Changeset 177422 in webkit
- Timestamp:
- Dec 16, 2014 5:48:38 PM (9 years ago)
- Location:
- trunk/Source
- Files:
-
- 28 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/Source/WebCore/ChangeLog
r177414 r177422 1 2014-12-16 Andreas Kling <akling@apple.com> 2 3 Use Ref for SecurityOrigin. 4 <https://webkit.org/b/139710> 5 6 Reviewed by Anders Carlsson. 7 8 Make SecurityOrigin::create*() return Ref<SecurityOrigin>. 9 10 * html/HTMLAnchorElement.cpp: 11 (WebCore::HTMLAnchorElement::origin): 12 * loader/DocumentLoadTiming.cpp: 13 (WebCore::DocumentLoadTiming::addRedirect): 14 * loader/DocumentLoader.cpp: 15 (WebCore::DocumentLoader::willSendRequest): 16 * loader/FrameLoader.cpp: 17 (WebCore::FrameLoader::commitProvisionalLoad): 18 * loader/PingLoader.cpp: 19 (WebCore::PingLoader::sendPing): 20 * loader/appcache/ApplicationCacheHost.cpp: 21 (WebCore::ApplicationCacheHost::isApplicationCacheBlockedForRequest): 22 * loader/appcache/ApplicationCacheStorage.cpp: 23 (WebCore::ApplicationCacheStorage::getOriginsWithCache): 24 * page/ContentSecurityPolicy.cpp: 25 (WebCore::stripURLForUseInReport): 26 * page/DOMWindow.cpp: 27 (WebCore::DOMWindow::crossDomainAccessErrorMessage): 28 * page/SecurityOrigin.cpp: 29 (WebCore::getCachedOrigin): 30 (WebCore::SecurityOrigin::create): 31 (WebCore::SecurityOrigin::createUnique): 32 (WebCore::SecurityOrigin::isolatedCopy): 33 (WebCore::SecurityOrigin::canRequest): 34 (WebCore::SecurityOrigin::createFromString): 35 (WebCore::SecurityOrigin::maybeCreateFromDatabaseIdentifier): 36 (WebCore::SecurityOrigin::createFromDatabaseIdentifier): 37 * page/SecurityOrigin.h: 38 * page/SecurityPolicy.cpp: 39 (WebCore::SecurityPolicy::isAccessToURLWhiteListed): 40 * platform/graphics/avfoundation/objc/MediaPlayerPrivateAVFoundationObjC.mm: 41 (WebCore::MediaPlayerPrivateAVFoundationObjC::hasSingleSecurityOrigin): 42 * storage/StorageTracker.cpp: 43 (WebCore::StorageTracker::deleteOriginWithIdentifier): 44 * workers/DefaultSharedWorkerRepository.cpp: 45 (WebCore::DefaultSharedWorkerRepository::connectToWorker): 46 * workers/WorkerThread.cpp: 47 (WebCore::WorkerThreadStartupData::WorkerThreadStartupData): 48 1 49 2014-12-16 Chris Dumez <cdumez@apple.com> 2 50 -
trunk/Source/WebCore/html/HTMLAnchorElement.cpp
r176502 r177422 489 489 String HTMLAnchorElement::origin() const 490 490 { 491 RefPtr<SecurityOrigin> origin = SecurityOrigin::create(href()); 492 return origin->toString(); 491 return SecurityOrigin::create(href()).get().toString(); 493 492 } 494 493 -
trunk/Source/WebCore/loader/DocumentLoadTiming.cpp
r168647 r177422 84 84 m_redirectEnd = m_fetchStart = monotonicallyIncreasingTime(); 85 85 // Check if the redirected url is allowed to access the redirecting url's timing information. 86 Ref Ptr<SecurityOrigin> redirectedSecurityOrigin = SecurityOrigin::create(redirectedUrl);87 m_hasCrossOriginRedirect = !redirectedSecurityOrigin ->canRequest(redirectingUrl);86 Ref<SecurityOrigin> redirectedSecurityOrigin(SecurityOrigin::create(redirectedUrl)); 87 m_hasCrossOriginRedirect = !redirectedSecurityOrigin.get().canRequest(redirectingUrl); 88 88 } 89 89 -
trunk/Source/WebCore/loader/DocumentLoader.cpp
