Changeset 265081 in webkit
- Timestamp:
- Jul 30, 2020 8:10:39 AM (4 years ago)
- Location:
- trunk
- Files:
-
- 22 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/Source/WebKit/ChangeLog
r265080 r265081 1 2020-07-30 Alex Christensen <achristensen@webkit.org> 2 3 Remove non-inclusive terminology from WebKit variable names and test-only SPI 4 https://bugs.webkit.org/show_bug.cgi?id=214941 5 6 Reviewed by Michael Catanzaro. 7 8 * NetworkProcess/NetworkConnectionToWebProcess.cpp: 9 (WebKit::NetworkConnectionToWebProcess::addOriginAccessAllowListEntry): 10 (WebKit::NetworkConnectionToWebProcess::removeOriginAccessAllowListEntry): 11 (WebKit::NetworkConnectionToWebProcess::resetOriginAccessAllowLists): 12 (WebKit::NetworkConnectionToWebProcess::addOriginAccessWhitelistEntry): Deleted. 13 (WebKit::NetworkConnectionToWebProcess::removeOriginAccessWhitelistEntry): Deleted. 14 (WebKit::NetworkConnectionToWebProcess::resetOriginAccessWhitelists): Deleted. 15 * NetworkProcess/NetworkConnectionToWebProcess.h: 16 * NetworkProcess/NetworkConnectionToWebProcess.messages.in: 17 * Shared/WebProcessCreationParameters.cpp: 18 (WebKit::WebProcessCreationParameters::encode const): 19 (WebKit::WebProcessCreationParameters::decode): 20 * Shared/WebProcessCreationParameters.h: 21 * UIProcess/API/glib/WebKitUserContent.cpp: 22 (_WebKitUserStyleSheet::_WebKitUserStyleSheet): 23 (webkit_user_style_sheet_new): 24 (webkit_user_style_sheet_new_for_world): 25 (_WebKitUserScript::_WebKitUserScript): 26 (webkit_user_script_new): 27 (webkit_user_script_new_for_world): 28 * UIProcess/API/glib/WebKitWebContext.cpp: 29 (pathIsBlocked): 30 (webkit_web_context_add_path_to_sandbox): 31 (pathIsBlacklisted): Deleted. 32 * UIProcess/API/gtk/WebKitUserContent.h: 33 * UIProcess/API/wpe/WebKitUserContent.h: 34 * UIProcess/Cocoa/WebProcessPoolCocoa.mm: 35 (WebKit::WebProcessPool::platformInitializeWebProcess): 36 * UIProcess/Launcher/glib/BubblewrapLauncher.cpp: 37 (WebKit::setupSeccomp): 38 * UIProcess/WebProcessPool.cpp: 39 (WebKit::WebProcessPool::setFontAllowList): 40 * UIProcess/WebProcessPool.h: 41 * WebProcess/InjectedBundle/API/c/WKBundle.cpp: 42 (WKBundleAddOriginAccessAllowListEntry): 43 (WKBundleRemoveOriginAccessAllowListEntry): 44 (WKBundleResetOriginAccessAllowLists): 45 (WKBundleAddOriginAccessWhitelistEntry): Deleted. 46 (WKBundleRemoveOriginAccessWhitelistEntry): Deleted. 47 (WKBundleResetOriginAccessWhitelists): Deleted. 48 * WebProcess/InjectedBundle/API/c/WKBundlePrivate.h: 49 * WebProcess/InjectedBundle/InjectedBundle.cpp: 50 (WebKit::InjectedBundle::addOriginAccessAllowListEntry): 51 (WebKit::InjectedBundle::removeOriginAccessAllowListEntry): 52 (WebKit::InjectedBundle::resetOriginAccessAllowLists): 53 (WebKit::InjectedBundle::addOriginAccessWhitelistEntry): Deleted. 54 (WebKit::InjectedBundle::removeOriginAccessWhitelistEntry): Deleted. 55 (WebKit::InjectedBundle::resetOriginAccessWhitelists): Deleted. 56 * WebProcess/InjectedBundle/InjectedBundle.h: 57 * WebProcess/cocoa/WebProcessCocoa.mm: 58 (WebKit::WebProcess::platformInitializeWebProcess): 59 1 60 2020-07-15 Carlos Garcia Campos <cgarcia@igalia.com> 2 61 -
trunk/Source/WebKit/NetworkProcess/NetworkConnectionToWebProcess.cpp
r264846 r265081 917 917 #endif 918 918 919 void NetworkConnectionToWebProcess::addOriginAccess WhitelistEntry(const String& sourceOrigin, const String& destinationProtocol, const String& destinationHost, bool allowDestinationSubdomains)919 void NetworkConnectionToWebProcess::addOriginAccessAllowListEntry(const String& sourceOrigin, const String& destinationProtocol, const String& destinationHost, bool allowDestinationSubdomains) 920 920 { 921 921 SecurityPolicy::addOriginAccessAllowlistEntry(SecurityOrigin::createFromString(sourceOrigin).get(), destinationProtocol, destinationHost, allowDestinationSubdomains); 922 922 } 923 923 924 void NetworkConnectionToWebProcess::removeOriginAccess WhitelistEntry(const