Skip to content

Commit

Permalink
Meta: cleanup spec-citation markup
Browse files Browse the repository at this point in the history
This change normalizes the markup for spec citations to consistently
omit quotation marks.

There are 500+ instances of spec citations in the source, more than 90%
which of which use markup in the form `<ref spec=CSSOMVIEW>`. But there
are about 48 instances that were added to the spec instead in the form
`<ref spec="CSP">`, with quotation marks around this spec abbreviation.

This change drops the quotation marks from those 48 instances.
  • Loading branch information
sideshowbarker authored Aug 20, 2020
1 parent bd32618 commit 076d2d0
Showing 1 changed file with 46 additions and 44 deletions.
90 changes: 46 additions & 44 deletions source
Original file line number Diff line number Diff line change
Expand Up @@ -2338,7 +2338,8 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute

<p>This specification also references the <dfn
data-x-href="https://www.w3.org/TR/xml-stylesheet/#the-xml-stylesheet-processing-instruction"><code>&lt;?xml-stylesheet?></code></dfn>
processing instruction, defined in <cite>Associating Style Sheets with XML documents</cite>. <ref spec="XMLSSPI"></p>
processing instruction, defined in <cite>Associating Style Sheets with XML documents</cite>.
<ref spec=XMLSSPI></p>

<p>This specification also non-normatively mentions the <dfn><code>XSLTProcessor</code></dfn>
interface and its <dfn><code
Expand Down Expand Up @@ -2414,14 +2415,14 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute
<p>A number of schemes and protocols are referenced by this specification also:</p>

<ul class="brief">
<li>The <dfn data-x="about protocol" data-x-href="https://tools.ietf.org/html/rfc6694#section-2"><code>about:</code></dfn> scheme <ref spec="ABOUT"></li>
<li>The <dfn data-x="blob protocol" data-x-href="https://w3c.github.io/FileAPI/#DefinitionOfScheme"><code>blob:</code></dfn> scheme <ref spec="FILEAPI"></li>
<li>The <dfn data-x="about protocol" data-x-href="https://tools.ietf.org/html/rfc6694#section-2"><code>about:</code></dfn> scheme <ref spec=ABOUT></li>
<li>The <dfn data-x="blob protocol" data-x-href="https://w3c.github.io/FileAPI/#DefinitionOfScheme"><code>blob:</code></dfn> scheme <ref spec=FILEAPI></li>
<li>The <dfn data-x="data protocol" data-x-href="https://tools.ietf.org/html/rfc2397#section-2"><code>data:</code></dfn> scheme <ref spec=RFC2397></li>
<li>The <dfn data-x="http protocol" data-x-href="https://tools.ietf.org/html/rfc7230#section-2.7.1"><code>http:</code></dfn> scheme <ref spec="HTTP"></li>
<li>The <dfn data-x="https protocol" data-x-href="https://tools.ietf.org/html/rfc7230#section-2.7.2"><code>https:</code></dfn> scheme <ref spec="HTTP"></li>
<li>The <dfn data-x="mailto protocol" data-x-href="https://tools.ietf.org/html/rfc6068#section-2"><code>mailto:</code></dfn> scheme <ref spec="MAILTO"></li>
<li>The <dfn data-x="sms protocol" data-x-href="https://tools.ietf.org/html/rfc5724#section-2"><code>sms:</code></dfn> scheme <ref spec="SMS"></li>
<li>The <dfn data-x="urn protocol" data-x-href="https://tools.ietf.org/html/rfc2141#section-2"><code>urn:</code></dfn> scheme <ref spec="URN"></li>
<li>The <dfn data-x="http protocol" data-x-href="https://tools.ietf.org/html/rfc7230#section-2.7.1"><code>http:</code></dfn> scheme <ref spec=HTTP></li>
<li>The <dfn data-x="https protocol" data-x-href="https://tools.ietf.org/html/rfc7230#section-2.7.2"><code>https:</code></dfn> scheme <ref spec=HTTP></li>
<li>The <dfn data-x="mailto protocol" data-x-href="https://tools.ietf.org/html/rfc6068#section-2"><code>mailto:</code></dfn> scheme <ref spec=MAILTO></li>
<li>The <dfn data-x="sms protocol" data-x-href="https://tools.ietf.org/html/rfc5724#section-2"><code>sms:</code></dfn> scheme <ref spec=SMS></li>
<li>The <dfn data-x="urn protocol" data-x-href="https://tools.ietf.org/html/rfc2141#section-2"><code>urn:</code></dfn> scheme <ref spec=URN></li>
</ul>