r177366 r177422 517 517 // If the redirecting url is not allowed to display content from the target origin, 518 518 // then block the redirect. 519 Ref Ptr<SecurityOrigin> redirectingOrigin = SecurityOrigin::create(redirectResponse.url());520 if (!redirectingOrigin ->canDisplay(newRequest.url())) {519 Ref<SecurityOrigin> redirectingOrigin(SecurityOrigin::create(redirectResponse.url())); 520 if (!redirectingOrigin.get().canDisplay(newRequest.url())) { 521 521 FrameLoader::reportLocalLoadFailed(m_frame, newRequest.url().string()); 522 522 cancelMainResourceLoad(frameLoader()->cancelledError(newRequest)); -
trunk/Source/WebCore/loader/FrameLoader.cpp
r177152 r177422 1783 1783 if (pdl && m_documentLoader) { 1784 1784 // Check if the destination page is allowed to access the previous page's timing information. 1785 Ref Ptr<SecurityOrigin> securityOrigin = SecurityOrigin::create(pdl->request().url());1786 m_documentLoader->timing()->setHasSameOriginAsPreviousDocument(securityOrigin ->canRequest(m_previousURL));1785 Ref<SecurityOrigin> securityOrigin(SecurityOrigin::create(pdl->request().url())); 1786 m_documentLoader->timing()->setHasSameOriginAsPreviousDocument(securityOrigin.get().canRequest(m_previousURL)); 1787 1787 } 1788 1788 -
trunk/Source/WebCore/loader/PingLoader.cpp
r176459 r177422 79 79 80 80 SecurityOrigin* sourceOrigin = frame.document()->securityOrigin(); 81 Ref Ptr<SecurityOrigin> pingOrigin = SecurityOrigin::create(pingURL);81 Ref<SecurityOrigin> pingOrigin(SecurityOrigin::create(pingURL)); 82 82 FrameLoader::addHTTPOriginIfNeeded(request, sourceOrigin->toString()); 83 83 request.setHTTPHeaderField(HTTPHeaderName::PingTo, destinationURL); 84 84 if (!SecurityPolicy::shouldHideReferrer(pingURL, frame.loader().outgoingReferrer())) { 85 85 request.setHTTPHeaderField(HTTPHeaderName::PingFrom, frame.document()->url()); 86 if (!sourceOrigin->isSameSchemeHostPort( pingOrigin.get())) {86 if (!sourceOrigin->isSameSchemeHostPort(&pingOrigin.get())) { 87 87 String referrer = SecurityPolicy::generateReferrerHeader(frame.document()->referrerPolicy(), pingURL, frame.loader().outgoingReferrer()); 88 88 if (!referrer.isEmpty()) -
trunk/Source/WebCore/loader/appcache/ApplicationCacheHost.cpp
r170807 r177422 491 491 return false; 492 492 493 Ref Ptr<SecurityOrigin> origin = SecurityOrigin::create(request.url());494 return !origin ->canAccessApplicationCache(frame->document()->topOrigin());493 Ref<SecurityOrigin> origin(SecurityOrigin::create(request.url())); 494 return !origin.get().canAccessApplicationCache(frame->document()->topOrigin()); 495 495 } 496 496 -
trunk/Source/WebCore/loader/appcache/ApplicationCacheStorage.cpp
r176698 r177422 1568 1568 // The current schema doesn't allow for a more efficient way of building this list. 1569 1569 size_t count = urls.size(); 1570 for (size_t i = 0; i < count; ++i) { 1571 RefPtr<SecurityOrigin> origin = SecurityOrigin::create(urls[i]); 1572 origins.add(origin); 1573 } 1570 for (size_t i = 0; i < count; ++i) 1571 origins.add(SecurityOrigin::create(urls[i])); 1574 1572 } 1575 1573 -
trunk/Source/WebCore/page/ContentSecurityPolicy.cpp
r175771 r177422 1584 1584 if (!url.isHierarchical() || url.protocolIs("file")) 1585 1585 return url.protocol(); 1586 return document.securityOrigin()->canRequest(url) ? url.strippedForUseAsReferrer() : SecurityOrigin::create(url) ->toString();1586 return document.securityOrigin()->canRequest(url) ? url.strippedForUseAsReferrer() : SecurityOrigin::create(url).get().toString(); 1587 1587 } 1588 1588 -
trunk/Source/WebCore/page/DOMWindow.cpp