String& sourceOrigin, const String& destinationProtocol, const String& destinationHost, bool allowDestinationSubdomains)924 void NetworkConnectionToWebProcess::removeOriginAccessAllowListEntry(const String& sourceOrigin, const String& destinationProtocol, const String& destinationHost, bool allowDestinationSubdomains) 925 925 { 926 926 SecurityPolicy::removeOriginAccessAllowlistEntry(SecurityOrigin::createFromString(sourceOrigin).get(), destinationProtocol, destinationHost, allowDestinationSubdomains); 927 927 } 928 928 929 void NetworkConnectionToWebProcess::resetOriginAccess Whitelists()929 void NetworkConnectionToWebProcess::resetOriginAccessAllowLists() 930 930 { 931 931 SecurityPolicy::resetOriginAccessAllowlists(); -
trunk/Source/WebKit/NetworkProcess/NetworkConnectionToWebProcess.h
r264665 r265081 273 273 #endif 274 274 275 void addOriginAccess WhitelistEntry(const String& sourceOrigin, const String& destinationProtocol, const String& destinationHost, bool allowDestinationSubdomains);276 void removeOriginAccess WhitelistEntry(const String& sourceOrigin, const String& destinationProtocol, const String& destinationHost, bool allowDestinationSubdomains);277 void resetOriginAccess Whitelists();275 void addOriginAccessAllowListEntry(const String& sourceOrigin, const String& destinationProtocol, const String& destinationHost, bool allowDestinationSubdomains); 276 void removeOriginAccessAllowListEntry(const String& sourceOrigin, const String& destinationProtocol, const String& destinationHost, bool allowDestinationSubdomains); 277 void resetOriginAccessAllowLists(); 278 278 279 279 uint64_t nextMessageBatchIdentifier(Function<void()>&&); -
trunk/Source/WebKit/NetworkProcess/NetworkConnectionToWebProcess.messages.in
r264665 r265081 72 72 #endif 73 73 74 AddOriginAccess WhitelistEntry(String sourceOrigin, String destinationProtocol, String destinationHost, bool allowDestinationSubdomains);75 RemoveOriginAccess WhitelistEntry(String sourceOrigin, String destinationProtocol, String destinationHost, bool allowDestinationSubdomains);76 ResetOriginAccess Whitelists();74 AddOriginAccessAllowListEntry(String sourceOrigin, String destinationProtocol, String destinationHost, bool allowDestinationSubdomains); 75 RemoveOriginAccessAllowListEntry(String sourceOrigin, String destinationProtocol, String destinationHost, bool allowDestinationSubdomains); 76 ResetOriginAccessAllowLists(); 77 77 78 78 GetNetworkLoadInformationResponse(uint64_t resourceLoadIdentifier) -> (WebCore::ResourceResponse response) Synchronous -
trunk/Source/WebKit/Shared/WebProcessCreationParameters.cpp
r264476 r265081 78 78 encoder << shouldSuppressMemoryPressureHandler; 79 79 encoder << shouldUseFontSmoothing; 80 encoder << font Whitelist;80 encoder << fontAllowList; 81 81 encoder << terminationTimeout; 82 82 encoder << overrideLanguages; … … 280 280 if (!decoder.decode(parameters.shouldUseFontSmoothing)) 281 281 return false; 282 if (!decoder.decode(parameters.font Whitelist))282 if (!decoder.decode(parameters.fontAllowList)) 283 283 return false; 284 284 if (!decoder.decode(parameters.terminationTimeout)) -
trunk/Source/WebKit/Shared/WebProcessCreationParameters.h
r264476 r265081 107 107 Vector<String> urlSchemesRegisteredAsCanDisplayOnlyIfCanRequest; 108 108 109 Vector<String> font Whitelist;109 Vector<String> fontAllowList; 110 110 Vector<String> overrideLanguages; 111 111 #if USE(GSTREAMER) -
trunk/Source/WebKit/UIProcess/API/glib/WebKitUserContent.cpp
