@@ -1777,7 +1777,7 @@ to not have to set <a for=/>request</a>'s <a for=request>referrer</a>.
17771777<p> A <a for=/>request</a> has an associated
17781778<dfn export for=request id=concept-request-mode>mode</dfn> , which is
17791779"<code> same-origin</code> ", "<code> cors</code> ", "<code> no-cors</code> ",
1780- "<code> navigate</code> ", "<code> unsafe -no-cors</code> ", or "<code> websocket</code> ".
1780+ "<code> navigate</code> ", "<code> user-agent -no-cors</code> ", or "<code> websocket</code> ".
17811781Unless stated otherwise, it is "<code> no-cors</code> ".
17821782
17831783<div class="note no-backref">
@@ -1800,7 +1800,7 @@ Unless stated otherwise, it is "<code>no-cors</code>".
18001800 <dt> "<code> navigate</code> "
18011801 <dd> This is a special mode used only when <a>navigating</a> between documents.
18021802
1803- <dt> "<code> unsafe -no-cors</code> "
1803+ <dt> "<code> user-agent -no-cors</code> "
18041804 <dd> This is a special mode for the [=user agent=] to use internally to wittingly make
18051805 requests that are unsafe. It restricts a <a for=/>request</a> to using <a>CORS-safelisted methods</a> ,
18061806 <a>CORS-safelisted request-headers</a> , and the <a for=/>request</a> must have a <a>parallel queue</a>
@@ -1810,7 +1810,7 @@ Unless stated otherwise, it is "<code>no-cors</code>".
18101810 <a>Cross-Origin-Embedder-Policy allows credentials</a> . Upon success a fetch will
18111811 return a <a>basic filtered response</a> .
18121812
1813- <p class=warning> Using <a for=/>request</a> <a for=request>mode</a> "<code> unsafe -no-cors</code> "
1813+ <p class=warning> Using <a for=/>request</a> <a for=request>mode</a> "<code> user-agent -no-cors</code> "
18141814 is even more discouraged and unsafe than "<code> no-cors</code> ". Any use of this mode must be
18151815 memory-isolated to the [=user agent=] to contain its results and prevent their disclosure or misuse.
18161816 This <a for=request>mode</a> is deliberately not exposed in the {{RequestMode}} .
@@ -1830,7 +1830,7 @@ Unless stated otherwise, it is "<code>no-cors</code>".
18301830<dfn for=request>omit origin flag</dfn> . Unless stated otherwise it is unset.
18311831
18321832<p class="note no-backref"> The <a for=request>omit origin flag</a> only has effect when
1833- <a for=/>request</a> 's <a for=request>mode</a> is "<code> unsafe -no-cors</code> ".
1833+ <a for=/>request</a> 's <a for=request>mode</a> is "<code> user-agent -no-cors</code> ".
18341834
18351835<p> A <a for=/>request</a> has an associated
18361836<dfn id=use-cors-preflight-flag export for=request>use-CORS-preflight flag</dfn> . Unless stated
@@ -3102,7 +3102,7 @@ given a <a for=/>request</a> <var>request</var>, run these steps:
31023102
31033103 <li><p> If <var> request</var> 's <a for=request>response tainting</a> is "<code> cors</code> " or
31043104 <var> request</var> 's <a for=request>mode</a> is "<code> websocket</code> " or
3105- "<code> unsafe -no-cors</code> ", then <a for="header list">append</a>
3105+ "<code> user-agent -no-cors</code> ", then <a for="header list">append</a>
31063106 (`<code> Origin</code> `, <var> serializedOrigin</var> ) to
31073107 <var> request</var> 's <a for=request>header list</a> .
31083108
@@ -4010,7 +4010,7 @@ the request.
40104010 <var> processEarlyHintsResponse</var> is null.
40114011
40124012 <p> If <var> fetchParams</var> 's <a for="fetch params">request</a>' s <a for=request>mode</a> is
4013- "<code> unsafe -no-cors</code> ": <a for=/>assert</a> : <var> fetchParams</var> 's
4013+ "<code> user-agent -no-cors</code> ": <a for=/>assert</a> : <var> fetchParams</var> 's
40144014 <a for="fetch params">task destination</a> is a <a for=/>parallel queue</a> .
