From b303ac8248ff456d52409d06f6f0a948dd8e336a Mon Sep 17 00:00:00 2001
From: Yutaka Hirano autoplay
", which has a default allowlist of 'self'
.cross-origin-isolated
", which has a default allowlist of 'self'
.document-domain
", which
has a default allowlist of *
.
The crossOriginIsolated
getter steps
- are to return the surrounding agent's agent cluster's cross-origin
- isolated.
Surrounding agent's agent cluster's cross-origin + isolated is true.
Any of the following conditions are true:
+ +this is a Window
object and its associated Document
is allowed to
+ use the "cross-origin-isolated
" feature.
this is a WorkerGlobalScope
object and its asoociated cross-origin-isolated
+ permission is true.
A WorkerGlobalScope
object has an associated cross-origin-isolated
+ permission boolean, initially true.
Otherwise:
+ +If owner is a Window
object, then set worker global
+ scope's cross-origin-isolated
+ permission to whether owner's associated Document
is allowed to
+ use the "cross-origin-isolated
" feature.
If owner is a WorkerGlobalScope
object, then set worker
+ global scope's cross-origin-isolated
+ permission to owner's cross-origin-isolated
+ permission.
Let destination be "sharedworker
" if is
shared is true, and "worker
" otherwise.
Referrer-Policy
`
header of response.
+ If is shared is false and response's
+ url's scheme is "data
", then set
+ worker global scope's cross-origin-isolated
+ permission to false.
+
If response's url's scheme is a local scheme, then set worker global scope's Date: Tue, 28 Jul 2020 19:15:39 +0900 Subject: [PATCH 2/8] fix --- source | 31 +++++++++++++------------------ 1 file changed, 13 insertions(+), 18 deletions(-) diff --git a/source b/source index bf9ece7541a..eae58f2c1fc 100644 --- a/source +++ b/source @@ -92554,27 +92554,22 @@ document.body.appendChild(frame) origin">serialized.
The crossOriginIsolated
getter steps
- are to return true if all of the following conditions are true, and false otherwise.
Surrounding agent's agent cluster's cross-origin - isolated is true.
If surrounding agent's agent cluster's cross-origin + isolated is false, then return false.
Any of the following conditions are true:
+If this is a Window
object, then return whether its associated Document
is allowed to
+ use the "cross-origin-isolated
".
-
this is a Window
object and its associated Document
is allowed to
- use the "cross-origin-isolated
" feature.
this is a WorkerGlobalScope
object and its asoociated cross-origin-isolated
- permission is true.
Otherwise, this is a WorkerGlobalScope
object. Return its
+ asoociated cross-origin-isolated
+ permission.
Return window's associated
Document
's embedder
- policy.
Return the logical conjunction of realm's corresponding agent
+ cluster's cross-origin isolated and whether window's associated Document
is allowed to
+ use the "cross-origin-isolated
".
A boolean representing whether it is allowed to use APIs that requires cross-origin + isolation.
An environment settings object also has an outstanding rejected promises
@@ -92517,12 +92531,11 @@ interface mixin WindowOrWorkerGlobalScope {
Returns the global object's origin, serialized as string. Returns whether the surrounding agent's agent cluster is
- cross-origin isolated. This depends on the ` Returns whether it is allowed to use APIs that require cross-origin isolattion.
+ This depends on the ` The If surrounding agent's agent cluster's cross-origin
- isolated is false, then return false. If this is a Otherwise, this is a A crossOriginIsolated
Cross-Origin-Opener-Policy
` and `Cross-Origin-Embedder-Policy
` HTTP response headers and determines whether
- SharedArrayBuffer
can be used with postMessage()
- APIs.Cross-Origin-Opener-Policy
` and `Cross-Origin-Embedder-Policy
` HTTP response headers and the
+ "cross-origin-isolated
"
+ permission.crossOriginIsolated
getter steps
- are:
-
-
-
+ are to return this's relevant settings object's effective cross-origin
+ isolated.
Window
object, then return whether its associated Document
is allowed to
- use the "cross-origin-isolated
".
-
- WorkerGlobalScope
object. Return its
- asoociated cross-origin-isolated
- permission.WorkerGlobalScope
object has an associated cross-origin-isolated
- permission boolean, initially true.
Otherwise:
- -If owner is a Window
object, then set worker global
- scope's cross-origin-isolated
- permission to whether owner's associated Document
is allowed to
- use the "cross-origin-isolated
" feature.
If owner is a WorkerGlobalScope
object, then set worker
- global scope's cross-origin-isolated
- permission to owner's cross-origin-isolated
- permission.
Otherwise, set worker global scope's effective cross-origin + isolated to owner's effective cross-origin + isolated.
Let destination be "sharedworker
" if is
shared is true, and "worker
" otherwise.
data
", then set
worker global scope's cross-origin-isolated
- permission to false.
+ data-x="concept-WorkerGlobalScope-effective-cross-origin-isolated">effective cross-origin
+ isolated to false.
If response's url's scheme is a local scheme, then set @@ -99786,6 +99771,12 @@ interface SharedWorkerGlobalScope : WorkerGlobalScope {
Return worker global scope's embedder policy.