<p><dfn data-x-href="https://www.w3.org/TR/media-frags/#media-fragment-syntax">Media fragment
Expand Down Expand Up @@ -3794,7 +3795,7 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute
<dt>Content Security Policy</dt>

<dd>
<p>The following terms are defined in <cite>Content Security Policy</cite>: <ref spec="CSP"></p>
<p>The following terms are defined in <cite>Content Security Policy</cite>: <ref spec=CSP></p>

<ul class="brief">
<li><dfn data-x-href="https://w3c.github.io/webappsec-csp/#content-security-policy-object">Content Security Policy</dfn></li>
Expand Down Expand Up @@ -3823,7 +3824,7 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute
<dt>Service Workers</dt>

<dd>
<p>The following terms are defined in <cite>Service Workers</cite>: <ref spec="SW"></p>
<p>The following terms are defined in <cite>Service Workers</cite>: <ref spec=SW></p>

<ul class="brief">
<li><dfn data-x="dfn-active-worker" data-x-href="https://w3c.github.io/ServiceWorker/#dfn-active-worker">active worker</dfn></li>
Expand Down Expand Up @@ -3853,7 +3854,8 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute
<dt>Permissions Policy</dt>

<dd>
<p>The following terms are defined in <cite>Permissions Policy</cite>: <ref spec="PERMISSIONSPOLICY"></p>
<p>The following terms are defined in <cite>Permissions Policy</cite>: <ref
spec=PERMISSIONSPOLICY></p>

<ul class="brief">
<li><dfn data-x="concept-permissions-policy" data-x-href="https://w3c.github.io/webappsec-feature-policy/#permissions-policy">permissions policy</dfn></li>
Expand Down Expand Up @@ -12053,7 +12055,7 @@ Transport Protocol">HTTP&lt;/abbr> today.&lt;/p></code></pre> <!-- DO NOT REWRAP
Policy?</span> algorithm returns "<code data-x="">Blocked</code>" when executed upon the
attribute's <span>element</span>, "<code data-x="">style attribute</code>", and the attribute's
value, then the style rules defined in the attribute's value must not be applied to the
<span>element</span>. <ref spec="CSP"></p>
<span>element</span>. <ref spec=CSP></p>

</div>

Expand Down Expand Up @@ -13257,7 +13259,7 @@ interface <dfn>HTMLLinkElement</dfn> : <span>HTMLElement</span> {
<code>link</code> elements that have a <code data-x="attr-link-rel">rel</code> attribute
that contains the <code data-x="rel-stylesheet">stylesheet</code>, <code
data-x="rel-preload">preload</code>, or <code data-x="rel-modulepreload">modulepreload</code>
keyword. <ref spec="SRI"></p>
keyword. <ref spec=SRI></p>

<p>The <dfn><code data-x="attr-link-hreflang">hreflang</code></dfn> attribute on the
<code>link</code> element has the same semantics as the <span
Expand Down Expand Up @@ -14005,7 +14007,7 @@ interface <dfn>HTMLMetaElement</dfn> : <span>HTMLElement</span> {

<dd>
<p>The value must be a <span>referrer policy</span>, which defines the default <span>referrer
policy</span> for the <code>Document</code>. <ref spec="REFERRERPOLICY"></p>
policy</span> for the <code>Document</code>. <ref spec=REFERRERPOLICY></p>