r177365 r177422 2021 2021 URL targetURL = document()->url(); 2022 2022 if (document()->isSandboxed(SandboxOrigin) || activeWindow.document()->isSandboxed(SandboxOrigin)) { 2023 message = "Blocked a frame at \"" + SecurityOrigin::create(activeURL) ->toString() + "\" from accessing a frame at \"" + SecurityOrigin::create(targetURL)->toString() + "\". ";2023 message = "Blocked a frame at \"" + SecurityOrigin::create(activeURL).get().toString() + "\" from accessing a frame at \"" + SecurityOrigin::create(targetURL).get().toString() + "\". "; 2024 2024 if (document()->isSandboxed(SandboxOrigin) && activeWindow.document()->isSandboxed(SandboxOrigin)) 2025 2025 return "Sandbox access violation: " + message + " Both frames are sandboxed and lack the \"allow-same-origin\" flag."; -
trunk/Source/WebCore/page/SecurityOrigin.cpp
r174921 r177422 75 75 } 76 76 77 static PassRefPtr<SecurityOrigin> getCachedOrigin(const URL& url)77 static RefPtr<SecurityOrigin> getCachedOrigin(const URL& url) 78 78 { 79 79 if (url.protocolIs("blob")) 80 80 return ThreadableBlobRegistry::getCachedOrigin(url); 81 return 0;81 return nullptr; 82 82 } 83 83 … … 164 164 } 165 165 166 PassRefPtr<SecurityOrigin> SecurityOrigin::create(const URL& url) 167 { 168 RefPtr<SecurityOrigin> cachedOrigin = getCachedOrigin(url); 169 if (cachedOrigin.get()) 170 return cachedOrigin; 166 Ref<SecurityOrigin> SecurityOrigin::create(const URL& url) 167 { 168 if (RefPtr<SecurityOrigin> cachedOrigin = getCachedOrigin(url)) 169 return cachedOrigin.releaseNonNull(); 171 170 172 171 if (shouldTreatAsUniqueOrigin(url)) { 173 Ref Ptr<SecurityOrigin> origin = adoptRef(new SecurityOrigin());172 Ref<SecurityOrigin> origin(adoptRef(*new SecurityOrigin)); 174 173 175 174 if (url.protocolIs("file")) { … … 181 180 } 182 181 183 return origin .release();182 return origin; 184 183 } 185 184 186 185 if (shouldUseInnerURL(url)) 187 return adoptRef( new SecurityOrigin(extractInnerURL(url)));188 189 return adoptRef( new SecurityOrigin(url));190 } 191 192 PassRefPtr<SecurityOrigin> SecurityOrigin::createUnique()193 { 194 Ref Ptr<SecurityOrigin> origin = adoptRef(new SecurityOrigin());195 ASSERT(origin ->isUnique());196 return origin .release();197 } 198 199 PassRefPtr<SecurityOrigin> SecurityOrigin::isolatedCopy() const200 { 201 return adoptRef( new SecurityOrigin(this));186 return adoptRef(*new SecurityOrigin(extractInnerURL(url))); 187 188 return adoptRef(*new SecurityOrigin(url)); 189 } 190 191 Ref<SecurityOrigin> SecurityOrigin::createUnique() 192 { 193 Ref<SecurityOrigin> origin(adoptRef(*new SecurityOrigin)); 194 ASSERT(origin.get().isUnique()); 195 return origin; 196 } 197 198 Ref<SecurityOrigin> SecurityOrigin::isolatedCopy() const 199 { 200 return adoptRef(*new SecurityOrigin(this)); 202 201 } 203 202 … … 290 289 return false; 291 290 292 Ref Ptr<SecurityOrigin> targetOrigin = SecurityOrigin::create(url);291 Ref<SecurityOrigin> targetOrigin(SecurityOrigin::create(url)); 293 292 294 293 if (targetOrigin->isUnique()) … … 297 296 // We call isSameSchemeHostPort here instead of canAccess because we want 298 297 // to ignore document.domain effects. 