diff --git a/source b/source index 3d085f86bb6..e92ad18253d 100644 --- a/source +++ b/source @@ -4197,6 +4197,10 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute
autoplay
", which has a default allowlist of 'self'
.cross-origin-isolated
", which has a default allowlist of 'self'
.document-domain
", which
has a default allowlist of *
.Return window's associated
Document
's embedder
- policy.
Return the logical conjunction of realm's agent cluster's
+ cross-origin isolated and whether window's associated Document
is allowed to
+ use the "cross-origin-isolated
"
+ feature.
A boolean representing whether scripts that use this environment settings + object are allowed to use APIs that require cross-origin isolation.
An environment settings object also has an outstanding rejected promises
@@ -92513,12 +92531,11 @@ interface mixin WindowOrWorkerGlobalScope {
Returns the global object's origin, serialized as string. Returns whether the surrounding agent's agent cluster is
- cross-origin isolated. This depends on the ` Returns whether scripts running in this global are allowed to use APIs that require
+ cross-origin isolation. This depends on the ` The crossOriginIsolated
Cross-Origin-Opener-Policy
` and `Cross-Origin-Embedder-Policy
` HTTP response headers and determines whether
- SharedArrayBuffer
can be used with postMessage()
- APIs.Cross-Origin-Opener-Policy
`
+ and `Cross-Origin-Embedder-Policy
` HTTP response headers and the
+ "cross-origin-isolated
"
+ feature.crossOriginIsolated
getter steps
- are to return the surrounding agent's agent cluster's cross-origin
- isolated.
A WorkerGlobalScope
object has an associated cross-origin isolated
+ capability boolean. It is initially false.
Set worker global scope's cross-origin isolated + capability to agent's agent cluster's cross-origin + isolated.
If is shared is false and owner's cross-origin isolated + capability is false, then set worker global scope's cross-origin isolated + capability to false.
If is shared is false and response's
+ url's scheme is "data
", then set
+ worker global scope's cross-origin isolated
+ capability to false.
This is a conservative default for now, while we figure out how workers in
+ general, and data:
URL workers in particular (which are
+ cross-origin from their owner), will be treated in the context of permissions policies. See
+ w3c/webappsec-permissions-policy
+ issue #207 for more details.
Execute the Initialize a global object
's CSP list
algorithm on worker global scope and response.
Return worker global scope's embedder policy.
+ +Return worker global scope's cross-origin isolated + capability.