40154015
40164016 <p class=note> Processing of early hints (<a for=/>responses</a> whose <a for=response>status</a>
@@ -4072,7 +4072,7 @@ the request.
40724072 "<code> no-window</code> ".
40734073
40744074 <li><p> If <var> request</var> 's <a for=request>origin</a> is "<code> client</code> " and either
4075- <var> request</var> 's <a for=request>mode</a> is not "<code> unsafe -no-cors</code> " or
4075+ <var> request</var> 's <a for=request>mode</a> is not "<code> user-agent -no-cors</code> " or
40764076 and <var> request</var> 's <a for=request>omit origin flag</a> is unset, then set
40774077 <var> request</var> 's <a for=request>origin</a> to <var>request</var>' s <a for=request>client</a> 's
40784078 <a for="environment settings object">origin</a> .
@@ -4085,7 +4085,7 @@ the request.
40854085 <a>HTTP(S) scheme</a>
40864086
40874087 <li><p><var> request</var> 's <a for=request>mode</a> is "<code> same-origin</code> ",
4088- "<code> cors</code> ", "<code> no-cors</code> ", or "<code> unsafe -no-cors</code> "
4088+ "<code> cors</code> ", "<code> no-cors</code> ", or "<code> user-agent -no-cors</code> "
40894089
40904090 <li><p><var> request</var> 's <a for=request>window</a> is not null
40914091
@@ -4101,7 +4101,7 @@ the request.
41014101 <li><p> <a for=/>Assert</a> : <var> request</var> 's <a for=request>origin</a> is <a>same origin</a>
41024102 with <var> request</var> 's <a for=request>client</a>' s
41034103 <a for="environment settings object">origin</a> or <var> request</var> 's <a for=request>mode</a>
4104- is "<code> unsafe -no-cors</code> ".
4104+ is "<code> user-agent -no-cors</code> ".
41054105
41064106 <li><p> Let <var> onPreloadedResponseAvailable</var> be an algorithm that runs the following
41074107 step given a <a for=/>response</a> <var> response</var> : set <var> fetchParams</var> 's
@@ -4337,7 +4337,7 @@ steps:
43374337 <li><p> Return <var> corsWithPreflightResponse</var> .
43384338 </ol>
43394339
4340- <dt><var> request</var> 's <a for=request>mode</a> is "<code> unsafe -no-cors</code> "
4340+ <dt><var> request</var> 's <a for=request>mode</a> is "<code> user-agent -no-cors</code> "
43414341 <dd>
43424342 <ol>
43434343 <li><p> Set <var> request</var> 's <a for=request>response tainting</a> to
@@ -4832,7 +4832,7 @@ these steps:
48324832 <li><p><var> request</var> 's <a for=request>mode</a> is not "<code> no-cors</code> " and
48334833 <var> response</var> 's <a for=response>type</a> is "<code> opaque</code> "
48344834
4835- <li><p><var> request</var> 's <a for=request>mode</a> is "<code> unsafe -no-cors</code> "
4835+ <li><p><var> request</var> 's <a for=request>mode</a> is "<code> user-agent -no-cors</code> "
48364836
48374837 <li><var> request</var> 's <a for=request>redirect mode</a> is not "<code> manual</code> " and
48384838 <var> response</var> 's <a for=response>type</a> is "<code> opaqueredirect</code> "
@@ -5190,7 +5190,7 @@ run these steps:
51905190 <var> httpRequest</var> 's <a for=request>header list</a> .
51915191 </ol>
51925192
5193- <li> If either <var> request</var> 's <a for=request>mode</a> is not "<code> unsafe -no-cors</code> "
5193+ <li> If either <var> request</var> 's <a for=request>mode</a> is not "<code> user-agent -no-cors</code> "
51945194 or <var> request</var> 's <a for=request>omit origin flag</a> is not set,
51955195 <p> <a>append a request `<code>Origin</code>` header</a> for <var> httpRequest</var> .
51965196
0 commit comments