| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2007, 2008 Apple Inc. All rights reserved. | 2 * Copyright (C) 2007, 2008 Apple Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions | 5 * modification, are permitted provided that the following conditions |
| 6 * are met: | 6 * are met: |
| 7 * | 7 * |
| 8 * 1. Redistributions of source code must retain the above copyright | 8 * 1. Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * 2. Redistributions in binary form must reproduce the above copyright | 10 * 2. Redistributions in binary form must reproduce the above copyright |
| (...skipping 110 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 121 // Returns true if |document| can display content from the given URL (e.g., | 121 // Returns true if |document| can display content from the given URL (e.g., |
| 122 // in an iframe or as an image). For example, web sites generally cannot | 122 // in an iframe or as an image). For example, web sites generally cannot |
| 123 // display content from the user's files system. | 123 // display content from the user's files system. |
| 124 bool canDisplay(const KURL&) const; | 124 bool canDisplay(const KURL&) const; |
| 125 | 125 |
| 126 // Returns true if the origin loads resources either from the local | 126 // Returns true if the origin loads resources either from the local |
| 127 // machine or over the network from a | 127 // machine or over the network from a |
| 128 // cryptographically-authenticated origin, as described in | 128 // cryptographically-authenticated origin, as described in |
| 129 // https://w3c.github.io/webappsec/specs/powerfulfeatures/#is-origin-trustwo
rthy. | 129 // https://w3c.github.io/webappsec/specs/powerfulfeatures/#is-origin-trustwo
rthy. |
| 130 bool isPotentiallyTrustworthy(String& errorMessage) const; | 130 bool isPotentiallyTrustworthy(String& errorMessage) const; |
| 131 bool isPotentiallyTrustworthy() const; |
| 131 | 132 |
| 132 // Returns true if this SecurityOrigin can load local resources, such | 133 // Returns true if this SecurityOrigin can load local resources, such |
| 133 // as images, iframes, and style sheets, and can link to local URLs. | 134 // as images, iframes, and style sheets, and can link to local URLs. |
| 134 // For example, call this function before creating an iframe to a | 135 // For example, call this function before creating an iframe to a |
| 135 // file:// URL. | 136 // file:// URL. |
| 136 // | 137 // |
| 137 // Note: A SecurityOrigin might be allowed to load local resources | 138 // Note: A SecurityOrigin might be allowed to load local resources |
| 138 // without being able to issue an XMLHttpRequest for a local URL. | 139 // without being able to issue an XMLHttpRequest for a local URL. |
| 139 // To determine whether the SecurityOrigin can issue an | 140 // To determine whether the SecurityOrigin can issue an |
| 140 // XMLHttpRequest for a URL, call canRequest(url). | 141 // XMLHttpRequest for a URL, call canRequest(url). |
| (...skipping 118 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 259 bool m_isUnique; | 260 bool m_isUnique; |
| 260 bool m_universalAccess; | 261 bool m_universalAccess; |
| 261 bool m_domainWasSetInDOM; | 262 bool m_domainWasSetInDOM; |
| 262 bool m_canLoadLocalResources; | 263 bool m_canLoadLocalResources; |
| 263 bool m_blockLocalAccessFromLocalOrigin; | 264 bool m_blockLocalAccessFromLocalOrigin; |
| 264 }; | 265 }; |
| 265 | 266 |
| 266 } // namespace blink | 267 } // namespace blink |
| 267 | 268 |
| 268 #endif // SecurityOrigin_h | 269 #endif // SecurityOrigin_h |
| OLD | NEW |