2145
2145
unset.
2146
2146
2147
2147
<p class=note> This flag is for exclusive use by https-upgrades algorithm.
@@ -3252,11 +3252,11 @@ through TLS using ALPN. The protocol cannot be spoofed through HTTP requests in
3252
3252
3253
3253
<h3 id=https-upgrades>HTTPS upgrading</h3>
3254
3254
3255
- <div algorithm>
3255
+ <div algorithm="https-upgrades" >
3256
3256
3257
- <p> User agents may optionally upgrade requests with <a>potentially untrustworthy URL</a> s
3258
- to attempt to fetch them over <a>potentially trustworthy URL</a> s. If an upgraded request
3259
- fails with a network error, it is retried over the original URL.
3257
+ <p> User agents may optionally upgrade requests with URLs that are not
3258
+ <a>potentially trustworthy URLs</a> to attempt to fetch them over <a>potentially trustworthy URL</a> s.
3259
+ If an upgraded request fails with a network error, it is retried over the original URL.
3260
3260
3261
3261
<p> The HTTPS upgrading algorithm consists of Upgrade and Fallback algorithms, with the following
3262
3262
steps:
@@ -3280,9 +3280,10 @@ steps:
3280
3280
<li><p><var> request</var> 's <a for="request">URL</a>' s <a for="url">host</a> is exempted from
3281
3281
upgrades in an <a>implementation-defined</a> way.
3282
3282
3283
- <p class="example"> If <a for=url>host</a> is a non-registrable or non-assignable domain name
3284
- such as .local or an IP address that falls in a range reserved for non-publicly routable
3285
- networks, the implementation might return without modifying <var> request</var> .
3283
+ <p class="example" id="example-https-upgrades-exempted-hosts"> If <a for=url>host</a> is a
3284
+ non-registrable or non-assignable domain name such as .local or an IP address that falls in a
3285
+ range reserved for non-publicly routable networks, the implementation might return without
3286
+ modifying <var> request</var> .
3286
3287
</ul>
3287
3288
</li>
3288
3289
@@ -3313,7 +3314,7 @@ To run <dfn>HTTPS upgrade fallback</dfn> given a <a for=/>request</a>
3313
3314
<p> If <var> response</var> is a network error, run the following steps:
3314
3315
<p class="note"> This means that the upgrade failed and initiates a fallback load.
3315
3316
<ol>
3316
- <li><p> Let <var> fallbackResponse</var> be a new <a>Response</a> with its <code> Location</code> header set to
3317
+ <li><p> Let <var> fallbackResponse</var> be a new <a for=/ >Response</a> with its <code> Location</code> header set to
3317
3318
<code> https-upgrade-fallback-url</code> , and its <a for="response">status</a> set to 307.
3318
3319
<li> Return <var> fallbackResponse</var> .
3319
3320
</ol>
@@ -3324,12 +3325,12 @@ To run <dfn>HTTPS upgrade fallback</dfn> given a <a for=/>request</a>
3324
3325
</ol>
3325
3326
3326
3327
<p class=note>
3327
- User agents may implement an optional fast-fallback path by canceling slow fetches on upgraded
3328
- requests and quickly initiate a fallback http load.
3328
+ User agents can implement a fast-fallback path by canceling slow fetches on upgraded
3329
+ requests, in order to quickly initiate a fallback http load.
3329
3330
3330
3331
</div>
3331
3332
3332
- <h4>Examples</h4>
3333
+ <h4 id=http-upgrades-examples >Examples</h4>
3333
3334
3334
3335
<div id=example-https-upgrade-good-https class=example>
3335
3336
<p>
0 commit comments