r259523 r265081 98 98 99 99 struct _WebKitUserStyleSheet { 100 _WebKitUserStyleSheet(const gchar* source, WebKitUserContentInjectedFrames injectedFrames, WebKitUserStyleLevel level, const char* const* whitelist, const char* const* blacklist, API::ContentWorld& world)100 _WebKitUserStyleSheet(const gchar* source, WebKitUserContentInjectedFrames injectedFrames, WebKitUserStyleLevel level, const char* const* allowList, const char* const* blockList, API::ContentWorld& world) 101 101 : userStyleSheet(adoptRef(new API::UserStyleSheet(UserStyleSheet { 102 102 String::fromUTF8(source), URL { }, 103 toStringVector( whitelist), toStringVector(blacklist),103 toStringVector(allowList), toStringVector(blockList), 104 104 toUserContentInjectedFrames(injectedFrames), 105 105 toUserStyleLevel(level) }, world))) … … 155 155 * @injected_frames: A #WebKitUserContentInjectedFrames value 156 156 * @level: A #WebKitUserStyleLevel 157 * @ whitelist: (array zero-terminated=1) (allow-none): A whitelist of URI patterns or %NULL158 * @bl acklist: (array zero-terminated=1) (allow-none): A blacklist of URI patterns or %NULL157 * @allow_list: (array zero-terminated=1) (allow-none): An allow_list of URI patterns or %NULL 158 * @block_list: (array zero-terminated=1) (allow-none): A block_list of URI patterns or %NULL 159 159 * 160 160 * Creates a new user style sheet. Style sheets can be applied to some URIs 161 * only by passing non-null values for @ whitelist or @blacklist. Passing a162 * %NULL whitelist implies that all URIs are on the whitelist. The style163 * sheet is applied if an URI matches the whitelist and not the blacklist.161 * only by passing non-null values for @allow_list or @block_list. Passing a 162 * %NULL allow_list implies that all URIs are on the allow_list. The style 163 * sheet is applied if an URI matches the allow_list and not the block_list. 164 164 * URI patterns must be of the form `[protocol]://[host]/[path]`, where the 165 165 * *host* and *path* components can contain the wildcard character (`*`) to … … 170 170 * Since: 2.6 171 171 */ 172 WebKitUserStyleSheet* webkit_user_style_sheet_new(const gchar* source, WebKitUserContentInjectedFrames injectedFrames, WebKitUserStyleLevel level, const char* const* whitelist, const char* const* blacklist)172 WebKitUserStyleSheet* webkit_user_style_sheet_new(const gchar* source, WebKitUserContentInjectedFrames injectedFrames, WebKitUserStyleLevel level, const char* const* allowList, const char* const* blockList) 173 173 { 174 174 g_return_val_if_fail(source, nullptr); 175 175 WebKitUserStyleSheet* userStyleSheet = static_cast<WebKitUserStyleSheet*>(fastMalloc(sizeof(WebKitUserStyleSheet))); 176 new (userStyleSheet) WebKitUserStyleSheet(source, injectedFrames, level, whitelist, blacklist, API::ContentWorld::pageContentWorld());176 new (userStyleSheet) WebKitUserStyleSheet(source, injectedFrames, level, allowList, blockList, API::ContentWorld::pageContentWorld()); 177 177 return userStyleSheet; 178 178 } … … 184 184 * @level: A #WebKitUserStyleLevel 185 185 * @world_name: the name of a #WebKitScriptWorld 186 * @ whitelist: (array zero-terminated=1) (allow-none): A whitelist of URI patterns or %NULL187 * @bl acklist: (array zero-terminated=1) (allow-none): A blacklist of URI patterns or %NULL186 * @allow_list: (array zero-terminated=1) (allow-none): An allow_list of URI patterns or %NULL 187 * @block_list: (array zero-terminated=1) (allow-none): A block_list of URI patterns or %NULL 188 188 * 189 189 * Creates a new user style sheet for script world with name @world_name. … … 194 194 * Since: 2.22 195 195 */ 196 WebKitUserStyleSheet* webkit_user_style_sheet_new_for_world(const gchar* source, WebKitUserContentInjectedFrames injectedFrames, WebKitUserStyleLevel level, const char* worldName, const char* const* whitelist, const char* const* blacklist)196 WebKitUserStyleSheet* webkit_user_style_sheet_new_for_world(const gchar* source, WebKitUserContentInjectedFrames injectedFrames, WebKitUserStyleLevel level, const char* worldName, const char* const* allowList, const char* const* blockList) 197 197 { 198 198 g_return_val_if_fail(source, nullptr); … … 200 200 201 201 WebKitUserStyleSheet* userStyleSheet = static_cast<WebKitUserStyleSheet*>(fastMalloc(sizeof(WebKitUserStyleSheet))); 202 new (userStyleSheet) WebKitUserStyleSheet(source, injectedFrames, level, whitelist, blacklist, webkitContentWorld(worldName));202 