Changeset 100895 in webkit
- Timestamp:
- Nov 21, 2011 2:29:55 AM (12 years ago)
- Location:
- trunk
- Files:
-
- 25 added
- 26 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/LayoutTests/ChangeLog
r100892 r100895 1 2011-11-21 Jochen Eisinger <jochen@chromium.org> 2 3 Implement Meta referrer 4 https://bugs.webkit.org/show_bug.cgi?id=72674 5 6 Reviewed by Adam Barth. 7 8 * http/tests/security/referrer-policy-always-expected.txt: Added. 9 * http/tests/security/referrer-policy-always.html: Added. 10 * http/tests/security/referrer-policy-default-expected.txt: Added. 11 * http/tests/security/referrer-policy-default.html: Added. 12 * http/tests/security/referrer-policy-https-always-expected.txt: Added. 13 * http/tests/security/referrer-policy-https-always.html: Added. 14 * http/tests/security/referrer-policy-https-default-expected.txt: Added. 15 * http/tests/security/referrer-policy-https-default.html: Added. 16 * http/tests/security/referrer-policy-https-never-expected.txt: Added. 17 * http/tests/security/referrer-policy-https-never.html: Added. 18 * http/tests/security/referrer-policy-https-origin-expected.txt: Added. 19 * http/tests/security/referrer-policy-https-origin.html: Added. 20 * http/tests/security/referrer-policy-never-expected.txt: Added. 21 * http/tests/security/referrer-policy-never.html: Added. 22 * http/tests/security/referrer-policy-origin-expected.txt: Added. 23 * http/tests/security/referrer-policy-origin.html: Added. 24 * http/tests/security/referrer-policy-redirect-expected.txt: Added. 25 * http/tests/security/referrer-policy-redirect.html: Added. 26 * http/tests/security/referrer-policy-rel-noreferrer-expected.txt: Added. 27 * http/tests/security/referrer-policy-rel-noreferrer.html: Added. 28 * http/tests/security/resources/referrer-policy-log.php: Added. 29 * http/tests/security/resources/referrer-policy-redirect.html: Added. 30 * http/tests/security/resources/referrer-policy-start.html: Added. 31 * http/tests/security/resources/rel-noreferrer.html: Added. 32 1 33 2011-11-21 Dominic Mazzoni <dmazzoni@google.com> 2 34 -
trunk/Source/WebCore/ChangeLog
r100894 r100895 1 2011-11-21 Jochen Eisinger <jochen@chromium.org> 2 3 Implement Meta referrer 4 https://bugs.webkit.org/show_bug.cgi?id=72674 5 6 Reviewed by Adam Barth. 7 8 http://wiki.whatwg.org/wiki/Meta_referrer 9 10 Tests: http/tests/security/referrer-policy-always.html 11 http/tests/security/referrer-policy-default.html 12 http/tests/security/referrer-policy-https-always.html 13 http/tests/security/referrer-policy-https-default.html 14 http/tests/security/referrer-policy-https-never.html 15 http/tests/security/referrer-policy-https-origin.html 16 http/tests/security/referrer-policy-never.html 17 http/tests/security/referrer-policy-origin.html 18 http/tests/security/referrer-policy-redirect.html 19 http/tests/security/referrer-policy-rel-noreferrer.html 20 21 * WebCore.exp.in: updated 22 * dom/Document.cpp: 23 (WebCore::Document::Document): 24 (WebCore::Document::processReferrerPolicy): 25 * dom/Document.h: 26 (WebCore::Document::referrerPolicy): 27 * html/HTMLAnchorElement.cpp: 28 (WebCore::HTMLAnchorElement::handleClick): 29 * html/HTMLMetaElement.cpp: 30 (WebCore::HTMLMetaElement::process): 31 * loader/FrameLoader.cpp: 32 (WebCore::FrameLoader::loadFrameRequest): 33 (WebCore::FrameLoader::loadResourceSynchronously): 34 * loader/PingLoader.cpp: 35 (WebCore::PingLoader::loadImage): 36 (WebCore::PingLoader::sendPing): 37 (WebCore::PingLoader::reportContentSecurityPolicyViolation): 38 * loader/SubframeLoader.cpp: 39 (WebCore::SubframeLoader::loadSubframe): 40 * loader/SubresourceLoader.cpp: 41 (WebCore::SubresourceLoader::create): 42 * page/SecurityPolicy.cpp: 43 (WebCore::SecurityPolicy::generateReferrerHeader): 44 * page/SecurityPolicy.h: 45 1 46 2011-11-21 Vsevolod Vlasov <vsevik@chromium.org> 2 47 -