299 if (isSameSchemeHostPort( targetOrigin.get()))300 return true; 301 302 if (SecurityPolicy::isAccessWhiteListed(this, targetOrigin.get()))298 if (isSameSchemeHostPort(&targetOrigin.get())) 299 return true; 300 301 if (SecurityPolicy::isAccessWhiteListed(this, &targetOrigin.get())) 303 302 return true; 304 303 … … 489 488 } 490 489 491 PassRefPtr<SecurityOrigin> SecurityOrigin::createFromString(const String& originString)490 Ref<SecurityOrigin> SecurityOrigin::createFromString(const String& originString) 492 491 { 493 492 return SecurityOrigin::create(URL(URL(), originString)); … … 496 495 static const char separatorCharacter = '_'; 497 496 498 PassRefPtr<SecurityOrigin> SecurityOrigin::maybeCreateFromDatabaseIdentifier(const String& databaseIdentifier)497 RefPtr<SecurityOrigin> SecurityOrigin::maybeCreateFromDatabaseIdentifier(const String& databaseIdentifier) 499 498 { 500 499 // Make sure there's a first separator … … 531 530 } 532 531 533 PassRefPtr<SecurityOrigin> SecurityOrigin::createFromDatabaseIdentifier(const String& databaseIdentifier) 534 { 535 RefPtr<SecurityOrigin> origin = maybeCreateFromDatabaseIdentifier(databaseIdentifier); 536 if (origin) 537 return origin.release(); 532 Ref<SecurityOrigin> SecurityOrigin::createFromDatabaseIdentifier(const String& databaseIdentifier) 533 { 534 if (RefPtr<SecurityOrigin> origin = maybeCreateFromDatabaseIdentifier(databaseIdentifier)) 535 return origin.releaseNonNull(); 538 536 return create(URL()); 539 537 } 540 538 541 PassRefPtr<SecurityOrigin> SecurityOrigin::create(const String& protocol, const String& host, int port)539 Ref<SecurityOrigin> SecurityOrigin::create(const String& protocol, const String& host, int port) 542 540 { 543 541 if (port < 0 || port > MaxAllowedPort) -
trunk/Source/WebCore/page/SecurityOrigin.h
r174921 r177422 51 51 }; 52 52 53 WEBCORE_EXPORT static PassRefPtr<SecurityOrigin> create(const URL&);54 static PassRefPtr<SecurityOrigin> createUnique();55 56 WEBCORE_EXPORT static PassRefPtr<SecurityOrigin> createFromDatabaseIdentifier(const String&);53 WEBCORE_EXPORT static Ref<SecurityOrigin> create(const URL&); 54 static Ref<SecurityOrigin> createUnique(); 55 56 WEBCORE_EXPORT static Ref<SecurityOrigin> createFromDatabaseIdentifier(const String&); 57 57 // Alternate form of createFromDatabaseIdentifier that returns a nullptr on failure, instead of an empty origin. 58 58 // FIXME: Many users of createFromDatabaseIdentifier seem to expect maybeCreateFromDatabaseIdentifier behavior, 59 59 // but they aren't getting it so they might be buggy. 60 WEBCORE_EXPORT static PassRefPtr<SecurityOrigin> maybeCreateFromDatabaseIdentifier(const String&);61 62 WEBCORE_EXPORT static PassRefPtr<SecurityOrigin> createFromString(const String&);63 WEBCORE_EXPORT static PassRefPtr<SecurityOrigin> create(const String& protocol, const String& host, int port);60 WEBCORE_EXPORT static RefPtr<SecurityOrigin> maybeCreateFromDatabaseIdentifier(const String&); 61 62 WEBCORE_EXPORT static Ref<SecurityOrigin> createFromString(const String&); 63 WEBCORE_EXPORT static Ref<SecurityOrigin> create(const String& protocol, const String& host, int port); 64 64 65 65 // Some URL schemes use nested URLs for their security context. For example, … … 78 78 // Create a deep copy of this SecurityOrigin. This method is useful 79 79 // when marshalling a SecurityOrigin to another thread. 80 WEBCORE_EXPORT PassRefPtr<SecurityOrigin> isolatedCopy() const;80 WEBCORE_EXPORT Ref<SecurityOrigin> isolatedCopy() const; 81 81 82 82 // Set the domain property of this security origin to newDomain. This -
trunk/Source/WebCore/page/SecurityPolicy.cpp
