Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(905)

Unified Diff: third_party/WebKit/Source/platform/feature_policy/FeaturePolicy.cpp

Issue 2767983003: Initial Implementation of Iframe Attribute for Feature Policy (Part 4) (Closed)
Patch Set: Nit Created 3 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/WebKit/Source/platform/feature_policy/FeaturePolicy.cpp
diff --git a/third_party/WebKit/Source/platform/feature_policy/FeaturePolicy.cpp b/third_party/WebKit/Source/platform/feature_policy/FeaturePolicy.cpp
index daa9d3a40b8bb14cf87cc61fa4d1bd42b6b2862e..204d2210b176fd9299f4ee969325f90710c33b5c 100644
--- a/third_party/WebKit/Source/platform/feature_policy/FeaturePolicy.cpp
+++ b/third_party/WebKit/Source/platform/feature_policy/FeaturePolicy.cpp
@@ -12,6 +12,28 @@
namespace blink {
+namespace {
+
+void addAllowFeatureToList(bool isFeatureAllowed,
+ WebFeaturePolicyFeature feature,
+ Vector<WebParsedFeaturePolicyDeclaration>& list) {
+ if (isFeatureAllowed) {
+ WebParsedFeaturePolicyDeclaration whitelist;
+ whitelist.feature = feature;
+ whitelist.matchesAllOrigins = true;
+ list.push_back(whitelist);
+ }
+}
+
+void overridePolicy(int index,
+ Vector<WebParsedFeaturePolicyDeclaration>& whitelists,
+ RefPtr<SecurityOrigin> origin) {
+ whitelists[index].matchesAllOrigins = false;
+ whitelists[index].origins = Vector<WebSecurityOrigin>(1UL, {origin});
+}
+
+} // namespace
+
WebFeaturePolicyFeature getWebFeaturePolicyFeature(const String& feature) {
if (feature == "fullscreen")
return WebFeaturePolicyFeature::Fullscreen;
@@ -114,9 +136,30 @@ WebParsedFeaturePolicy parseFeaturePolicy(const String& policy,
// allowpaymentrequest into account when constructing the whitelist.
WebParsedFeaturePolicy getContainerPolicyFromAllowedFeatures(
const WebVector<WebFeaturePolicyFeature>& features,
+ bool allowfullscreen,
+ bool allowpayment,
RefPtr<SecurityOrigin> origin) {
+ DLOG(WARNING) << origin->toString();
iclelland 2017/04/11 19:04:21 Nit: Remove the warning
Vector<WebParsedFeaturePolicyDeclaration> whitelists;
+ // If allowfullscreen attribute or allowpayment attribute is(are) present,
iclelland 2017/04/11 19:04:21 I think you can get away with just using "are" her
+ // define the policy as enabled for all.
+ addAllowFeatureToList(allowfullscreen, WebFeaturePolicyFeature::Fullscreen,
+ whitelists);
iclelland 2017/04/11 19:04:21 Could you move the if(isFeatureAllowed) out of |ad
+ addAllowFeatureToList(allowpayment, WebFeaturePolicyFeature::Payment,
+ whitelists);
for (const WebFeaturePolicyFeature feature : features) {
+ // allow policy will override the allow* attribute policy.
iclelland 2017/04/11 19:04:21 This logic is really hard to follow; it took me a
+ bool shouldOverrideFirstPolicy =
+ (feature == WebFeaturePolicyFeature::Fullscreen && allowfullscreen) ||
+ (feature == WebFeaturePolicyFeature::Payment && allowpayment &&
+ !allowfullscreen);
+ bool shouldOverrideSecondPolicy =
+ feature == WebFeaturePolicyFeature::Payment && allowpayment &&
+ allowfullscreen;
+ if (shouldOverrideFirstPolicy || shouldOverrideSecondPolicy) {
+ overridePolicy(shouldOverrideFirstPolicy ? 0 : 1, whitelists, origin);
+ continue;
+ }
WebParsedFeaturePolicyDeclaration whitelist;
whitelist.feature = feature;
whitelist.origins = Vector<WebSecurityOrigin>(1UL, {origin});

Powered by Google App Engine
This is Rietveld 408576698