Chromium Code Reviews| Index: Source/platform/weborigin/SecurityOrigin.h |
| diff --git a/Source/platform/weborigin/SecurityOrigin.h b/Source/platform/weborigin/SecurityOrigin.h |
| index 030aaf75963966c795a47f6c6b51e542884e2c9e..3a846a4a8d264900d6b6c2e5aed7e09585b389a7 100644 |
| --- a/Source/platform/weborigin/SecurityOrigin.h |
| +++ b/Source/platform/weborigin/SecurityOrigin.h |
| @@ -92,11 +92,17 @@ public: |
| // script from one security origin to read or write objects from |
| // another SecurityOrigin. |
| bool canAccess(const SecurityOrigin*) const; |
| + // Same as canAccess, except that it adds an additional check to make sure |
|
jochen (gone - plz use gerrit)
2015/06/12 12:50:24
maybe add some words for developers to figure out
jww
2015/06/12 15:40:44
I've added some clarifications to the comments. Fo
|
| + // that the SecurityOrigins have the same suborigin name. |
| + bool canAccessCheckSuborigins(const SecurityOrigin*) const; |
| // Returns true if this SecurityOrigin can read content retrieved from |
| // the given URL. For example, call this function before issuing |
| // XMLHttpRequests. |
| bool canRequest(const KURL&) const; |
| + // Same as canRequest, except that it adds an additional check to make sure |
| + // that the SecurityOrigin does not have a suborigin name. |
| + bool canRequestNoSuborigin(const KURL&) const; |
| // Returns true if drawing an image from this URL taints a canvas from |
| // this security origin. For example, call this function before |
| @@ -206,6 +212,7 @@ public: |
| // This method checks for equality, ignoring the value of document.domain |
| // (and whether it was set) but considering the host. It is used for postMessage. |
| bool isSameSchemeHostPort(const SecurityOrigin*) const; |
| + bool isSameSchemeHostPortAndSuborigin(const SecurityOrigin*) const; |
| bool needsDatabaseIdentifierQuirkForFiles() const { return m_needsDatabaseIdentifierQuirkForFiles; } |
| @@ -228,6 +235,7 @@ private: |
| friend class SecurityOriginTest; |
| friend class SecurityOriginTest_Suborigins_Test; |
| friend class SecurityOriginTest_SuboriginsParsing_Test; |
| + friend class SecurityOriginTest_SuboriginsIsSameSchemeHostPortAndSuborigin_Test; |
| SecurityOrigin(); |
| explicit SecurityOrigin(const KURL&); |