r167594 r177422 122 122 bool SecurityPolicy::isAccessToURLWhiteListed(const SecurityOrigin* activeOrigin, const URL& url) 123 123 { 124 Ref Ptr<SecurityOrigin> targetOrigin = SecurityOrigin::create(url);125 return isAccessWhiteListed(activeOrigin, targetOrigin.get());124 Ref<SecurityOrigin> targetOrigin(SecurityOrigin::create(url)); 125 return isAccessWhiteListed(activeOrigin, &targetOrigin.get()); 126 126 } 127 127 -
trunk/Source/WebCore/platform/graphics/avfoundation/objc/MediaPlayerPrivateAVFoundationObjC.mm
r176924 r177422 2009 2009 return false; 2010 2010 2011 Ref Ptr<SecurityOrigin> resolvedOrigin = SecurityOrigin::create(resolvedURL());2012 Ref Ptr<SecurityOrigin> requestedOrigin = SecurityOrigin::createFromString(assetURL());2013 return resolvedOrigin ->isSameSchemeHostPort(requestedOrigin.get());2011 Ref<SecurityOrigin> resolvedOrigin(SecurityOrigin::create(resolvedURL())); 2012 Ref<SecurityOrigin> requestedOrigin(SecurityOrigin::createFromString(assetURL())); 2013 return resolvedOrigin.get().isSameSchemeHostPort(&requestedOrigin.get()); 2014 2014 } 2015 2015 -
trunk/Source/WebCore/storage/StorageTracker.cpp
r177178 r177422 477 477 void StorageTracker::deleteOriginWithIdentifier(const String& originIdentifier) 478 478 { 479 deleteOrigin( SecurityOrigin::createFromDatabaseIdentifier(originIdentifier).get());479 deleteOrigin(&SecurityOrigin::createFromDatabaseIdentifier(originIdentifier).get()); 480 480 } 481 481 -
trunk/Source/WebCore/workers/DefaultSharedWorkerRepository.cpp
r175792 r177422 377 377 { 378 378 MutexLocker lock(m_lock); 379 ASSERT(worker->scriptExecutionContext()->securityOrigin()->canAccess( SecurityOrigin::create(url).get()));379 ASSERT(worker->scriptExecutionContext()->securityOrigin()->canAccess(&SecurityOrigin::create(url).get())); 380 380 // Fetch a proxy corresponding to this SharedWorker. 381 381 RefPtr<SharedWorkerProxy> proxy = getProxy(name, url); -
trunk/Source/WebCore/workers/WorkerThread.cpp
r174125 r177422 100 100 , m_contentSecurityPolicy(contentSecurityPolicy.isolatedCopy()) 101 101 , m_contentSecurityPolicyType(contentSecurityPolicyType) 102 , m_topOrigin(topOrigin ? topOrigin->isolatedCopy() : 0)102 , m_topOrigin(topOrigin ? &topOrigin->isolatedCopy().get() : nullptr) 103 103 { 104 104 if (!settings) -
trunk/Source/WebKit/mac/ChangeLog
r177410 r177422 1 2014-12-16 Andreas Kling <akling@apple.com> 2 3 Use Ref for SecurityOrigin. 4 <https://webkit.org/b/139710> 5 6 Reviewed by Anders Carlsson. 7 8 * Storage/WebStorageTrackerClient.mm: 9 (WebStorageTrackerClient::dispatchDidModifyOrigin): 10 * WebView/WebView.mm: 11 (+[WebView _addOriginAccessWhitelistEntryWithSourceOrigin:destinationProtocol:destinationHost:allowDestinationSubdomains:]): 12 (+[WebView _removeOriginAccessWhitelistEntryWithSourceOrigin:destinationProtocol:destinationHost:allowDestinationSubdomains:]): 13 1 14 2014-12-16 Beth Dakin <bdakin@apple.com> 2 15 -
trunk/Source/WebKit/mac/Storage/WebStorageTrackerClient.mm
r149255 r177422 67 67 void WebStorageTrackerClient::dispatchDidModifyOrigin(const String& originIdentifier) 68 68 { 69 PassRefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(originIdentifier);69 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(originIdentifier); 70 70 71 71 if (!isMainThread()) { -
trunk/Source/WebKit/mac/WebView/WebView.mm
