diff --git a/source b/source index 3d085f86bb6..e92ad18253d 100644 --- a/source +++ b/source @@ -4197,6 +4197,10 @@ a.setAttribute('href', 'https://example.com/'); // change the content attribute
  • "autoplay", which has a default allowlist of 'self'.
  • +
  • "cross-origin-isolated", which has a default allowlist of 'self'.
  • "document-domain", which has a default allowlist of *.
  • @@ -79107,7 +79111,15 @@ interface BarProp {
    The embedder policy

    Return window's associated Document's embedder - policy.

    + policy.

    + +
    The cross-origin + isolated capability
    +

    Return the logical conjunction of realm's agent cluster's + cross-origin isolated and whether window's associated Document is allowed to + use the "cross-origin-isolated" + feature.

    @@ -87565,6 +87577,12 @@ interface ApplicationCache : EventTarget { check">cross-origin resource policy checks for fetches performed using this environment settings object as a request client.

    + +
    A cross-origin isolated capability
    + +

    A boolean representing whether scripts that use this environment settings + object are allowed to use APIs that require cross-origin isolation.

    An environment settings object also has an outstanding rejected promises @@ -92513,12 +92531,11 @@ interface mixin WindowOrWorkerGlobalScope {

    Returns the global object's origin, serialized as string.

    self . crossOriginIsolated
    -

    Returns whether the surrounding agent's agent cluster is - cross-origin isolated. This depends on the `Cross-Origin-Opener-Policy` and `Cross-Origin-Embedder-Policy` HTTP response headers and determines whether - SharedArrayBuffer can be used with postMessage() - APIs.

    +

    Returns whether scripts running in this global are allowed to use APIs that require + cross-origin isolation. This depends on the `Cross-Origin-Opener-Policy` + and `Cross-Origin-Embedder-Policy` HTTP response headers and the + "cross-origin-isolated" + feature.

    @@ -92550,8 +92567,9 @@ document.body.appendChild(frame) origin">serialized.

    The crossOriginIsolated getter steps - are to return the surrounding agent's agent cluster's cross-origin - isolated.

    + are to return this's relevant settings object's cross-origin isolated + capability.

    @@ -98975,6 +98993,11 @@ interface WorkerGlobalScope : EventTarget { data-dfn-for="WorkerGlobalScope" data-x="concept-WorkerGlobalScope-module-map">module map. It is a module map, initially empty.

    +

    A WorkerGlobalScope object has an associated cross-origin isolated + capability boolean. It is initially false.

    +
    @@ -99437,6 +99460,33 @@ interface SharedWorkerGlobalScope : WorkerGlobalScope { and response is false, then set response to a network error.

    +
  • Set worker global scope's cross-origin isolated + capability to agent's agent cluster's cross-origin + isolated.

  • + +
  • If is shared is false and owner's cross-origin isolated + capability is false, then set worker global scope's cross-origin isolated + capability to false.

  • + +
  • +

    If is shared is false and response's + url's scheme is "data", then set + worker global scope's cross-origin isolated + capability to false.

    + +

    This is a conservative default for now, while we figure out how workers in + general, and data: URL workers in particular (which are + cross-origin from their owner), will be treated in the context of permissions policies. See + w3c/webappsec-permissions-policy + issue #207 for more details.

    +
  • +
  • Execute the Initialize a global object's CSP list algorithm on worker global scope and response.

  • @@ -99735,6 +99785,12 @@ interface SharedWorkerGlobalScope : WorkerGlobalScope {

    Return worker global scope's embedder policy.

    + +
    The cross-origin + isolated capability
    +

    Return worker global scope's cross-origin isolated + capability.