On May 25, 2012, at 4:27 AM, João Eiras <[email protected]> wrote: > On Thu, 24 May 2012 23:02:00 +0200, Maciej Stachowiak <[email protected]> wrote: > >> >> I agree. Even though there are still legacy features like cookies and >> document.domain that use domain-based security, most of the Web platform >> uses origin-based security, and that has proved to be a sounder model. While >> I acknowledge the use cases for exposing location.domain, it's also likely >> to become an attractive nuisance that pulls developers in the wrong >> direction. >> > > Although I understand this opinion and agree with it, the domain based > security checks are used for cross frame interaction, cookies, security > certificates, etc, therefore it has to be specified and documented.
When you say "cross frame interaction", do you mean just the relatively rare case of document.domain being explicitly set? I agree with you that we must document the right rules for what domains are valid, but I do not think that this requires exposing location.domain explicitly. > > I don't think adding a location.tld property or location.topDomain would pull > developers away from anything. It would just make the legacy domain based > security checks a bit more easy to handle and understand. It's the > specifications and APIs that tell which security model to use, not the > developer. I don't think location.domain would be the same as location.tld, to the extent I understand the intent of them. For the URL "http://www.apple.com/", "apple.com" would be the domain, and "com" would be the TLD. Regards, Maciej