new (userStyleSheet) WebKitUserStyleSheet(source, injectedFrames, level, allowList, blockList, webkitContentWorld(worldName)); 203 203 return userStyleSheet; 204 204 } … … 210 210 211 211 struct _WebKitUserScript { 212 _WebKitUserScript(const gchar* source, WebKitUserContentInjectedFrames injectedFrames, WebKitUserScriptInjectionTime injectionTime, const gchar* const* whitelist, const gchar* const* blacklist, API::ContentWorld& world)212 _WebKitUserScript(const gchar* source, WebKitUserContentInjectedFrames injectedFrames, WebKitUserScriptInjectionTime injectionTime, const gchar* const* allowList, const gchar* const* blockList, API::ContentWorld& world) 213 213 : userScript(adoptRef(new API::UserScript(UserScript { 214 214 String::fromUTF8(source), URL { }, 215 toStringVector( whitelist), toStringVector(blacklist),215 toStringVector(allowList), toStringVector(blockList), 216 216 toUserScriptInjectionTime(injectionTime), 217 217 toUserContentInjectedFrames(injectedFrames), WebCore::WaitForNotificationBeforeInjecting::No }, world))) … … 267 267 * @injected_frames: A #WebKitUserContentInjectedFrames value 268 268 * @injection_time: A #WebKitUserScriptInjectionTime value 269 * @ whitelist: (array zero-terminated=1) (allow-none): A whitelist of URI patterns or %NULL270 * @bl acklist: (array zero-terminated=1) (allow-none): A blacklist of URI patterns or %NULL269 * @allow_list: (array zero-terminated=1) (allow-none): An allow_list of URI patterns or %NULL 270 * @block_list: (array zero-terminated=1) (allow-none): A block_list of URI patterns or %NULL 271 271 * 272 272 * Creates a new user script. Scripts can be applied to some URIs 273 * only by passing non-null values for @ whitelist or @blacklist. Passing a274 * %NULL whitelist implies that all URIs are on the whitelist. The script275 * is applied if an URI matches the whitelist and not the blacklist.273 * only by passing non-null values for @allow_list or @block_list. Passing a 274 * %NULL allow_list implies that all URIs are on the allow_list. The script 275 * is applied if an URI matches the allow_list and not the block_list. 276 276 * URI patterns must be of the form `[protocol]://[host]/[path]`, where the 277 277 * *host* and *path* components can contain the wildcard character (`*`) to … … 282 282 * Since: 2.6 283 283 */ 284 WebKitUserScript* webkit_user_script_new(const gchar* source, WebKitUserContentInjectedFrames injectedFrames, WebKitUserScriptInjectionTime injectionTime, const gchar* const* whitelist, const gchar* const* blacklist)284 WebKitUserScript* webkit_user_script_new(const gchar* source, WebKitUserContentInjectedFrames injectedFrames, WebKitUserScriptInjectionTime injectionTime, const gchar* const* allowList, const gchar* const* blockList) 285 285 { 286 286 g_return_val_if_fail(source, nullptr); 287 287 WebKitUserScript* userScript = static_cast<WebKitUserScript*>(fastMalloc(sizeof(WebKitUserScript))); 288 new (userScript) WebKitUserScript(source, injectedFrames, injectionTime, whitelist, blacklist, API::ContentWorld::pageContentWorld());288 new (userScript) WebKitUserScript(source, injectedFrames, injectionTime, allowList, blockList, API::ContentWorld::pageContentWorld()); 289 289 return userScript; 290 290 } … … 296 296 * @injection_time: A #WebKitUserScriptInjectionTime value 297 297 * @world_name: the name of a #WebKitScriptWorld 298 * @ whitelist: (array zero-terminated=1) (allow-none): A whitelist of URI patterns or %NULL299 * @bl acklist: (array zero-terminated=1) (allow-none): A blacklist of URI patterns or %NULL298 * @allow_list: (array zero-terminated=1) (allow-none): An allow_list of URI patterns or %NULL 299 * @block_list: (array zero-terminated=1) (allow-none): A block_list of URI patterns or %NULL 300 300 * 301 301 * Creates a new user script for script world with name @world_name. … … 306 306 * Since: 2.22 307 307 */ 308 WebKitUserScript* webkit_user_script_new_for_world(const