Cef
AddCrossOriginWhitelistEntry Method
|
Version 91.1.160
Add an entry to the cross-origin whitelist.
Namespace:
CefSharp
Assembly:
CefSharp.Core (in CefSharp.Core.dll) Version: 91.1.160.0
Syntax
public static bool AddCrossOriginWhitelistEntry(
string sourceOrigin,
string targetProtocol,
string targetDomain,
bool allowTargetSubdomains
)
public:
static bool AddCrossOriginWhitelistEntry(
String^ sourceOrigin,
String^ targetProtocol,
String^ targetDomain,
bool allowTargetSubdomains
)
Parameters
-
sourceOrigin
-
Type:
System
String
The origin allowed to be accessed by the target protocol/domain.
-
targetProtocol
-
Type:
System
String
The target protocol allowed to access the source origin.
-
targetDomain
-
Type:
System
String
The optional target domain allowed to access the source origin.
-
allowTargetSubdomains
-
Type:
System
Boolean
If set to true would allow a blah.example.com if the
targetDomain
was set to example.com
Return Value
Type:
Boolean
Returns false if is invalid or the whitelist cannot be accessed.
Remarks
The same-origin policy restricts how scripts hosted from different origins
(scheme + domain + port) can communicate. By default, scripts can only access
resources with the same origin. Scripts hosted on the HTTP and HTTPS schemes
(but no other schemes) can use the "Access-Control-Allow-Origin" header to
allow cross-origin requests. For example, https://source.example.com can make
XMLHttpRequest requests on http://target.example.com if the
http://target.example.com request returns an "Access-Control-Allow-Origin:
https://source.example.com" response header.
Scripts in separate frames or iframes and hosted from the same protocol and
domain suffix can execute cross-origin JavaScript if both pages set the
document.domain value to the same domain suffix. For example,
scheme://foo.example.com and scheme://bar.example.com can communicate using
JavaScript if both domains set document.domain="example.com".
This method is used to allow access to origins that would otherwise violate
the same-origin policy. Scripts hosted underneath the fully qualified
sourceOrigin
URL (like http://www.example.com) will be allowed access to
all resources hosted on the specified
targetProtocol
and
targetDomain
.
If
targetDomain
is non-empty and
allowTargetSubdomains
if false only
exact domain matches will be allowed. If
targetDomain
contains a top-
level domain component (like "example.com") and
allowTargetSubdomains
is
true sub-domain matches will be allowed. If
targetDomain
is empty and
allowTargetSubdomains
if true all domains and IP addresses will be
allowed.
This method cannot be used to bypass the restrictions on local or display