From a81448e472697938afbf236844c2c3fbda6f2497 Mon Sep 17 00:00:00 2001 From: Daniel Vogelheim Date: Thu, 12 Sep 2024 14:48:43 +0200 Subject: [PATCH] Editorial hygiene: No bikeshed warnings. --- index.bs | 38 +++++++++++++++++++------------------- 1 file changed, 19 insertions(+), 19 deletions(-) diff --git a/index.bs b/index.bs index 9ca054d..ae81ef6 100644 --- a/index.bs +++ b/index.bs @@ -17,16 +17,16 @@ Indent: 2 Work Status: exploring Boilerplate: omit conformance Markup Shorthands: css off, markdown on -WPT Display: inline -WPT Path Prefix: /sanitizer-api/ + +
-text: innerHTML; type: attribute; for: Element; url: https://html.spec.whatwg.org/#dom-element-innerhtml
 text: window.toStaticHTML(); type: method; url: https://msdn.microsoft.com/en-us/library/cc848922(v=vs.85).aspx
-text: createDocumentFragment; type: method; url: https://dom.spec.whatwg.org/#dom-document-createdocumentfragment
-text: template contents; type: dfn; url: https://html.spec.whatwg.org/#template-contents
-text: parse HTML from a string; type: dfn; url: https://html.spec.whatwg.org/#parse-html-from-a-string
 text: internal slot; type:dfn; url: https://tc39.es/ecma262/#sec-ordinary-object-internal-methods-and-internal-slots
+text: parse HTML from a string; type: dfn; url: https://html.spec.whatwg.org/#parse-html-from-a-string
 
 {
@@ -94,7 +94,7 @@ configuration. The methods come in two by two flavours:
   script. That is, they should be safe from XSS. The "unsafe" methods will parse
   and filter whatever they're supposed to.
 * Context: Methods are defined on {{Element}} and {{ShadowRoot}} and will
-  replace these {{Node}}'s children, and are largely analogous to {{innerHTML}}.
+  replace these {{Node}}'s children, and are largely analogous to {{Element/innerHTML}}.
   There are also static methods on the {{Document}}, which parse an entire
   document are largely analogous to {{DOMParser}}.{{parseFromString()}}.
 
@@ -114,8 +114,8 @@ partial interface Element {
 };
 
-
-{{Element}}'s setHTMLUnsafe(|html|, |options|) method steps are: +
+{{Element}}'s setHTMLUnsafe(|html|, |options|) method steps are: 1. Let |compliantHTML| be the result of invoking the [$Get Trusted Type compliant string$] algorithm with {{TrustedHTML}}, [=this=]'s [=relevant global object=], |html|, "Element setHTMLUnsafe", and "script". @@ -125,8 +125,8 @@ partial interface Element {
-
-{{Element}}'s setHTML(|html|, |options|) method steps are: +
+{{Element}}'s setHTML(|html|, |options|) method steps are: 1. Let |target| be [=this=]'s [=template contents=] if [=this=] is a {{HTMLTemplateElement|template}}; otherwise [=this=]. @@ -143,8 +143,8 @@ partial interface ShadowRoot { These methods are mirrored on the {{ShadowRoot}}: -
-{{ShadowRoot}}'s setHTMLUnsafe(|html|, |options|) method steps are: +
+{{ShadowRoot}}'s setHTMLUnsafe(|html|, |options|) method steps are: 1. Let |compliantHTML| be the result of invoking the [$Get Trusted Type compliant string$] algorithm with {{TrustedHTML}}, [=this=]'s [=relevant global object=], |html|, "ShadowRoot setHTMLUnsafe", and "script". @@ -154,8 +154,8 @@ These methods are mirrored on the {{ShadowRoot}}:
-
-{{ShadowRoot}}'s setHTML(|html|, |options|) method steps are: +
+{{ShadowRoot}}'s setHTML(|html|, |options|) method steps are: 1. [=Set and filter HTML=] using [=this=] (as target), [=this=] (as context element), |html|, |options|, and true. @@ -171,8 +171,8 @@ partial interface Document { }; -
-The parseHTMLUnsafe(|html|, |options|) method steps are: +
+The parseHTMLUnsafe(|html|, |options|) method steps are: 1. Let |compliantHTML| be the result of invoking the [$Get Trusted Type compliant string$] algorithm with {{TrustedHTML}}, [=this=]'s [=relevant global object=], |html|, "Document parseHTMLUnsafe", and "script". @@ -190,8 +190,8 @@ The parseHTMLUnsafe(|html|, |options|) method step
-
-The parseHTML(|html|, |options|) method steps are: +
+The parseHTML(|html|, |options|) method steps are: 1. Let |document| be a new {{Document}}, whose [=Document/content type=] is "text/html".