trunk/Source/WebCore/WebCore.exp.in
r100716 r100895 392 392 __ZN7WebCore14SecurityPolicy18setLocalLoadPolicyENS0_15LocalLoadPolicyE 393 393 __ZN7WebCore14SecurityPolicy18shouldHideReferrerERKNS_4KURLERKN3WTF6StringE 394 __ZN7WebCore14SecurityPolicy22generateReferrerHeaderENS0_14ReferrerPolicyERKNS_4KURLERKN3WTF6StringE 394 395 __ZN7WebCore14SecurityPolicy27resetOriginAccessWhitelistsEv 395 396 __ZN7WebCore14SecurityPolicy29addOriginAccessWhitelistEntryERKNS_14SecurityOriginERKN3WTF6StringES7_b -
trunk/Source/WebCore/dom/Document.cpp
r100716 r100895 424 424 , m_loadEventDelayCount(0) 425 425 , m_loadEventDelayTimer(this, &Document::loadEventDelayTimerFired) 426 , m_referrerPolicy(SecurityPolicy::ReferrerPolicyDefault) 426 427 , m_directionSetOnDocumentElement(false) 427 428 , m_writingModeSetOnDocumentElement(false) … … 2741 2742 2742 2743 frame->page()->updateViewportArguments(); 2744 } 2745 2746 void Document::processReferrerPolicy(const String& policy) 2747 { 2748 ASSERT(!policy.isNull()); 2749 2750 m_referrerPolicy = SecurityPolicy::ReferrerPolicyDefault; 2751 2752 if (equalIgnoringCase(policy, "never")) 2753 m_referrerPolicy = SecurityPolicy::ReferrerPolicyNever; 2754 else if (equalIgnoringCase(policy, "always")) 2755 m_referrerPolicy = SecurityPolicy::ReferrerPolicyAlways; 2756 else if (equalIgnoringCase(policy, "origin")) 2757 m_referrerPolicy = SecurityPolicy::ReferrerPolicyOrigin; 2743 2758 } 2744 2759 -
trunk/Source/WebCore/dom/Document.h
r100696 r100895 43 43 #include "QualifiedName.h" 44 44 #include "ScriptExecutionContext.h" 45 #include "SecurityPolicy.h" 45 46 #include "StringWithDirection.h" 46 47 #include "Timer.h" … … 324 325 ViewportArguments viewportArguments() const { return m_viewportArguments; } 325 326 327 SecurityPolicy::ReferrerPolicy referrerPolicy() const { return m_referrerPolicy; } 328 326 329 DocumentType* doctype() const { return m_docType.get(); } 327 330 … … 806 809 void processHttpEquiv(const String& equiv, const String& content); 807 810 void processViewport(const String& features); 811 void processReferrerPolicy(const String& policy); 808 812 809 813 // Returns the owning element in the parent document. … … 1415 1419 ViewportArguments m_viewportArguments; 1416 1420 1421 SecurityPolicy::ReferrerPolicy m_referrerPolicy; 1422 1417 1423 bool m_directionSetOnDocumentElement; 1418 1424 bool m_writingModeSetOnDocumentElement; -
trunk/Source/WebCore/html/HTMLAnchorElement.cpp
r100805 r100895 505 505 506 506 if (!hasRel(RelationNoReferrer)) { 507 String referrer = frame->loader()->outgoingReferrer();508 if (!referrer.isEmpty() && !SecurityPolicy::shouldHideReferrer(kurl, referrer))507 String referrer = SecurityPolicy::generateReferrerHeader(document()->referrerPolicy(), kurl, frame->loader()->outgoingReferrer()); 508 if (!referrer.isEmpty()) 509 509 request.setHTTPReferrer(referrer); 510 510 frame->loader()->addExtraFieldsToMainResourceRequest(request); -
trunk/Source/WebCore/html/HTMLMetaElement.cpp
