Commit d5dc2447 authored by Eric Willigers's avatar Eric Willigers Committed by Commit Bot

Retire FeaturePolicyForPermissions flag

Feature Policy support for EME shipped in M64
https://chromium-review.googlesource.com/696944

BUG=689802

Change-Id: I03a3f706a4492bbb2e4112dce66d68281fe172b3
Reviewed-on: https://chromium-review.googlesource.com/1166619Reviewed-by: default avatarKinuko Yasuda <kinuko@chromium.org>
Reviewed-by: default avatarKentaro Hara <haraken@chromium.org>
Commit-Queue: Eric Willigers <ericwilligers@chromium.org>
Cr-Commit-Position: refs/heads/master@{#581528}
parent 12a4e4ff
...@@ -301,7 +301,6 @@ ScriptPromise NavigatorRequestMediaKeySystemAccess::requestMediaKeySystemAccess( ...@@ -301,7 +301,6 @@ ScriptPromise NavigatorRequestMediaKeySystemAccess::requestMediaKeySystemAccess(
ExecutionContext* execution_context = ExecutionContext::From(script_state); ExecutionContext* execution_context = ExecutionContext::From(script_state);
Document* document = ToDocument(execution_context); Document* document = ToDocument(execution_context);
if (RuntimeEnabledFeatures::FeaturePolicyForPermissionsEnabled()) {
if (!document->GetFrame() || if (!document->GetFrame() ||
!document->GetFrame()->IsFeatureEnabled( !document->GetFrame()->IsFeatureEnabled(
mojom::FeaturePolicyFeature::kEncryptedMedia)) { mojom::FeaturePolicyFeature::kEncryptedMedia)) {
...@@ -316,10 +315,6 @@ ScriptPromise NavigatorRequestMediaKeySystemAccess::requestMediaKeySystemAccess( ...@@ -316,10 +315,6 @@ ScriptPromise NavigatorRequestMediaKeySystemAccess::requestMediaKeySystemAccess(
DOMExceptionCode::kSecurityError, DOMExceptionCode::kSecurityError,
"requestMediaKeySystemAccess is disabled by feature policy.")); "requestMediaKeySystemAccess is disabled by feature policy."));
} }
} else {
Deprecation::CountDeprecationFeaturePolicy(
*document, mojom::FeaturePolicyFeature::kEncryptedMedia);
}
// From https://w3c.github.io/encrypted-media/#requestMediaKeySystemAccess // From https://w3c.github.io/encrypted-media/#requestMediaKeySystemAccess
// When this method is invoked, the user agent must run the following steps: // When this method is invoked, the user agent must run the following steps:
......
...@@ -151,10 +151,6 @@ void Geolocation::RecordOriginTypeAccess() const { ...@@ -151,10 +151,6 @@ void Geolocation::RecordOriginTypeAccess() const {
UseCounter::Count(document, WebFeature::kGeolocationSecureOrigin); UseCounter::Count(document, WebFeature::kGeolocationSecureOrigin);
UseCounter::CountCrossOriginIframe( UseCounter::CountCrossOriginIframe(
*document, WebFeature::kGeolocationSecureOriginIframe); *document, WebFeature::kGeolocationSecureOriginIframe);
if (!RuntimeEnabledFeatures::FeaturePolicyForPermissionsEnabled()) {
Deprecation::CountDeprecationFeaturePolicy(
*document, mojom::FeaturePolicyFeature::kGeolocation);
}
} else if (GetFrame() } else if (GetFrame()
->GetSettings() ->GetSettings()
->GetAllowGeolocationOnInsecureOrigins()) { ->GetAllowGeolocationOnInsecureOrigins()) {
...@@ -169,10 +165,6 @@ void Geolocation::RecordOriginTypeAccess() const { ...@@ -169,10 +165,6 @@ void Geolocation::RecordOriginTypeAccess() const {
WebFeature::kGeolocationInsecureOriginIframeDeprecatedNotRemoved); WebFeature::kGeolocationInsecureOriginIframeDeprecatedNotRemoved);
HostsUsingFeatures::CountAnyWorld( HostsUsingFeatures::CountAnyWorld(
*document, HostsUsingFeatures::Feature::kGeolocationInsecureHost); *document, HostsUsingFeatures::Feature::kGeolocationInsecureHost);
if (!RuntimeEnabledFeatures::FeaturePolicyForPermissionsEnabled()) {
Deprecation::CountDeprecationFeaturePolicy(
*document, mojom::FeaturePolicyFeature::kGeolocation);
}
} else { } else {
Deprecation::CountDeprecation(document, Deprecation::CountDeprecation(document,
WebFeature::kGeolocationInsecureOrigin); WebFeature::kGeolocationInsecureOrigin);
...@@ -232,19 +224,16 @@ void Geolocation::StartRequest(GeoNotifier* notifier) { ...@@ -232,19 +224,16 @@ void Geolocation::StartRequest(GeoNotifier* notifier) {
return; return;
} }
if (RuntimeEnabledFeatures::FeaturePolicyForPermissionsEnabled()) {
if (!GetFrame()->IsFeatureEnabled( if (!GetFrame()->IsFeatureEnabled(
mojom::FeaturePolicyFeature::kGeolocation)) { mojom::FeaturePolicyFeature::kGeolocation)) {