r177371 r177422 3966 3966 + (void)_addOriginAccessWhitelistEntryWithSourceOrigin:(NSString *)sourceOrigin destinationProtocol:(NSString *)destinationProtocol destinationHost:(NSString *)destinationHost allowDestinationSubdomains:(BOOL)allowDestinationSubdomains 3967 3967 { 3968 SecurityPolicy::addOriginAccessWhitelistEntry( *SecurityOrigin::createFromString(sourceOrigin), destinationProtocol, destinationHost, allowDestinationSubdomains);3968 SecurityPolicy::addOriginAccessWhitelistEntry(SecurityOrigin::createFromString(sourceOrigin).get(), destinationProtocol, destinationHost, allowDestinationSubdomains); 3969 3969 } 3970 3970 3971 3971 + (void)_removeOriginAccessWhitelistEntryWithSourceOrigin:(NSString *)sourceOrigin destinationProtocol:(NSString *)destinationProtocol destinationHost:(NSString *)destinationHost allowDestinationSubdomains:(BOOL)allowDestinationSubdomains 3972 3972 { 3973 SecurityPolicy::removeOriginAccessWhitelistEntry( *SecurityOrigin::createFromString(sourceOrigin), destinationProtocol, destinationHost, allowDestinationSubdomains);3973 SecurityPolicy::removeOriginAccessWhitelistEntry(SecurityOrigin::createFromString(sourceOrigin).get(), destinationProtocol, destinationHost, allowDestinationSubdomains); 3974 3974 } 3975 3975 -
trunk/Source/WebKit/win/ChangeLog
r177152 r177422 1 2014-12-16 Andreas Kling <akling@apple.com> 2 3 Use Ref for SecurityOrigin. 4 <https://webkit.org/b/139710> 5 6 Reviewed by Anders Carlsson. 7 8 * WebDatabaseManager.cpp: 9 (WebDatabaseManager::setQuota): 10 * WebView.cpp: 11 (WebView::addOriginAccessWhitelistEntry): 12 (WebView::removeOriginAccessWhitelistEntry): 13 1 14 2014-12-11 Alexey Proskuryakov <ap@apple.com> 2 15 -
trunk/Source/WebKit/win/WebDatabaseManager.cpp
r176892 r177422 383 383 return E_FAIL; 384 384 385 DatabaseManager::manager().setQuota(SecurityOrigin::createFromString(origin). get(), quota);385 DatabaseManager::manager().setQuota(SecurityOrigin::createFromString(origin).ptr(), quota); 386 386 387 387 return S_OK; -
trunk/Source/WebKit/win/WebView.cpp
r177119 r177422 6410 6410 HRESULT WebView::addOriginAccessWhitelistEntry(BSTR sourceOrigin, BSTR destinationProtocol, BSTR destinationHost, BOOL allowDestinationSubdomains) 6411 6411 { 6412 SecurityPolicy::addOriginAccessWhitelistEntry( *SecurityOrigin::createFromString(toString(sourceOrigin)), toString(destinationProtocol), toString(destinationHost), allowDestinationSubdomains);6412 SecurityPolicy::addOriginAccessWhitelistEntry(SecurityOrigin::createFromString(toString(sourceOrigin)).get(), toString(destinationProtocol), toString(destinationHost), allowDestinationSubdomains); 6413 6413 return S_OK; 6414 6414 } … … 6416 6416 HRESULT WebView::removeOriginAccessWhitelistEntry(BSTR sourceOrigin, BSTR destinationProtocol, BSTR destinationHost, BOOL allowDestinationSubdomains) 6417 6417 { 6418 SecurityPolicy::removeOriginAccessWhitelistEntry( *SecurityOrigin::createFromString(toString(sourceOrigin)), toString(destinationProtocol), toString(destinationHost), allowDestinationSubdomains);6418 SecurityPolicy::removeOriginAccessWhitelistEntry(SecurityOrigin::createFromString(toString(sourceOrigin)).get(), toString(destinationProtocol), toString(destinationHost), allowDestinationSubdomains); 6419 6419 return S_OK; 6420 6420 } -
trunk/Source/WebKit2/ChangeLog