r98300 r100895 73 73 document()->processViewport(contentValue); 74 74 75 if (equalIgnoringCase(name(), "referrer")) 76 document()->processReferrerPolicy(contentValue); 77 75 78 // Get the document to process the tag, but only if we're actually part of DOM tree (changing a meta tag while 76 79 // it's not in the tree shouldn't have any effect on the document) -
trunk/Source/WebCore/loader/FrameLoader.cpp
r100852 r100895 1139 1139 } 1140 1140 1141 String referrer;1142 1141 String argsReferrer = request.resourceRequest().httpReferrer(); 1143 if (!argsReferrer.isEmpty()) 1144 referrer = argsReferrer; 1145 else 1146 referrer = m_outgoingReferrer; 1147 1148 if (SecurityPolicy::shouldHideReferrer(url, referrer) || shouldSendReferrer == NeverSendReferrer) 1142 if (argsReferrer.isEmpty()) 1143 argsReferrer = m_outgoingReferrer; 1144 1145 String referrer = SecurityPolicy::generateReferrerHeader(m_frame->document()->referrerPolicy(), url, argsReferrer); 1146 if (shouldSendReferrer == NeverSendReferrer) 1149 1147 referrer = String(); 1150 1148 … … 2595 2593 unsigned long FrameLoader::loadResourceSynchronously(const ResourceRequest& request, StoredCredentials storedCredentials, ResourceError& error, ResourceResponse& response, Vector<char>& data) 2596 2594 { 2597 String referrer = m_outgoingReferrer; 2598 if (SecurityPolicy::shouldHideReferrer(request.url(), referrer)) 2599 referrer = String(); 2595 ASSERT(m_frame->document()); 2596 String referrer = SecurityPolicy::generateReferrerHeader(m_frame->document()->referrerPolicy(), request.url(), m_outgoingReferrer); 2600 2597 2601 2598 ResourceRequest initialRequest = request; -
trunk/Source/WebCore/loader/PingLoader.cpp
r99659 r100895 61 61 #endif 62 62 request.setHTTPHeaderField("Cache-Control", "max-age=0"); 63 if (!SecurityPolicy::shouldHideReferrer(request.url(), frame->loader()->outgoingReferrer())) 64 request.setHTTPReferrer(frame->loader()->outgoingReferrer()); 63 String referrer = SecurityPolicy::generateReferrerHeader(frame->document()->referrerPolicy(), request.url(), frame->loader()->outgoingReferrer()); 64 if (!referrer.isEmpty()) 65 request.setHTTPReferrer(referrer); 65 66 frame->loader()->addExtraFieldsToSubresourceRequest(request); 66 67 OwnPtr<PingLoader> pingLoader = adoptPtr(new PingLoader(frame, request)); … … 90 91 if (!SecurityPolicy::shouldHideReferrer(pingURL, frame->loader()->outgoingReferrer())) { 91 92 request.setHTTPHeaderField("Ping-From", frame->document()->url()); 92 if (!sourceOrigin->isSameSchemeHostPort(pingOrigin.get())) 93 request.setHTTPReferrer(frame->loader()->outgoingReferrer()); 93 if (!sourceOrigin->isSameSchemeHostPort(pingOrigin.get())) { 94 String referrer = SecurityPolicy::generateReferrerHeader(frame->document()->referrerPolicy(), pingURL, frame->loader()->outgoingReferrer()); 95 if (!referrer.isEmpty()) 96 request.setHTTPReferrer(referrer); 97 } 94 98 } 95 99 OwnPtr<PingLoader> pingLoader = adoptPtr(new PingLoader(frame, request)); … … 111 115 frame->loader()->addExtraFieldsToSubresourceRequest(request); 112 116 113 if (!SecurityPolicy::shouldHideReferrer(reportURL, frame->loader()->outgoingReferrer())) 114 request.setHTTPReferrer(frame->loader()->outgoingReferrer()); 117 String referrer = SecurityPolicy::generateReferrerHeader(frame->document()->referrerPolicy(), reportURL, frame->loader()->outgoingReferrer()); 118 if (!referrer.isEmpty()) 119 request.setHTTPReferrer(referrer); 115 120 OwnPtr<PingLoader> pingLoader = adoptPtr(new PingLoader(frame, request)); 116 121 -
trunk/Source/WebCore/loader/SubframeLoader.cpp