<div w-nodev>

Expand Down Expand Up @@ -14071,7 +14073,7 @@ interface <dfn>HTMLMetaElement</dfn> : <span>HTMLElement</span> {

<p class="note">The fact that these steps are applied for each element enables <a
href="https://w3c.github.io/webappsec-referrer-policy/#unknown-policy-values">deployment of
fallback values for older user agents</a>. <ref spec="REFERRERPOLICY"></p>
fallback values for older user agents</a>. <ref spec=REFERRERPOLICY></p>
</li>
</ol>

Expand Down Expand Up @@ -14703,7 +14705,7 @@ people expect to have work and what is necessary.

<dd>
<p>This pragma <span data-x="enforce the policy">enforces</span> a <span>Content Security
Policy</span> on a <code>Document</code>. <ref spec="CSP"></p>
Policy</span> on a <code>Document</code>. <ref spec=CSP></p>

<div w-nodev>

Expand Down Expand Up @@ -14739,7 +14741,7 @@ people expect to have work and what is necessary.
directive">sandbox</code> <span data-x="Content Security Policy directive">directives</span>.
The <span>Content Security Policy</span> given in the <code
data-x="attr-meta-content">content</code> attribute will be <span
data-x="enforce the policy">enforced</span> upon the current document. <ref spec="CSP"></p>
data-x="enforce the policy">enforced</span> upon the current document. <ref spec=CSP></p>

<div class="example">

Expand Down Expand Up @@ -14959,7 +14961,7 @@ interface <dfn>HTMLStyleElement</dfn> : <span>HTMLElement</span> {
<li><p>If the <span>Should element's inline behavior be blocked by Content Security
Policy?</span> algorithm returns "<code data-x="">Blocked</code>" when executed upon the
<code>style</code> element, "<code data-x="">style</code>", and the <code>style</code>
element's <span>child text content</span>, then return. <ref spec="CSP"></p></li>
element's <span>child text content</span>, then return. <ref spec=CSP></p></li>

<li>
<p><span>Create a CSS style sheet</span> with the following properties:</p>
Expand Down Expand Up @@ -25232,7 +25234,7 @@ document.body.appendChild(wbr);</code></pre>
example, a user agent may wish to use the less-costly <code
data-x="rel-preconnect">preconnect</code> hint when trying to conserve data, battery power, or
processing power, or may wish to pick a resource hint depending on heuristic analysis of past
user behavior in similar scenarios. <ref spec="RESOURCEHINTS"></p>
user behavior in similar scenarios. <ref spec=RESOURCEHINTS></p>


<h6>Link type "<dfn><code data-x="rel-prev">prev</code></dfn>"</h6>
Expand Down Expand Up @@ -30385,7 +30387,7 @@ interface <dfn>HTMLIFrameElement</dfn> : <span>HTMLElement</span> {
when the <span data-x="concept-document-permissions-policy">permissions policy</span> for a
<span>Document</span> in the <code>iframe</code>'s <span>nested browsing context</span> is
initialized. Its value must be a <span data-x="concept-serialized-permissions-policy">serialized
permissions policy</span>. <ref spec="PERMISSIONSPOLICY">
permissions policy</span>. <ref spec=PERMISSIONSPOLICY></p>

<div class="example">
<p>In this example, an <code>iframe</code> is used to embed a map from an online navigation
Expand All @@ -30401,7 +30403,7 @@ interface <dfn>HTMLIFrameElement</dfn> : <span>HTMLElement</span> {
<span data-x="concept-document-permissions-policy">permissions policy</span> which allows the "<code
data-x="">fullscreen</code>" feature to be used from any <span>origin</span>. This is enforced by
the <span data-x="process-permissions-policy-attributes">process permissions policy
attributes</span> algorithm. <ref spec="PERMISSIONSPOLICY">
attributes</span> algorithm. <ref spec=PERMISSIONSPOLICY></p>

