OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2008 Apple Inc. All Rights Reserved. | 2 * Copyright (C) 2008 Apple Inc. All Rights Reserved. |
3 * Copyright (C) 2012 Google Inc. All Rights Reserved. | 3 * Copyright (C) 2012 Google Inc. All Rights Reserved. |
4 * | 4 * |
5 * Redistribution and use in source and binary forms, with or without | 5 * Redistribution and use in source and binary forms, with or without |
6 * modification, are permitted provided that the following conditions | 6 * modification, are permitted provided that the following conditions |
7 * are met: | 7 * are met: |
8 * 1. Redistributions of source code must retain the above copyright | 8 * 1. Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * 2. Redistributions in binary form must reproduce the above copyright | 10 * 2. Redistributions in binary form must reproduce the above copyright |
(...skipping 45 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
56 class PublicURLManager; | 56 class PublicURLManager; |
57 class SecurityOrigin; | 57 class SecurityOrigin; |
58 class ScriptCallStack; | 58 class ScriptCallStack; |
59 | 59 |
60 class CORE_EXPORT ExecutionContext | 60 class CORE_EXPORT ExecutionContext |
61 : public ContextLifecycleNotifier, public WillBeHeapSupplementable<Execution
Context> { | 61 : public ContextLifecycleNotifier, public WillBeHeapSupplementable<Execution
Context> { |
62 WTF_MAKE_NONCOPYABLE(ExecutionContext); | 62 WTF_MAKE_NONCOPYABLE(ExecutionContext); |
63 public: | 63 public: |
64 DECLARE_VIRTUAL_TRACE(); | 64 DECLARE_VIRTUAL_TRACE(); |
65 | 65 |
66 // Used to specify whether |isPrivilegedContext| should walk the | 66 // Used to specify whether |isSecureContext| should walk the |
67 // ancestor tree to decide whether to restrict usage of a powerful | 67 // ancestor tree to decide whether to restrict usage of a powerful |
68 // feature. | 68 // feature. |
69 enum PrivilegeContextCheck { | 69 enum SecureContextCheck { |
70 StandardPrivilegeCheck, | 70 StandardSecureContextCheck, |
71 WebCryptoPrivilegeCheck | 71 WebCryptoSecureContextCheck |
72 }; | 72 }; |
73 | 73 |
74 virtual bool isDocument() const { return false; } | 74 virtual bool isDocument() const { return false; } |
75 virtual bool isWorkerGlobalScope() const { return false; } | 75 virtual bool isWorkerGlobalScope() const { return false; } |
76 virtual bool isDedicatedWorkerGlobalScope() const { return false; } | 76 virtual bool isDedicatedWorkerGlobalScope() const { return false; } |
77 virtual bool isSharedWorkerGlobalScope() const { return false; } | 77 virtual bool isSharedWorkerGlobalScope() const { return false; } |
78 virtual bool isServiceWorkerGlobalScope() const { return false; } | 78 virtual bool isServiceWorkerGlobalScope() const { return false; } |
79 virtual bool isCompositorWorkerGlobalScope() const { return false; } | 79 virtual bool isCompositorWorkerGlobalScope() const { return false; } |
80 virtual bool isJSExecutionForbidden() const { return false; } | 80 virtual bool isJSExecutionForbidden() const { return false; } |
81 | 81 |
(...skipping 67 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
149 String suboriginName(); | 149 String suboriginName(); |
150 | 150 |
151 // Methods related to window interaction. It should be used to manage window | 151 // Methods related to window interaction. It should be used to manage window |
152 // focusing and window creation permission for an ExecutionContext. | 152 // focusing and window creation permission for an ExecutionContext. |
153 void allowWindowInteraction(); | 153 void allowWindowInteraction(); |
154 void consumeWindowInteraction(); | 154 void consumeWindowInteraction(); |
155 bool isWindowInteractionAllowed() const; | 155 bool isWindowInteractionAllowed() const; |
156 | 156 |
157 // Decides whether this context is privileged, as described in | 157 // Decides whether this context is privileged, as described in |
158 // https://w3c.github.io/webappsec/specs/powerfulfeatures/#settings-privileg
ed. | 158 // https://w3c.github.io/webappsec/specs/powerfulfeatures/#settings-privileg
ed. |
159 virtual bool isPrivilegedContext(String& errorMessage, const PrivilegeContex
tCheck = StandardPrivilegeCheck) const = 0; | 159 virtual bool isSecureContext(String& errorMessage, const SecureContextCheck
= StandardSecureContextCheck) const = 0; |
160 | 160 |
161 virtual void setReferrerPolicy(ReferrerPolicy); | 161 virtual void setReferrerPolicy(ReferrerPolicy); |
162 ReferrerPolicy referrerPolicy() const { return m_referrerPolicy; } | 162 ReferrerPolicy referrerPolicy() const { return m_referrerPolicy; } |
163 | 163 |
164 protected: | 164 protected: |
165 ExecutionContext(); | 165 ExecutionContext(); |
166 virtual ~ExecutionContext(); | 166 virtual ~ExecutionContext(); |
167 | 167 |
168 virtual const KURL& virtualURL() const = 0; | 168 virtual const KURL& virtualURL() const = 0; |
169 virtual KURL virtualCompleteURL(const String&) const = 0; | 169 virtual KURL virtualCompleteURL(const String&) const = 0; |
(...skipping 29 matching lines...) Expand all Loading... |
199 | 199 |
200 Deque<OwnPtr<SuspendableTask>> m_suspendedTasks; | 200 Deque<OwnPtr<SuspendableTask>> m_suspendedTasks; |
201 bool m_isRunSuspendableTasksScheduled; | 201 bool m_isRunSuspendableTasksScheduled; |
202 | 202 |
203 ReferrerPolicy m_referrerPolicy; | 203 ReferrerPolicy m_referrerPolicy; |
204 }; | 204 }; |
205 | 205 |
206 } // namespace blink | 206 } // namespace blink |
207 | 207 |
208 #endif // ExecutionContext_h | 208 #endif // ExecutionContext_h |
OLD | NEW |