r99659 r100895 263 263 return 0; 264 264 265 bool hideReferrer = SecurityPolicy::shouldHideReferrer(url, referrer);266 RefPtr<Frame> frame = m_frame->loader()->client()->createFrame(url, name, ownerElement, hideReferrer ? String() : referrer, allowsScrolling, marginWidth, marginHeight);265 String referrerToUse = SecurityPolicy::generateReferrerHeader(ownerElement->document()->referrerPolicy(), url, referrer); 266 RefPtr<Frame> frame = m_frame->loader()->client()->createFrame(url, name, ownerElement, referrerToUse, allowsScrolling, marginWidth, marginHeight); 267 267 268 268 if (!frame) { -
trunk/Source/WebCore/loader/SubresourceLoader.cpp
r100503 r100895 91 91 } 92 92 93 if (SecurityPolicy::shouldHideReferrer(request.url(), outgoingReferrer)) 93 outgoingReferrer = SecurityPolicy::generateReferrerHeader(frame->document()->referrerPolicy(), request.url(), outgoingReferrer); 94 if (outgoingReferrer.isEmpty()) 94 95 newRequest.clearHTTPReferrer(); 95 96 else if (!request.httpReferrer()) -
trunk/Source/WebCore/page/SecurityPolicy.cpp
r100101 r100895 63 63 64 64 return !URLIsSecureURL; 65 } 66 67 String SecurityPolicy::generateReferrerHeader(ReferrerPolicy referrerPolicy, const KURL& url, const String& referrer) 68 { 69 if (referrer.isEmpty()) 70 return String(); 71 72 switch (referrerPolicy) { 73 case ReferrerPolicyNever: 74 return String(); 75 case ReferrerPolicyAlways: 76 return referrer; 77 case ReferrerPolicyOrigin: { 78 String origin = SecurityOrigin::createFromString(referrer)->toString(); 79 if (origin == "null") 80 return String(); 81 // A security origin is not a canonical URL as it lacks a path. Add / 82 // to turn it into a canonical URL we can use as referrer. 83 return origin + "/"; 84 } 85 case ReferrerPolicyDefault: 86 break; 87 } 88 89 return shouldHideReferrer(url, referrer) ? String() : referrer; 65 90 } 66 91 -
trunk/Source/WebCore/page/SecurityPolicy.h
r99659 r100895 39 39 class SecurityPolicy { 40 40 public: 41 enum ReferrerPolicy { 42 ReferrerPolicyAlways, 43 ReferrerPolicyDefault, 44 ReferrerPolicyNever, 45 // Same as ReferrerPolicyAlways, except that only the origin of the 46 // referring URL is send. 47 ReferrerPolicyOrigin, 48 }; 49 50 // True if the referrer should be omitted according to the 51 // ReferrerPolicyDefault. If you intend to send a referrer header, you 52 // should use generateReferrerHeader instead. 41 53 static bool shouldHideReferrer(const KURL&, const String& referrer); 54 55 // Returns the referrer modified according to the referrer policy for a 56 // navigation to a given URL. If the referrer returned is empty, the 57 // referrer header should be omitted. 58 static String generateReferrerHeader(ReferrerPolicy, const KURL&, const String& referrer); 42 59 43 60 enum LocalLoadPolicy { -
trunk/Source/WebKit/chromium/ChangeLog
r100892 r100895 1 2011-11-21 Jochen Eisinger <jochen@chromium.org> 2 3 Implement Meta referrer 4 https://bugs.webkit.org/show_bug.cgi?id=72674 5 6 Reviewed by Adam Barth. 7 8 * WebKit.gyp: 9 * public/WebFrame.h: 10 * public/WebReferrerPolicy.h: Added. 11 * public/WebSecurityPolicy.h: 12 * src/AssertMatchingEnums.cpp: 13 * src/WebFrameImpl.cpp: 14 (WebKit::WebFrameImpl::referrerPolicy): 15 (WebKit::WebFrameImpl::setReferrerForRequest): 16 * src/WebFrameImpl.h: 17 * src/WebSecurityPolicy.cpp: 18 (WebKit::WebSecurityPolicy::generateReferrerHeader): 19 1 20 2011-11-21 Dominic Mazzoni <dmazzoni@google.com> 2 21 -
trunk/Source/WebKit/chromium/WebKit.gyp