<div class="example">

Expand All @@ -30428,7 +30430,7 @@ interface <dfn>HTMLIFrameElement</dfn> : <span>HTMLElement</span> {
data-x="">payment</code>" feature to be used to make payment requests from any
<span>origin</span>. This is enforced by the <span
data-x="process-permissions-policy-attributes">Process permissions policy attributes</span>
algorithm. <ref spec="PERMISSIONSPOLICY">
algorithm. <ref spec=PERMISSIONSPOLICY></p>

<p class="note">None of these attributes, <code data-x="attr-iframe-allow">allow</code>,
<code data-x="attr-iframe-allowfullscreen">allowfullscreen</code> or <code
Expand Down Expand Up @@ -30718,7 +30720,7 @@ interface <dfn>HTMLEmbedElement</dfn> : <span>HTMLElement</span> {

<li><p>If the <span>Should element be blocked <i lang="la">a priori</i> by Content Security
Policy?</span> algorithm returns "<code data-x="">Blocked</code>" when executed on
<var>element</var>, then return. <ref spec="CSP"></p></li>
<var>element</var>, then return. <ref spec=CSP></p></li>

<li>
<p>If <var>element</var> has a <code data-x="attr-embed-src">src</code> attribute set, then:</p>
Expand Down Expand Up @@ -31146,7 +31148,7 @@ interface <dfn>HTMLObjectElement</dfn> : <span>HTMLElement</span> {
element is not <span>being rendered</span>, or if the <span>Should element be blocked
<i lang="la">a priori</i> by Content Security Policy?</span> algorithm returns "<code
data-x="">Blocked</code>" when executed on the element, then jump to the step below labeled
<i>fallback</i>. <ref spec="CSP"></p>
<i>fallback</i>. <ref spec=CSP></p>
</li>

<li>
Expand Down Expand Up @@ -57495,7 +57497,7 @@ interface <dfn>HTMLScriptElement</dfn> : <span>HTMLElement</span> {
data-x="concept-request-integrity-metadata">integrity metadata</span> for requests which this
element is responsible for. The value is text. The <code
data-x="attr-script-integrity">integrity</code> attribute must not be specified when the
<code data-x="attr-script-src">src</code> attribute is not specified. <ref spec="SRI"></p>
<code data-x="attr-script-src">src</code> attribute is not specified. <ref spec=SRI></p>

<p>The <dfn><code data-x="attr-script-referrerpolicy">referrerpolicy</code></dfn> attribute is a
<span>referrer policy attribute</span>. Its purpose is to set the <span>referrer policy</span>
Expand Down Expand Up @@ -57943,7 +57945,7 @@ o............A....e
behavior be blocked by Content Security Policy?</span> algorithm returns "<code
data-x="">Blocked</code>" when executed upon the <code>script</code> element, "<code
data-x="">script</code>", and <var>source text</var>, then return. The script is not executed.
<ref spec="CSP"></p></li>
<ref spec=CSP></p></li>

<li id="script-processing-for">

Expand Down Expand Up @@ -64094,7 +64096,7 @@ function AddCloud(data, x, y) { ... }</code></pre>
<p>A <span>&lt;filter-function-list&gt;</span> value consists of a sequence of one or more
filter functions or references to SVG filters. The input to the filter is used as the input
to the first item in the list. Subsequent items take the output of the previous item as
their input. <ref spec="FILTERS"></p>
their input. <ref spec=FILTERS></p>

<p>Coordinates used in the value of the <code
data-x="dom-context-2d-filter">filter</code> attribute are interpreted such that one pixel is
Expand Down Expand Up @@ -91048,31 +91050,31 @@ import "https://example.com/foo/../module2.mjs";</code></pre>

