mirror of
https://bitbucket.org/chromiumembedded/cef
synced 2025-06-05 21:39:12 +02:00
Update include/ comments to Doxygen formatting (see issue #3384)
See related guidelines in the issue.
This commit is contained in:
@ -41,40 +41,41 @@
|
||||
#include "include/cef_base.h"
|
||||
|
||||
///
|
||||
// Add an entry to the cross-origin access whitelist.
|
||||
//
|
||||
// The same-origin policy restricts how scripts hosted from different origins
|
||||
// (scheme + domain + port) can communicate. By default, scripts can only access
|
||||
// resources with the same origin. Scripts hosted on the HTTP and HTTPS schemes
|
||||
// (but no other schemes) can use the "Access-Control-Allow-Origin" header to
|
||||
// allow cross-origin requests. For example, https://source.example.com can make
|
||||
// XMLHttpRequest requests on http://target.example.com if the
|
||||
// http://target.example.com request returns an "Access-Control-Allow-Origin:
|
||||
// https://source.example.com" response header.
|
||||
//
|
||||
// Scripts in separate frames or iframes and hosted from the same protocol and
|
||||
// domain suffix can execute cross-origin JavaScript if both pages set the
|
||||
// document.domain value to the same domain suffix. For example,
|
||||
// scheme://foo.example.com and scheme://bar.example.com can communicate using
|
||||
// JavaScript if both domains set document.domain="example.com".
|
||||
//
|
||||
// This method is used to allow access to origins that would otherwise violate
|
||||
// the same-origin policy. Scripts hosted underneath the fully qualified
|
||||
// |source_origin| URL (like http://www.example.com) will be allowed access to
|
||||
// all resources hosted on the specified |target_protocol| and |target_domain|.
|
||||
// If |target_domain| is non-empty and |allow_target_subdomains| if false only
|
||||
// exact domain matches will be allowed. If |target_domain| contains a top-
|
||||
// level domain component (like "example.com") and |allow_target_subdomains| is
|
||||
// true sub-domain matches will be allowed. If |target_domain| is empty and
|
||||
// |allow_target_subdomains| if true all domains and IP addresses will be
|
||||
// allowed.
|
||||
//
|
||||
// This method cannot be used to bypass the restrictions on local or display
|
||||
// isolated schemes. See the comments on CefRegisterCustomScheme for more
|
||||
// information.
|
||||
//
|
||||
// This function may be called on any thread. Returns false if |source_origin|
|
||||
// is invalid or the whitelist cannot be accessed.
|
||||
/// Add an entry to the cross-origin access whitelist.
|
||||
///
|
||||
/// The same-origin policy restricts how scripts hosted from different origins
|
||||
/// (scheme + domain + port) can communicate. By default, scripts can only
|
||||
/// access resources with the same origin. Scripts hosted on the HTTP and HTTPS
|
||||
/// schemes (but no other schemes) can use the "Access-Control-Allow-Origin"
|
||||
/// header to allow cross-origin requests. For example,
|
||||
/// https://source.example.com can make XMLHttpRequest requests on
|
||||
/// http://target.example.com if the http://target.example.com request returns
|
||||
/// an "Access-Control-Allow-Origin: https://source.example.com" response
|
||||
/// header.
|
||||
///
|
||||
/// Scripts in separate frames or iframes and hosted from the same protocol and
|
||||
/// domain suffix can execute cross-origin JavaScript if both pages set the
|
||||
/// document.domain value to the same domain suffix. For example,
|
||||
/// scheme://foo.example.com and scheme://bar.example.com can communicate using
|
||||
/// JavaScript if both domains set document.domain="example.com".
|
||||
///
|
||||
/// This method is used to allow access to origins that would otherwise violate
|
||||
/// the same-origin policy. Scripts hosted underneath the fully qualified
|
||||
/// |source_origin| URL (like http://www.example.com) will be allowed access to
|
||||
/// all resources hosted on the specified |target_protocol| and |target_domain|.
|
||||
/// If |target_domain| is non-empty and |allow_target_subdomains| if false only
|
||||
/// exact domain matches will be allowed. If |target_domain| contains a top-
|
||||
/// level domain component (like "example.com") and |allow_target_subdomains| is
|
||||
/// true sub-domain matches will be allowed. If |target_domain| is empty and
|
||||
/// |allow_target_subdomains| if true all domains and IP addresses will be
|
||||
/// allowed.
|
||||
///
|
||||
/// This method cannot be used to bypass the restrictions on local or display
|
||||
/// isolated schemes. See the comments on CefRegisterCustomScheme for more
|
||||
/// information.
|
||||
///
|
||||
/// This function may be called on any thread. Returns false if |source_origin|
|
||||
/// is invalid or the whitelist cannot be accessed.
|
||||
///
|
||||
/*--cef(optional_param=target_domain)--*/
|
||||
bool CefAddCrossOriginWhitelistEntry(const CefString& source_origin,
|
||||
@ -83,8 +84,8 @@ bool CefAddCrossOriginWhitelistEntry(const CefString& source_origin,
|
||||
bool allow_target_subdomains);
|
||||
|
||||
///
|
||||
// Remove an entry from the cross-origin access whitelist. Returns false if
|
||||
// |source_origin| is invalid or the whitelist cannot be accessed.
|
||||
/// Remove an entry from the cross-origin access whitelist. Returns false if
|
||||
/// |source_origin| is invalid or the whitelist cannot be accessed.
|
||||
///
|
||||
/*--cef(optional_param=target_domain)--*/
|
||||
bool CefRemoveCrossOriginWhitelistEntry(const CefString& source_origin,
|
||||
@ -93,8 +94,8 @@ bool CefRemoveCrossOriginWhitelistEntry(const CefString& source_origin,
|
||||
bool allow_target_subdomains);
|
||||
|
||||
///
|
||||
// Remove all entries from the cross-origin access whitelist. Returns false if
|
||||
// the whitelist cannot be accessed.
|
||||
/// Remove all entries from the cross-origin access whitelist. Returns false if
|
||||
/// the whitelist cannot be accessed.
|
||||
///
|
||||
/*--cef()--*/
|
||||
bool CefClearCrossOriginWhitelist();
|
||||
|
Reference in New Issue
Block a user