r100869 r100895 277 277 'public/WebRange.h', 278 278 'public/WebRect.h', 279 'public/WebReferrerPolicy.h', 279 280 'public/WebRegularExpression.h', 280 281 'public/WebRuntimeFeatures.h', -
trunk/Source/WebKit/chromium/public/WebFrame.h
r100040 r100895 36 36 #include "WebIconURL.h" 37 37 #include "WebNode.h" 38 #include "WebReferrerPolicy.h" 38 39 #include "WebURL.h" 39 40 #include "WebURLLoaderOptions.h" … … 141 142 virtual WebVector<WebIconURL> iconURLs(int iconTypes) const = 0; 142 143 144 // The referrer policy of the document associated with this frame. 145 virtual WebReferrerPolicy referrerPolicy() const = 0; 146 143 147 144 148 // Geometry ----------------------------------------------------------- -
trunk/Source/WebKit/chromium/public/WebSecurityPolicy.h
r95901 r100895 33 33 34 34 #include "WebCommon.h" 35 #include "WebReferrerPolicy.h" 35 36 36 37 namespace WebKit { … … 72 73 // Returns whether the url should be allowed to see the referrer 73 74 // based on their respective protocols. 74 WEBKIT_EXPORT static bool shouldHideReferrer(const WebURL& url, const WebString& referrer); 75 // FIXME: remove this function once the chromium side has landed. 76 WEBKIT_EXPORT static bool shouldHideReferrer(const WebURL&, const WebString& referrer); 77 78 // Returns the referrer modified according to the referrer policy for a 79 // navigation to a given URL. If the referrer returned is empty, the 80 // referrer header should be omitted. 81 WEBKIT_EXPORT static WebString generateReferrerHeader(WebReferrerPolicy, const WebURL&, const WebString& referrer); 75 82 76 83 // Registers an URL scheme to not allow manipulation of the loaded page -
trunk/Source/WebKit/chromium/src/AssertMatchingEnums.cpp
r99609 r100895 56 56 #include "PasteboardPrivate.h" 57 57 #include "PlatformCursor.h" 58 #include "SecurityPolicy.h" 58 59 #include "Settings.h" 59 60 #include "StorageInfo.h" … … 83 84 #include "WebNotificationPresenter.h" 84 85 #include "WebPageVisibilityState.h" 86 #include "WebReferrerPolicy.h" 85 87 #include "WebScrollbar.h" 86 88 #include "WebSettings.h" … … 468 470 COMPILE_ASSERT_MATCHING_ENUM(WebMediaStreamSource::TypeVideo, MediaStreamSource::TypeVideo); 469 471 #endif 472 473 COMPILE_ASSERT_MATCHING_ENUM(WebReferrerPolicyAlways, SecurityPolicy::ReferrerPolicyAlways); 474 COMPILE_ASSERT_MATCHING_ENUM(WebReferrerPolicyDefault, SecurityPolicy::ReferrerPolicyDefault); 475 COMPILE_ASSERT_MATCHING_ENUM(WebReferrerPolicyNever, SecurityPolicy::ReferrerPolicyNever); 476 COMPILE_ASSERT_MATCHING_ENUM(WebReferrerPolicyOrigin, SecurityPolicy::ReferrerPolicyOrigin); -
trunk/Source/WebKit/chromium/src/WebFrameImpl.cpp
r100040 r100895 592 592 } 593 593 594 WebReferrerPolicy WebFrameImpl::referrerPolicy() const 595 { 596 return static_cast<WebReferrerPolicy>(m_frame->document()->referrerPolicy()); 597 } 598 594 599 WebSize WebFrameImpl::scrollOffset() const 595 600 { … … 1074 1079 else 1075 1080 referrer = referrerURL.spec().utf16(); 1076 if (SecurityPolicy::shouldHideReferrer(request.url(), referrer)) 1081 referrer = SecurityPolicy::generateReferrerHeader(m_frame->document()->referrerPolicy(), request.url(), referrer); 1082 if (referrer.isEmpty()) 1077 1083 return; 1078 1084 request.setHTTPHeaderField(WebString::fromUTF8("Referer"), referrer); -
trunk/Source/WebKit/chromium/src/WebFrameImpl.h