gchar* source, WebKitUserContentInjectedFrames injectedFrames, WebKitUserScriptInjectionTime injectionTime, const char* worldName, const gchar* const* whitelist, const gchar* const* blacklist)308 WebKitUserScript* webkit_user_script_new_for_world(const gchar* source, WebKitUserContentInjectedFrames injectedFrames, WebKitUserScriptInjectionTime injectionTime, const char* worldName, const gchar* const* allowList, const gchar* const* blockList) 309 309 { 310 310 g_return_val_if_fail(source, nullptr); … … 312 312 313 313 WebKitUserScript* userScript = static_cast<WebKitUserScript*>(fastMalloc(sizeof(WebKitUserScript))); 314 new (userScript) WebKitUserScript(source, injectedFrames, injectionTime, whitelist, blacklist, webkitContentWorld(worldName));314 new (userScript) WebKitUserScript(source, injectedFrames, injectionTime, allowList, blockList, webkitContentWorld(worldName)); 315 315 return userScript; 316 316 } -
trunk/Source/WebKit/UIProcess/API/glib/WebKitWebContext.cpp
r263369 r265081 1317 1317 } 1318 1318 1319 static bool pathIsBl acklisted(const char* path)1320 { 1321 static const Vector<CString, 4> bl acklistedPrefixes = {1319 static bool pathIsBlocked(const char* path) 1320 { 1321 static const Vector<CString, 4> blockedPrefixes = { 1322 1322 // These are recreated by bwrap and it doesn't make sense to try and rebind them. 1323 1323 "sys", "proc", "dev", … … 1329 1329 1330 1330 GUniquePtr<char*> splitPath(g_strsplit(path, G_DIR_SEPARATOR_S, 3)); 1331 return bl acklistedPrefixes.contains(splitPath.get()[1]);1331 return blockedPrefixes.contains(splitPath.get()[1]); 1332 1332 } 1333 1333 … … 1353 1353 g_return_if_fail(WEBKIT_IS_WEB_CONTEXT(context)); 1354 1354 1355 if (pathIsBl acklisted(path)) {1355 if (pathIsBlocked(path)) { 1356 1356 g_critical("Attempted to add disallowed path to sandbox: %s", path); 1357 1357 return; -
trunk/Source/WebKit/UIProcess/API/gtk/WebKitUserContent.h
r241790 r265081 82 82 WebKitUserContentInjectedFrames injected_frames, 83 83 WebKitUserStyleLevel level, 84 const gchar* const * whitelist,85 const gchar* const *bl acklist);84 const gchar* const *allow_list, 85 const gchar* const *block_list); 86 86 87 87 WEBKIT_API WebKitUserStyleSheet * … … 90 90 WebKitUserStyleLevel level, 91 91 const gchar *world_name, 92 const gchar* const * whitelist,93 const gchar* const *bl acklist);92 const gchar* const *allow_list, 93 const gchar* const *block_list); 94 94 95 95 /** … … 126 126 WebKitUserContentInjectedFrames injected_frames, 127 127 WebKitUserScriptInjectionTime injection_time, 128 const gchar* const * whitelist,129 const gchar* const *bl acklist);128 const gchar* const *allow_list, 129 const gchar* const *block_list); 130 130 131 131 WEBKIT_API WebKitUserScript * … … 134 134 WebKitUserScriptInjectionTime injection_time, 135 135 const gchar *world_name, 136 const gchar* const * whitelist,137 const gchar* const *bl acklist);136 const gchar* const *allow_list, 137 const gchar* const *block_list); 138 138 139 139 #define WEBKIT_TYPE_USER_CONTENT_FILTER (webkit_user_content_filter_get_type()) -
trunk/Source/WebKit/UIProcess/API/wpe/WebKitUserContent.h
r241790 r265081 82 82 WebKitUserContentInjectedFrames injected_frames, 83 83 WebKitUserStyleLevel level, 84 const gchar* const * whitelist,85 const gchar* const *bl acklist);84 const gchar* const *allow_list, 85 const gchar* const *block_list); 86 86 87 87 WEBKIT_API WebKitUserStyleSheet * … … 90 90 WebKitUserStyleLevel level, 91 91 const gchar *world_name, 92 const gchar* const * whitelist,93 const gchar* const *bl acklist);92 const gchar* const *allow_list, 93 const gchar* const *block_list); 94 94 95 95 /** … … 126 126 WebKitUserContentInjectedFrames injected_frames, 127 127 WebKitUserScriptInjectionTime injection_time, 128 const gchar* const * whitelist,129 const gchar* const *bl acklist);128 const gchar* const *allow_list, 129 const gchar* const *block_list); 130 130 131 131 WEBKIT_API WebKitUserScript * … … 134 134 WebKitUserScriptInjectionTime injection_time, 135 135 const gchar *world_name, 136 const gchar* const * whitelist,137 const gchar* const *bl acklist);136 const gchar* const *allow_list, 137 const gchar* const *block_list); 138 138 139 139 #define WEBKIT_TYPE_USER_CONTENT_FILTER (webkit_user_content_filter_get_type()) -