<li><p>For each <span>fully active</span> <code>Document</code> in <var>docs</var>, <span>run
the resize steps</span> for that <code>Document</code>, passing in <var>now</var> as the
timestamp. <ref spec="CSSOMVIEW"></p></li>
timestamp. <ref spec=CSSOMVIEW></p></li>

<li><p>For each <span>fully active</span> <code>Document</code> in <var>docs</var>, <span>run
the scroll steps</span> for that <code>Document</code>, passing in <var>now</var> as the
timestamp. <ref spec="CSSOMVIEW"></p></li>
timestamp. <ref spec=CSSOMVIEW></p></li>

<li><p>For each <span>fully active</span> <code>Document</code> in <var>docs</var>,
<span>evaluate media queries and report changes</span> for that <code>Document</code>, passing
in <var>now</var> as the timestamp. <ref spec="CSSOMVIEW"></p></li>
in <var>now</var> as the timestamp. <ref spec=CSSOMVIEW></p></li>

<li><p>For each <span>fully active</span> <code>Document</code> in <var>docs</var>,
<span>update animations and send events</span> for that <code>Document</code>, passing in
<var>now</var> as the timestamp. <ref spec="WEBANIMATIONS"></p></li>
<var>now</var> as the timestamp. <ref spec=WEBANIMATIONS></p></li>

<li><p>For each <span>fully active</span> <code>Document</code> in <var>docs</var>, <span>run
the fullscreen steps</span> for that <code>Document</code>, passing in <var>now</var> as the
timestamp. <ref spec="FULLSCREEN"></p></li>
timestamp. <ref spec=FULLSCREEN></p></li>

<li><p>For each <span>fully active</span> <code>Document</code> in <var>docs</var>, <span>run
the animation frame callbacks</span> for that <code>Document</code>, passing in <var>now</var>
as the timestamp.</p></li>

<li><p>For each <span>fully active</span> <code>Document</code> in <var>docs</var>, <span>run
the update intersection observations steps</span> for that <code>Document</code>, passing in
<var>now</var> as the timestamp. <ref spec="INTERSECTIONOBSERVER"></p></li>
<var>now</var> as the timestamp. <ref spec=INTERSECTIONOBSERVER></p></li>

<li><p>Invoke the <span>mark paint timing</span> algorithm for each <code>Document</code>
object in <var>docs</var>.</p></li>
Expand Down Expand Up @@ -91869,7 +91871,7 @@ import "https://example.com/foo/../module2.mjs";</code></pre>
<li><p>If the <span>Should element's inline behavior be blocked by Content Security
Policy?</span> algorithm returns "<code data-x="">Blocked</code>" when executed upon
<var>element</var>, "<code data-x="">script attribute</code>", and <var>value</var>, then
return. <ref spec="CSP"></p></li>
return. <ref spec=CSP></p></li>

<li><p>Let <var>handlerMap</var> be <var>eventTarget</var>'s <span>event handler
map</span>.</p></li>
Expand Down Expand Up @@ -99765,7 +99767,7 @@ interface <dfn>SharedWorkerGlobalScope</dfn> : <span>WorkerGlobalScope</span> {
</li>

<li><p>Execute the <span>Initialize a <code data-x="">global object</code>'s CSP list</span>
algorithm on <var>worker global scope</var> and <var>response</var>. <ref spec="CSP"></p></li>
algorithm on <var>worker global scope</var> and <var>response</var>. <ref spec=CSP></p></li>

<li><p>Asynchronously complete the <span data-x="fetching-scripts-perform-fetch">perform the
fetch</span> steps with <var>response</var>.</p></li>
Expand Down Expand Up @@ -100387,7 +100389,7 @@ interface <dfn>SharedWorker</dfn> : <span>EventTarget</span> {
<li><p>If <var>workerIsSecureContext</var> is not <var>callerIsSecureContext</var>, then
<span>queue a task</span> to <span data-x="concept-event-fire">fire an event</span> named
<code data-x="event-error">error</code> at <var>worker</var> and abort these steps.
<ref spec="SECURE-CONTEXTS"></p></li>
<ref spec=SECURE-CONTEXTS></p></li>

