Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(10)

Side by Side Diff: third_party/WebKit/Source/platform/weborigin/SecurityPolicy.h

Issue 1383483007: Add scheme exceptions for isSecureContext (Closed) Base URL: https://chromium.googlesource.com/chromium/src@master
Patch Set: Update check for sandbox Created 5 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * Copyright (C) 2011 Google Inc. All rights reserved. 2 * Copyright (C) 2011 Google Inc. All rights reserved.
3 * 3 *
4 * Redistribution and use in source and binary forms, with or without 4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions 5 * modification, are permitted provided that the following conditions
6 * are met: 6 * are met:
7 * 7 *
8 * 1. Redistributions of source code must retain the above copyright 8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer. 9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright 10 * 2. Redistributions in binary form must reproduce the above copyright
(...skipping 47 matching lines...) Expand 10 before | Expand all | Expand 10 after
58 static void addOriginAccessWhitelistEntry(const SecurityOrigin& sourceOrigin , const String& destinationProtocol, const String& destinationDomain, bool allow DestinationSubdomains); 58 static void addOriginAccessWhitelistEntry(const SecurityOrigin& sourceOrigin , const String& destinationProtocol, const String& destinationDomain, bool allow DestinationSubdomains);
59 static void removeOriginAccessWhitelistEntry(const SecurityOrigin& sourceOri gin, const String& destinationProtocol, const String& destinationDomain, bool al lowDestinationSubdomains); 59 static void removeOriginAccessWhitelistEntry(const SecurityOrigin& sourceOri gin, const String& destinationProtocol, const String& destinationDomain, bool al lowDestinationSubdomains);
60 static void resetOriginAccessWhitelists(); 60 static void resetOriginAccessWhitelists();
61 61
62 static bool isAccessWhiteListed(const SecurityOrigin* activeOrigin, const Se curityOrigin* targetOrigin); 62 static bool isAccessWhiteListed(const SecurityOrigin* activeOrigin, const Se curityOrigin* targetOrigin);
63 static bool isAccessToURLWhiteListed(const SecurityOrigin* activeOrigin, con st KURL&); 63 static bool isAccessToURLWhiteListed(const SecurityOrigin* activeOrigin, con st KURL&);
64 64
65 static void addOriginTrustworthyWhiteList(PassRefPtr<SecurityOrigin>); 65 static void addOriginTrustworthyWhiteList(PassRefPtr<SecurityOrigin>);
66 static bool isOriginWhiteListedTrustworthy(const SecurityOrigin&); 66 static bool isOriginWhiteListedTrustworthy(const SecurityOrigin&);
67 67
68 static void addSchemeToBypassSecureContextWhitelist(const String&);
69 // Returns true if the origin is on a whitelist of origins that should
70 // bypass Secure Context checks defined in
71 // https://w3c.github.io/webappsec/specs/powerfulfeatures/#is-origin-trustwo rthy.
72 static bool shouldOriginBypassSecureContextCheck(const SecurityOrigin&);
73
68 static bool referrerPolicyFromString(const String& policy, ReferrerPolicy* r esult); 74 static bool referrerPolicyFromString(const String& policy, ReferrerPolicy* r esult);
69 }; 75 };
70 76
71 } // namespace blink 77 } // namespace blink
72 78
73 #endif // SecurityPolicy_h 79 #endif // SecurityPolicy_h
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698