trunk/Source/WebKit/UIProcess/Cocoa/WebProcessPoolCocoa.mm
r265056 r265081 334 334 #endif 335 335 336 parameters.font Whitelist = m_fontWhitelist;336 parameters.fontAllowList = m_fontAllowList; 337 337 338 338 if (m_bundleParameters) { -
trunk/Source/WebKit/UIProcess/Launcher/glib/BubblewrapLauncher.cpp
r263966 r265081 582 582 // container tools. 583 583 // 584 // This syscall bl acklist is copied from linux-user-chroot, which was in turn585 // clearly influenced by the Sandstorm.io bl acklist.584 // This syscall block list is copied from linux-user-chroot, which was in turn 585 // clearly influenced by the Sandstorm.io block list. 586 586 // 587 587 // If you make any changes here, I suggest sending the changes along … … 591 591 // 592 592 // A non-exhaustive list of links to container tooling that might 593 // want to share this bl acklist:593 // want to share this block list: 594 594 // 595 595 // https://github.com/sandstorm-io/sandstorm … … 604 604 int scall; 605 605 struct scmp_arg_cmp* arg; 606 } syscallBl acklist[] = {606 } syscallBlockList[] = { 607 607 // Block dmesg 608 608 { SCMP_SYS(syslog), nullptr }, … … 650 650 g_error("Failed to init seccomp"); 651 651 652 for (auto& rule : syscallBl acklist) {652 for (auto& rule : syscallBlockList) { 653 653 int scall = rule.scall; 654 654 int r; -
trunk/Source/WebKit/UIProcess/WebProcessPool.cpp
r265063 r265081 2105 2105 void WebProcessPool::setFontAllowList(API::Array* array) 2106 2106 { 2107 m_font Whitelist.clear();2107 m_fontAllowList.clear(); 2108 2108 if (array) { 2109 2109 for (size_t i = 0; i < array->size(); ++i) { 2110 2110 if (API::String* font = array->at<API::String>(i)) 2111 m_font Whitelist.append(font->string());2111 m_fontAllowList.append(font->string()); 2112 2112 } 2113 2113 } -
trunk/Source/WebKit/UIProcess/WebProcessPool.h
r264874 r265081 686 686 bool m_shouldUseFontSmoothing { true }; 687 687 688 Vector<String> m_font Whitelist;688 Vector<String> m_fontAllowList; 689 689 690 690 // Messages that were posted before any pages were created. -
trunk/Source/WebKit/WebProcess/InjectedBundle/API/c/WKBundle.cpp
r259159 r265081 175 175 } 176 176 177 void WKBundleAddOriginAccess WhitelistEntry(WKBundleRef bundleRef, WKStringRef sourceOrigin, WKStringRef destinationProtocol, WKStringRef destinationHost, bool allowDestinationSubdomains)178 { 179 WebKit::toImpl(bundleRef)->addOriginAccess WhitelistEntry(WebKit::toWTFString(sourceOrigin), WebKit::toWTFString(destinationProtocol), WebKit::toWTFString(destinationHost), allowDestinationSubdomains);180 } 181 182 void WKBundleRemoveOriginAccess WhitelistEntry(WKBundleRef bundleRef, WKStringRef sourceOrigin, WKStringRef destinationProtocol, WKStringRef destinationHost, bool allowDestinationSubdomains)183 { 184 WebKit::toImpl(bundleRef)->removeOriginAccess WhitelistEntry(WebKit::toWTFString(sourceOrigin), WebKit::toWTFString(destinationProtocol), WebKit::toWTFString(destinationHost), allowDestinationSubdomains);185 } 186 187 void WKBundleResetOriginAccess Whitelists(WKBundleRef bundleRef)188 { 189 WebKit::toImpl(bundleRef)->resetOriginAccess Whitelists();177 void WKBundleAddOriginAccessAllowListEntry(WKBundleRef bundleRef, WKStringRef sourceOrigin, WKStringRef destinationProtocol, WKStringRef destinationHost, bool allowDestinationSubdomains) 178 { 179 WebKit::toImpl(bundleRef)->addOriginAccessAllowListEntry(WebKit::toWTFString(sourceOrigin), WebKit::toWTFString(destinationProtocol), WebKit::toWTFString(destinationHost), allowDestinationSubdomains); 180 } 181 182 void WKBundleRemoveOriginAccessAllowListEntry(WKBundleRef bundleRef, WKStringRef sourceOrigin, WKStringRef destinationProtocol, WKStringRef destinationHost, bool allowDestinationSubdomains) 183 { 184 WebKit::toImpl(bundleRef)->removeOriginAccessAllowListEntry(WebKit::toWTFString(sourceOrigin), WebKit::toWTFString(destinationProtocol), WebKit::toWTFString(destinationHost), allowDestinationSubdomains); 185 } 186 187 void WKBundleResetOriginAccessAllowLists(WKBundleRef bundleRef) 188 { 189 WebKit::toImpl(bundleRef)->resetOriginAccessAllowLists(); 190 190 } 191 191 -