+ +Return worker global scope's effective cross-origin + isolated.
Otherwise, set worker global scope's Let destination be "sharedworker
" if is
+ shared is true, and "worker
" otherwise.
Set worker global scope's effective cross-origin - isolated to owner's effective cross-origin + isolated to agent's agent cluster's cross-origin isolated.
Let destination be "sharedworker
" if is
- shared is true, and "worker
" otherwise.
If is shared is false and owner's effective cross-origin + isolated is false, then set worker global scope's effective cross-origin + isolated to false.
Obtain script by switching on the value of options's
Date: Thu, 6 Aug 2020 16:12:12 +0900
Subject: [PATCH 5/8] fix
---
source | 16 ++++++++--------
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/source b/source
index 519e7330fca..54885d1fdb9 100644
--- a/source
+++ b/source
@@ -4197,7 +4197,7 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute
autoplay
", which has a default allowlist of 'self'
."
cross-origin-isolated
", which has a default allowlist of 'self'
.Document
is allowed to
use the "cross-origin-isolated
".
A boolean representing whether it is allowed to use APIs that requires cross-origin +
A boolean representing whether it is allowed to use APIs that require cross-origin isolation.
Returns the global object's origin, serialized as string.
crossOriginIsolated
Returns whether it is allowed to use APIs that require cross-origin isolattion.
- This depends on the `Cross-Origin-Opener-Policy
` and `Cross-Origin-Embedder-Policy
` HTTP response headers and the
- "cross-origin-isolated
"
- permission.
Returns whether scripts running in this global are allowed to use APIs that require
+ cross-origin isolation. This depends on the `Cross-Origin-Opener-Policy
`
+ and `Cross-Origin-Embedder-Policy
` HTTP response headers and the
+ "cross-origin-isolated
"
+ feature.
Let destination be "sharedworker
" if is
shared is true, and "worker
" otherwise.
Set worker global scope's effective cross-origin - isolated to agent's agent cluster's cross-origin - isolated.
If is shared is false and owner's effective cross-origin - isolated is false, then set worker global scope's effective cross-origin - isolated to false.
Obtain script by switching on the value of options's type
member:
Referrer-Policy
`
header of response.If is shared is false and response's
- url's scheme is "data
", then set
- worker global scope's effective cross-origin
- isolated to false.
-
If response's url's scheme is a local scheme, then set worker global scope's SharedWorkerGlobalScope : WorkerGlobalScope { and response is false, then set response to a network error.
Set worker global scope's effective cross-origin + isolated to agent's agent cluster's cross-origin + isolated.
If is shared is false and owner's effective cross-origin + isolated is false, then set worker global scope's effective cross-origin + isolated to false.
If is shared is false and response's
+ url's scheme is "data
", then set
+ worker global scope's effective cross-origin
+ isolated to false.
+
Execute the Initialize a global object
's CSP list
algorithm on worker global scope and response.
Document
's embedder
policy.
- Return the logical conjunction of realm's corresponding agent
- cluster's cross-origin isolated and whether window's The cross-origin
+ isolated capability
+ Return the logical conjunction of realm's agent cluster's
+ cross-origin isolated and whether window's associated Document
is allowed to
- use the "cross-origin-isolated
" feature.cross-origin-isolated
"
+ feature.
A boolean representing whether it is allowed to use APIs that require cross-origin - isolation.
A boolean representing whether scripts that use this environment settings + object are allowed to use APIs that require cross-origin isolation.
An environment settings object also has an outstanding rejected promises
@@ -92568,8 +92568,8 @@ document.body.appendChild(frame)
The crossOriginIsolated
getter steps
are to return this's relevant settings object's effective cross-origin
- isolated.
A WorkerGlobalScope
object has an associated effective cross-origin
- isolated boolean. It is initially false.
Set worker global scope's effective cross-origin - isolated to agent's agent cluster's cross-origin + data-x="concept-WorkerGlobalScope-cross-origin-isolated-capability">cross-origin isolated + capability to agent's agent cluster's cross-origin isolated.
If is shared is false and owner's effective cross-origin - isolated is false, then set worker global scope's effective cross-origin - isolated to false.
If is shared is false and response's
- url's scheme is "data
", then set
- worker global scope's effective cross-origin
- isolated to false.
+ data-x="concept-settings-object-cross-origin-isolated-capability">cross-origin isolated
+ capability is false, then set worker global scope's cross-origin isolated
+ capability to false.
If is shared is false and response's
+ url's scheme is "data
", then set
+ worker global scope's cross-origin isolated
+ capability to false.
This is a conservative default for now, while we figure out how workers in
+ general, and data:
URL workers in particular (which are
+ cross-origin from their owner), should be treated in the context of permissions policies. See
+ w3c/webappsec-permissions-policy
+ issue #207 for more details.
Execute the Initialize a global object
's CSP list
algorithm on worker global scope and response.
Return worker global scope's effective cross-origin - isolated.
This is a conservative default for now, while we figure out how workers in
general, and data:
URL workers in particular (which are
- cross-origin from their owner), should be treated in the context of permissions policies. See
+ cross-origin from their owner), will be treated in the context of permissions policies. See
w3c/webappsec-permissions-policy
issue #207 for more details.