r177420 r177422 1 2014-12-16 Andreas Kling <akling@apple.com> 2 3 Use Ref for SecurityOrigin. 4 <https://webkit.org/b/139710> 5 6 Reviewed by Anders Carlsson. 7 8 * DatabaseProcess/IndexedDB/UniqueIDBDatabase.cpp: 9 (WebKit::UniqueIDBDatabase::databaseFilenameIdentifier): 10 * WebProcess/ApplicationCache/WebApplicationCacheManager.cpp: 11 (WebKit::WebApplicationCacheManager::deleteEntriesForOrigin): 12 * WebProcess/Databases/IndexedDB/WebIDBServerConnection.cpp: 13 (WebKit::WebIDBServerConnection::WebIDBServerConnection): 14 * WebProcess/InjectedBundle/InjectedBundle.cpp: 15 (WebKit::InjectedBundle::addOriginAccessWhitelistEntry): 16 (WebKit::InjectedBundle::removeOriginAccessWhitelistEntry): 17 1 18 2014-12-16 Anders Carlsson <andersca@apple.com> 2 19 -
trunk/Source/WebKit2/DatabaseProcess/IndexedDB/UniqueIDBDatabase.cpp
r172193 r177422 94 94 String UniqueIDBDatabase::databaseFilenameIdentifier(const SecurityOriginData& originData) const 95 95 { 96 Ref Ptr<SecurityOrigin> securityOrigin = SecurityOrigin::create(originData.protocol, originData.host, originData.port);97 return securityOrigin ->databaseIdentifier();96 Ref<SecurityOrigin> securityOrigin(SecurityOrigin::create(originData.protocol, originData.host, originData.port)); 97 return securityOrigin.get().databaseIdentifier(); 98 98 } 99 99 -
trunk/Source/WebKit2/WebProcess/ApplicationCache/WebApplicationCacheManager.cpp
r176698 r177422 79 79 void WebApplicationCacheManager::deleteEntriesForOrigin(const SecurityOriginData& originData) 80 80 { 81 RefPtr<SecurityOrigin> origin = SecurityOrigin::create(originData.protocol, originData.host, originData.port); 82 if (!origin) 83 return; 84 85 ApplicationCache::deleteCacheForOrigin(origin.get()); 81 Ref<SecurityOrigin> origin(SecurityOrigin::create(originData.protocol, originData.host, originData.port)); 82 ApplicationCache::deleteCacheForOrigin(&origin.get()); 86 83 } 87 84 -
trunk/Source/WebKit2/WebProcess/Databases/IndexedDB/WebIDBServerConnection.cpp
r172193 r177422 63 63 : m_serverConnectionIdentifier(generateServerConnectionIdentifier()) 64 64 , m_databaseName(databaseName) 65 , m_openingOrigin( *openingOrigin.isolatedCopy())66 , m_mainFrameOrigin( *mainFrameOrigin.isolatedCopy())65 , m_openingOrigin(openingOrigin.isolatedCopy()) 66 , m_mainFrameOrigin(mainFrameOrigin.isolatedCopy()) 67 67 { 68 68 send(Messages::DatabaseToWebProcessConnection::EstablishIDBConnection(m_serverConnectionIdentifier)); -
trunk/Source/WebKit2/WebProcess/InjectedBundle/InjectedBundle.cpp
r176659 r177422 329 329 void InjectedBundle::addOriginAccessWhitelistEntry(const String& sourceOrigin, const String& destinationProtocol, const String& destinationHost, bool allowDestinationSubdomains) 330 330 { 331 SecurityPolicy::addOriginAccessWhitelistEntry( *SecurityOrigin::createFromString(sourceOrigin), destinationProtocol, destinationHost, allowDestinationSubdomains);331 SecurityPolicy::addOriginAccessWhitelistEntry(SecurityOrigin::createFromString(sourceOrigin).get(), destinationProtocol, destinationHost, allowDestinationSubdomains); 332 332 } 333 333 334 334 void InjectedBundle::removeOriginAccessWhitelistEntry(const String& sourceOrigin, const String& destinationProtocol, const String& destinationHost, bool allowDestinationSubdomains) 335 335 { 336 SecurityPolicy::removeOriginAccessWhitelistEntry( *SecurityOrigin::createFromString(sourceOrigin), destinationProtocol, destinationHost, allowDestinationSubdomains);336 SecurityPolicy::removeOriginAccessWhitelistEntry(SecurityOrigin::createFromString(sourceOrigin).get(), destinationProtocol, destinationHost, allowDestinationSubdomains); 337 337 } 338 338
Note: See TracChangeset
for help on using the changeset viewer.