trunk/Source/WebKit/WebProcess/InjectedBundle/API/c/WKBundlePrivate.h
r263192 r265081 54 54 WK_EXPORT void WKBundleSetAuthorAndUserStylesEnabled(WKBundleRef bundle, WKBundlePageGroupRef pageGroup, bool enabled); 55 55 WK_EXPORT void WKBundleSetSpatialNavigationEnabled(WKBundleRef bundle, WKBundlePageGroupRef pageGroup, bool enabled); 56 WK_EXPORT void WKBundleAddOriginAccess WhitelistEntry(WKBundleRef bundle, WKStringRef, WKStringRef, WKStringRef, bool);57 WK_EXPORT void WKBundleRemoveOriginAccess WhitelistEntry(WKBundleRef bundle, WKStringRef, WKStringRef, WKStringRef, bool);58 WK_EXPORT void WKBundleResetOriginAccess Whitelists(WKBundleRef bundle);56 WK_EXPORT void WKBundleAddOriginAccessAllowListEntry(WKBundleRef bundle, WKStringRef, WKStringRef, WKStringRef, bool); 57 WK_EXPORT void WKBundleRemoveOriginAccessAllowListEntry(WKBundleRef bundle, WKStringRef, WKStringRef, WKStringRef, bool); 58 WK_EXPORT void WKBundleResetOriginAccessAllowLists(WKBundleRef bundle); 59 59 WK_EXPORT int WKBundleNumberOfPages(WKBundleRef bundle, WKBundleFrameRef frameRef, double pageWidthInPixels, double pageHeightInPixels); 60 60 WK_EXPORT int WKBundlePageNumberForElementById(WKBundleRef bundle, WKBundleFrameRef frameRef, WKStringRef idRef, double pageWidthInPixels, double pageHeightInPixels); -
trunk/Source/WebKit/WebProcess/InjectedBundle/InjectedBundle.cpp
r263700 r265081 397 397 } 398 398 399 void InjectedBundle::addOriginAccess WhitelistEntry(const String& sourceOrigin, const String& destinationProtocol, const String& destinationHost, bool allowDestinationSubdomains)399 void InjectedBundle::addOriginAccessAllowListEntry(const String& sourceOrigin, const String& destinationProtocol, const String& destinationHost, bool allowDestinationSubdomains) 400 400 { 401 401 SecurityPolicy::addOriginAccessAllowlistEntry(SecurityOrigin::createFromString(sourceOrigin).get(), destinationProtocol, destinationHost, allowDestinationSubdomains); 402 WebProcess::singleton().ensureNetworkProcessConnection().connection().send(Messages::NetworkConnectionToWebProcess::AddOriginAccess WhitelistEntry { sourceOrigin, destinationProtocol, destinationHost, allowDestinationSubdomains }, 0);403 404 } 405 406 void InjectedBundle::removeOriginAccess WhitelistEntry(const String& sourceOrigin, const String& destinationProtocol, const String& destinationHost, bool allowDestinationSubdomains)402 WebProcess::singleton().ensureNetworkProcessConnection().connection().send(Messages::NetworkConnectionToWebProcess::AddOriginAccessAllowListEntry { sourceOrigin, destinationProtocol, destinationHost, allowDestinationSubdomains }, 0); 403 404 } 405 406 void InjectedBundle::removeOriginAccessAllowListEntry(const String& sourceOrigin, const String& destinationProtocol, const String& destinationHost, bool allowDestinationSubdomains) 407 407 { 408 408 SecurityPolicy::removeOriginAccessAllowlistEntry(SecurityOrigin::createFromString(sourceOrigin).get(), destinationProtocol, destinationHost, allowDestinationSubdomains); 409 WebProcess::singleton().ensureNetworkProcessConnection().connection().send(Messages::NetworkConnectionToWebProcess::RemoveOriginAccess WhitelistEntry { sourceOrigin, destinationProtocol, destinationHost, allowDestinationSubdomains }, 0);410 } 411 412 void InjectedBundle::resetOriginAccess Whitelists()409 WebProcess::singleton().ensureNetworkProcessConnection().connection().send(Messages::NetworkConnectionToWebProcess::RemoveOriginAccessAllowListEntry { sourceOrigin, destinationProtocol, destinationHost, allowDestinationSubdomains }, 0); 410 } 411 412 void InjectedBundle::resetOriginAccessAllowLists() 413 413 { 414 414 SecurityPolicy::resetOriginAccessAllowlists(); 415 WebProcess::singleton().ensureNetworkProcessConnection().connection().send(Messages::NetworkConnectionToWebProcess::ResetOriginAccess Whitelists { }, 0);415 WebProcess::singleton().ensureNetworkProcessConnection().connection().send(Messages::NetworkConnectionToWebProcess::ResetOriginAccessAllowLists { }, 0); 416 416 } 417 417 -
trunk/Source/WebKit/WebProcess/InjectedBundle/InjectedBundle.h
r263275 r265081 108 108 void setAuthorAndUserStylesEnabled(WebPageGroupProxy*, bool); 109 109 void setSpatialNavigationEnabled(WebPageGroupProxy*, bool); 110 void addOriginAccess WhitelistEntry(const String&, const String&, const String&, bool);111 void removeOriginAccess WhitelistEntry(const String&, const String&, const String&, bool);112 void resetOriginAccess Whitelists();110 void addOriginAccessAllowListEntry(const String&, const String&, const String&, bool); 111 void removeOriginAccessAllowListEntry(const String&, const String&, const String&, bool); 112 void resetOriginAccessAllowLists(); 113 113 void setAsynchronousSpellCheckingEnabled(WebPageGroupProxy*, bool); 114 114 int numberOfPages(WebFrame*, double, double); -
trunk/Source/WebKit/WebProcess/cocoa/WebProcessCocoa.mm
r265072 r265081 246 246 247 247 #if PLATFORM(MAC) 248 WebCore::FontCache::setFontAllowlist(parameters.font Whitelist);248 WebCore::FontCache::setFontAllowlist(parameters.fontAllowList); 249 249 #endif 250 250 -
trunk/Tools/ChangeLog
r265080 r265081 1 2020-07-30 Alex Christensen <achristensen@webkit.org> 2 3 Remove non-inclusive terminology from WebKit variable names and test-only SPI 4 https://bugs.webkit.org/show_bug.cgi?id=214941 5 6 Reviewed by Michael Catanzaro. 7 8 * WebKitTestRunner/InjectedBundle/InjectedBundle.cpp: 9 (WTR::InjectedBundle::beginTesting): 10 * WebKitTestRunner/InjectedBundle/TestRunner.cpp: 11 (WTR::TestRunner::addOriginAccessWhitelistEntry): 12 (WTR::TestRunner::removeOriginAccessWhitelistEntry): 13 1 14 2020-07-15 Carlos Garcia Campos <cgarcia@igalia.com> 2 15 -
trunk/Tools/WebKitTestRunner/InjectedBundle/InjectedBundle.cpp
r264867 r265081 629 629 WKBundleClearAllDatabases(m_bundle); 630 630 WKBundlePageClearApplicationCache(page()->page()); 631 WKBundleResetOriginAccess Whitelists(m_bundle);631 WKBundleResetOriginAccessAllowLists(m_bundle); 632 632 WKBundleClearResourceLoadStatistics(m_bundle); 633 633 -
trunk/Tools/WebKitTestRunner/InjectedBundle/TestRunner.cpp
r264609 r265081 574 574 void TestRunner::addOriginAccessWhitelistEntry(JSStringRef sourceOrigin, JSStringRef destinationProtocol, JSStringRef destinationHost, bool allowDestinationSubdomains) 575 575 { 576 WKBundleAddOriginAccess WhitelistEntry(InjectedBundle::singleton().bundle(), toWK(sourceOrigin).get(), toWK(destinationProtocol).get(), toWK(destinationHost).get(), allowDestinationSubdomains);576 WKBundleAddOriginAccessAllowListEntry(InjectedBundle::singleton().bundle(), toWK(sourceOrigin).get(), toWK(destinationProtocol).get(), toWK(destinationHost).get(), allowDestinationSubdomains); 577 577 } 578 578 579 579 void TestRunner::removeOriginAccessWhitelistEntry(JSStringRef sourceOrigin, JSStringRef destinationProtocol, JSStringRef destinationHost, bool allowDestinationSubdomains) 580 580 { 581 WKBundleRemoveOriginAccess WhitelistEntry(InjectedBundle::singleton().bundle(), toWK(sourceOrigin).get(), toWK(destinationProtocol).get(), toWK(destinationHost).get(), allowDestinationSubdomains);581 WKBundleRemoveOriginAccessAllowListEntry(InjectedBundle::singleton().bundle(), toWK(sourceOrigin).get(), toWK(destinationProtocol).get(), toWK(destinationHost).get(), allowDestinationSubdomains); 582 582 } 583 583
Note: See TracChangeset
for help on using the changeset viewer.