| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2009 Google Inc. All rights reserved. | 2 * Copyright (C) 2009 Google Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions are | 5 * modification, are permitted provided that the following conditions are |
| 6 * met: | 6 * met: |
| 7 * | 7 * |
| 8 * * Redistributions of source code must retain the above copyright | 8 * * Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * * Redistributions in binary form must reproduce the above | 10 * * Redistributions in binary form must reproduce the above |
| (...skipping 113 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 124 | 124 |
| 125 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const Location* target, SecurityReportingOption reporting
Option) | 125 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const Location* target, SecurityReportingOption reporting
Option) |
| 126 { | 126 { |
| 127 ASSERT(target); | 127 ASSERT(target); |
| 128 const Frame* frame = target->frame(); | 128 const Frame* frame = target->frame(); |
| 129 if (!frame || !frame->securityContext()) | 129 if (!frame || !frame->securityContext()) |
| 130 return false; | 130 return false; |
| 131 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge
tSecurityOrigin(), frame->domWindow(), reportingOption); | 131 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge
tSecurityOrigin(), frame->domWindow(), reportingOption); |
| 132 } | 132 } |
| 133 | 133 |
| 134 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const MainThreadWorkletGlobalScope* target, SecurityRepor
tingOption reportingOption) | 134 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const v8::Local<
v8::Context>& context, const ExecutionContext* executionContext, const MainThrea
dWorkletGlobalScope* workletGlobalScope, SecurityReportingOption reportingOption
) |
| 135 { | 135 { |
| 136 ASSERT(target); | 136 DCHECK(executionContext); |
| 137 const Frame* frame = target->frame(); | 137 DOMWindow* domWindow = toDOMWindow(context); |
| 138 if (!frame || !frame->securityContext()) | 138 if (executionContext->isMainThreadWorkletGlobalScope()) { |
| 139 Frame* callingFrame = toMainThreadWorkletGlobalScope(executionContext)->
frame(); |
| 140 domWindow = callingFrame ? callingFrame->domWindow() : nullptr; |
| 141 } |
| 142 |
| 143 DCHECK(workletGlobalScope); |
| 144 const Frame* workletGlobalScopeFrame = workletGlobalScope->frame(); |
| 145 if (!workletGlobalScopeFrame || !workletGlobalScopeFrame->securityContext()) |
| 139 return false; | 146 return false; |
| 140 return canAccessFrame(isolate, accessingWindow, frame->securityContext()->ge
tSecurityOrigin(), frame->domWindow(), reportingOption); | 147 |
| 148 return domWindow && canAccessFrame(isolate, toLocalDOMWindow(domWindow), wor
kletGlobalScopeFrame->securityContext()->getSecurityOrigin(), workletGlobalScope
Frame->domWindow(), reportingOption); |
| 149 } |
| 150 |
| 151 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, v8::Local<v8::Co
ntext> calling, v8::Local<v8::Context> target, SecurityReportingOption reporting
Option) |
| 152 { |
| 153 ExecutionContext* targetExecutionContext = toExecutionContext(target); |
| 154 DCHECK(targetExecutionContext); |
| 155 |
| 156 ExecutionContext* callingExecutionContext = toExecutionContext(calling); |
| 157 DCHECK(callingExecutionContext); |
| 158 |
| 159 if (targetExecutionContext->isMainThreadWorkletGlobalScope()) |
| 160 return shouldAllowAccessTo(isolate, calling, callingExecutionContext, to
MainThreadWorkletGlobalScope(targetExecutionContext), DoNotReportSecurityError); |
| 161 |
| 162 if (callingExecutionContext->isMainThreadWorkletGlobalScope()) |
| 163 return shouldAllowAccessTo(isolate, target, targetExecutionContext, toMa
inThreadWorkletGlobalScope(callingExecutionContext), DoNotReportSecurityError); |
| 164 |
| 165 DOMWindow* window = toDOMWindow(target); |
| 166 return window && shouldAllowAccessTo(isolate, toLocalDOMWindow(toDOMWindow(c
alling)), window, DoNotReportSecurityError); |
| 141 } | 167 } |
| 142 | 168 |
| 143 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const Node* target, ExceptionState& exceptionState) | 169 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const Node* target, ExceptionState& exceptionState) |
| 144 { | 170 { |
| 145 if (!target) | 171 if (!target) |
| 146 return false; | 172 return false; |
| 147 return canAccessFrame(isolate, accessingWindow, target->document().getSecuri
tyOrigin(), target->document().domWindow(), exceptionState); | 173 return canAccessFrame(isolate, accessingWindow, target->document().getSecuri
tyOrigin(), target->document().domWindow(), exceptionState); |
| 148 } | 174 } |
| 149 | 175 |
| 150 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const Node* target, SecurityReportingOption reportingOpti
on) | 176 bool BindingSecurity::shouldAllowAccessTo(v8::Isolate* isolate, const LocalDOMWi
ndow* accessingWindow, const Node* target, SecurityReportingOption reportingOpti
on) |
| 151 { | 177 { |
| 152 if (!target) | 178 if (!target) |
| 153 return false; | 179 return false; |
| 154 return canAccessFrame(isolate, accessingWindow, target->document().getSecuri
tyOrigin(), target->document().domWindow(), reportingOption); | 180 return canAccessFrame(isolate, accessingWindow, target->document().getSecuri
tyOrigin(), target->document().domWindow(), reportingOption); |
| 155 } | 181 } |
| 156 | 182 |
| 157 bool BindingSecurity::shouldAllowAccessToFrame(v8::Isolate* isolate, const Local
DOMWindow* accessingWindow, const Frame* target, SecurityReportingOption reporti
ngOption) | 183 bool BindingSecurity::shouldAllowAccessToFrame(v8::Isolate* isolate, const Local
DOMWindow* accessingWindow, const Frame* target, SecurityReportingOption reporti
ngOption) |
| 158 { | 184 { |
| 159 if (!target || !target->securityContext()) | 185 if (!target || !target->securityContext()) |
| 160 return false; | 186 return false; |
| 161 return canAccessFrame(isolate, accessingWindow, target->securityContext()->g
etSecurityOrigin(), target->domWindow(), reportingOption); | 187 return canAccessFrame(isolate, accessingWindow, target->securityContext()->g
etSecurityOrigin(), target->domWindow(), reportingOption); |
| 162 } | 188 } |
| 163 | 189 |
| 164 } // namespace blink | 190 } // namespace blink |
| OLD | NEW |