<li><p>Associate <var>worker</var> with <var>worker global scope</var>.</p></li>

Expand Down Expand Up @@ -120084,7 +120086,7 @@ interface <dfn>External</dfn> {
<th> <code data-x="">integrity</code>
<td> <code data-x="attr-link-integrity">link</code>;
<code data-x="attr-script-integrity">script</code>
<td> Integrity metadata used in <cite>Subresource Integrity</cite> checks <ref spec="SRI">
<td> Integrity metadata used in <cite>Subresource Integrity</cite> checks <ref spec=SRI>
<td> <a href="#attribute-text">Text</a>
<tr>
<th> <code data-x="">is</code>
Expand Down Expand Up @@ -120272,7 +120274,7 @@ interface <dfn>External</dfn> {
<tr>
<th> <code data-x="">nonce</code>
<td> <span data-x="attr-nonce">HTML elements</span>
<td> Cryptographic nonce used in <cite>Content Security Policy</cite> checks <ref spec="CSP">
<td> Cryptographic nonce used in <cite>Content Security Policy</cite> checks <ref spec=CSP>
<td> <a href="#attribute-text">Text</a>
<tr>
<th> <code data-x="">novalidate</code>
Expand Down Expand Up @@ -121848,7 +121850,7 @@ INSERT INTERFACES HERE
<td> <dfn data-dfn-type="event" data-dfn-for="HTMLElement" data-export=""><code data-x="event-securitypolicyviolation">securitypolicyviolation</code></dfn>
<td> <code>Event</code>
<td> Elements
<td> Fired at elements when a Content Security Policy violation is generated <ref spec="CSP">
<td> Fired at elements when a Content Security Policy violation is generated <ref spec=CSP>

<tr> <!-- select -->
<td> <dfn data-dfn-type="event" data-dfn-for="HTMLElement" data-export=""><code data-x="event-select">select</code></dfn>
Expand Down Expand Up @@ -121926,7 +121928,7 @@ INSERT INTERFACES HERE
<dd>JavaScript (legacy type) <ref spec=JAVASCRIPT>

<dt><dfn data-x-href="https://tools.ietf.org/html/rfc2046#section-4.5.1"><code>application/octet-stream</code></dfn></dt>
<dd>Generic binary data <ref spec="RFC2046"></dd>
<dd>Generic binary data <ref spec=RFC2046></dd>

<dt><code>application/microdata+json</code></dt>
<dd>Microdata as JSON
Expand Down Expand Up @@ -121956,10 +121958,10 @@ INSERT INTERFACES HERE
<dd>SVG images <ref spec=SVG></dd>

<dt><dfn><code>multipart/form-data</code></dfn></dt>
<dd>Form submission <ref spec='RFC7578'></dd>
<dd>Form submission <ref spec=RFC7578></dd>

<dt><dfn><code>multipart/mixed</code></dfn></dt>
<dd>Generic mixed content <ref spec=RFC2046 /></dd>
<dd>Generic mixed content <ref spec=RFC2046></dd>

<dt><code>multipart/x-mixed-replace</code></dt>
<dd>Streaming server push</dd>
Expand Down Expand Up @@ -122021,10 +122023,10 @@ INSERT INTERFACES HERE
<dd>Hyperlink auditing</dd>

<dt><dfn><code>text/uri-list</code></dfn></dt>
<dd>List of URLs <ref spec= RFC2483>
<dd>List of URLs <ref spec=RFC2483>

<dt><dfn><code>text/vcard</code></dfn></dt>
<dd>vCard <ref spec =RFC6350>
<dd>vCard <ref spec=RFC6350>

<dt><dfn><code>text/vtt</code></dfn></dt>
<dd>WebVTT <ref spec=WEBVTT></dd>
Expand Down

0 comments on commit 076d2d0

Please sign in to comment.