r100040 r100895 71 71 virtual long long identifier() const; 72 72 virtual WebVector<WebIconURL> iconURLs(int iconTypes) const; 73 virtual WebReferrerPolicy referrerPolicy() const; 73 74 virtual WebSize scrollOffset() const; 74 75 virtual void setScrollOffset(const WebSize&); -
trunk/Source/WebKit/chromium/src/WebSecurityPolicy.cpp
r99659 r100895 96 96 } 97 97 98 WebString WebSecurityPolicy::generateReferrerHeader(WebReferrerPolicy referrerPolicy, const WebURL& url, const WebString& referrer) 99 { 100 return SecurityPolicy::generateReferrerHeader(static_cast<SecurityPolicy::ReferrerPolicy>(referrerPolicy), url, referrer); 101 } 102 98 103 void WebSecurityPolicy::registerURLSchemeAsNotAllowingJavascriptURLs(const WebString& scheme) 99 104 { -
trunk/Source/WebKit/mac/ChangeLog
r100874 r100895 1 2011-11-21 Jochen Eisinger <jochen@chromium.org> 2 3 Implement Meta referrer 4 https://bugs.webkit.org/show_bug.cgi?id=72674 5 6 Reviewed by Adam Barth. 7 8 * Plugins/Hosted/HostedNetscapePluginStream.mm: 9 (WebKit::HostedNetscapePluginStream::HostedNetscapePluginStream): 10 * Plugins/WebNetscapePluginStream.mm: 11 (WebNetscapePluginStream::WebNetscapePluginStream): 12 1 13 2011-10-17 Antonio Gomes <agomes@rim.com> 2 14 -
trunk/Source/WebKit/mac/Plugins/Hosted/HostedNetscapePluginStream.mm
r99659 r100895 60 60 , m_frameLoader(0) 61 61 { 62 if (SecurityPolicy::shouldHideReferrer([request URL], core([instance->pluginView() webFrame])->loader()->outgoingReferrer())) 62 String referrer = SecurityPolicy::generateReferrerHeader(core([instance->pluginView() webFrame])->document()->referrerPolicy(), [request URL], core([instance->pluginView() webFrame])->loader()->outgoingReferrer()); 63 if (referrer.isEmpty()) 63 64 [m_request.get() _web_setHTTPReferrer:nil]; 65 else 66 [m_request.get() _web_setHTTPReferrer:referrer]; 64 67 65 68 #ifndef NDEBUG -
trunk/Source/WebKit/mac/Plugins/WebNetscapePluginStream.mm
r99659 r100895 173 173 streams().add(&m_stream, plugin); 174 174 175 if (SecurityPolicy::shouldHideReferrer([request URL], core([view webFrame])->loader()->outgoingReferrer())) 175 String referrer = SecurityPolicy::generateReferrerHeader(core([view webFrame])->document()->referrerPolicy(), [request URL], core([view webFrame])->loader()->outgoingReferrer()); 176 if (referrer.isEmpty()) 176 177 [m_request.get() _web_setHTTPReferrer:nil]; 178 else 179 [m_request.get() _web_setHTTPReferrer:referrer]; 177 180 } 178 181 -
trunk/Source/WebKit2/ChangeLog
r100893 r100895 1 2011-11-21 Jochen Eisinger <jochen@chromium.org> 2 3 Implement Meta referrer 4 https://bugs.webkit.org/show_bug.cgi?id=72674 5 6 Reviewed by Adam Barth. 7 8 * WebProcess/Plugins/PluginView.cpp: 9 (WebKit::PluginView::loadURL): 10 1 11 2011-11-21 Carlos Garcia Campos <cgarcia@igalia.com> 2 12 -
trunk/Source/WebKit2/WebProcess/Plugins/PluginView.cpp
r99659 r100895 986 986 frameLoadRequest.setFrameName(target); 987 987 988 if (!SecurityPolicy::shouldHideReferrer(frameLoadRequest.resourceRequest().url(), frame()->loader()->outgoingReferrer())) 989 frameLoadRequest.resourceRequest().setHTTPReferrer(frame()->loader()->outgoingReferrer()); 988 String referrer = SecurityPolicy::generateReferrerHeader(frame()->document()->referrerPolicy(), frameLoadRequest.resourceRequest().url(), frame()->loader()->outgoingReferrer()); 989 if (!referrer.isEmpty()) 990 frameLoadRequest.resourceRequest().setHTTPReferrer(referrer); 990 991 991 992 m_pendingURLRequests.append(URLRequest::create(requestID, frameLoadRequest, allowPopups));
Note: See TracChangeset
for help on using the changeset viewer.