UseCounter::Count(GetDocument(), UseCounter::Count(GetDocument(),
WebFeature::kGeolocationDisabledByFeaturePolicy); WebFeature::kGeolocationDisabledByFeaturePolicy);
GetDocument()->AddConsoleMessage( GetDocument()->AddConsoleMessage(ConsoleMessage::Create(
ConsoleMessage::Create(kJSMessageSource, kErrorMessageLevel, kJSMessageSource, kErrorMessageLevel, kFeaturePolicyConsoleWarning));
kFeaturePolicyConsoleWarning));
notifier->SetFatalError(PositionError::Create( notifier->SetFatalError(PositionError::Create(
PositionError::kPermissionDenied, kFeaturePolicyErrorMessage)); PositionError::kPermissionDenied, kFeaturePolicyErrorMessage));
return; return;
} }
}
ReportGeolocationViolation(GetDocument()); ReportGeolocationViolation(GetDocument());
......
...@@ -480,28 +480,18 @@ bool UserMediaRequest::IsSecureContextUse(String& error_message) { ...@@ -480,28 +480,18 @@ bool UserMediaRequest::IsSecureContextUse(String& error_message) {
// Feature policy deprecation messages. // Feature policy deprecation messages.
if (Audio()) { if (Audio()) {
if (RuntimeEnabledFeatures::FeaturePolicyForPermissionsEnabled()) {
if (!document->GetFrame()->IsFeatureEnabled( if (!document->GetFrame()->IsFeatureEnabled(
mojom::FeaturePolicyFeature::kMicrophone)) { mojom::FeaturePolicyFeature::kMicrophone)) {
UseCounter::Count( UseCounter::Count(
document, WebFeature::kMicrophoneDisabledByFeaturePolicyEstimate); document, WebFeature::kMicrophoneDisabledByFeaturePolicyEstimate);
} }
} else {
Deprecation::CountDeprecationFeaturePolicy(
*document, mojom::FeaturePolicyFeature::kMicrophone);
}
} }
if (Video()) { if (Video()) {
if (RuntimeEnabledFeatures::FeaturePolicyForPermissionsEnabled()) {
if (!document->GetFrame()->IsFeatureEnabled( if (!document->GetFrame()->IsFeatureEnabled(
mojom::FeaturePolicyFeature::kCamera)) { mojom::FeaturePolicyFeature::kCamera)) {
UseCounter::Count(document, UseCounter::Count(document,
WebFeature::kCameraDisabledByFeaturePolicyEstimate); WebFeature::kCameraDisabledByFeaturePolicyEstimate);
} }
} else {
Deprecation::CountDeprecationFeaturePolicy(
*document, mojom::FeaturePolicyFeature::kCamera);
}
} }
HostsUsingFeatures::CountAnyWorld( HostsUsingFeatures::CountAnyWorld(
......
...@@ -102,21 +102,15 @@ ScriptPromise NavigatorWebMIDI::requestMIDIAccess(ScriptState* script_state, ...@@ -102,21 +102,15 @@ ScriptPromise NavigatorWebMIDI::requestMIDIAccess(ScriptState* script_state,
UseCounter::CountCrossOriginIframe( UseCounter::CountCrossOriginIframe(
document, WebFeature::kRequestMIDIAccessIframe_ObscuredByFootprinting); document, WebFeature::kRequestMIDIAccessIframe_ObscuredByFootprinting);
if (RuntimeEnabledFeatures::FeaturePolicyForPermissionsEnabled()) {
if (!document.GetFrame()->IsFeatureEnabled( if (!document.GetFrame()->IsFeatureEnabled(
mojom::FeaturePolicyFeature::kMidiFeature)) { mojom::FeaturePolicyFeature::kMidiFeature)) {
UseCounter::Count(document, WebFeature::kMidiDisabledByFeaturePolicy); UseCounter::Count(document, WebFeature::kMidiDisabledByFeaturePolicy);
document.AddConsoleMessage( document.AddConsoleMessage(ConsoleMessage::Create(
ConsoleMessage::Create(kJSMessageSource, kWarningMessageLevel, kJSMessageSource, kWarningMessageLevel, kFeaturePolicyConsoleWarning));
kFeaturePolicyConsoleWarning));
return ScriptPromise::RejectWithDOMException( return ScriptPromise::RejectWithDOMException(
script_state, DOMException::Create(DOMExceptionCode::kSecurityError, script_state, DOMException::Create(DOMExceptionCode::kSecurityError,
kFeaturePolicyErrorMessage)); kFeaturePolicyErrorMessage));
} }
} else {
Deprecation::CountDeprecationFeaturePolicy(
document, mojom::FeaturePolicyFeature::kMidiFeature);
}
return MIDIAccessInitializer::Start(script_state, options); return MIDIAccessInitializer::Start(script_state, options);
} }
......
...@@ -468,10 +468,6 @@ ...@@ -468,10 +468,6 @@
name: "FeaturePolicyAutoplayFeature", name: "FeaturePolicyAutoplayFeature",
status: "stable" status: "stable"
}, },
{
name: "FeaturePolicyForPermissions",
status: "stable"
},
{ {
name: "FeaturePolicyJavaScriptInterface", name: "FeaturePolicyJavaScriptInterface",
origin_trial_feature_name: "FeaturePolicyJSAPI", origin_trial_feature_name: "FeaturePolicyJSAPI",
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment