Changeset 57535 in webkit
- Timestamp:
- Apr 13, 2010 3:15:24 PM (14 years ago)
- Location:
- trunk
- Files:
-
- 39 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/LayoutTests/ChangeLog
r57534 r57535 1 2010-04-13 Timothy Hatcher <timothy@apple.com> 2 3 Rename LayoutTestController.whiteListAccessFromOrigin to addOriginAccessWhitelistEntry. 4 5 SecurityOrigin needs a way to remove individual OriginAccessEntries 6 https://bugs.webkit.org/show_bug.cgi?id=37449 7 8 Reviewed by Dave Hyatt. 9 10 * http/tests/security/local-image-from-remote-whitelisted-expected.txt: 11 * http/tests/security/local-image-from-remote-whitelisted.html: 12 * http/tests/xmlhttprequest/origin-whitelisting-all.html: 13 * http/tests/xmlhttprequest/origin-whitelisting-exact-match.html: 14 * http/tests/xmlhttprequest/origin-whitelisting-https.html: 15 * http/tests/xmlhttprequest/origin-whitelisting-ip-addresses-with-subdomains.html: 16 * http/tests/xmlhttprequest/origin-whitelisting-ip-addresses.html: 17 * http/tests/xmlhttprequest/origin-whitelisting-subdomains.html: 18 1 19 2010-04-13 John Gregg <johnnyg@google.com> 2 20 -
trunk/LayoutTests/http/tests/security/local-image-from-remote-whitelisted-expected.txt
r57238 r57535 1 1 2 This test is to see if a remote file can include a local image when the access has been white listed using whiteListAccessFromOrigin.2 This test is to see if a remote file can include a local image when the access has been white listed using addOriginAccessWhitelistEntry. 3 3 4 4 Test Passed. Local image loaded remotely. -
trunk/LayoutTests/http/tests/security/local-image-from-remote-whitelisted.html
r57238 r57535 6 6 7 7 layoutTestController.dumpAsText(); 8 layoutTestController. whiteListAccessFromOrigin('http://127.0.0.1:8000', 'file', '', true);8 layoutTestController.addOriginAccessWhitelistEntry('http://127.0.0.1:8000', 'file', '', true); 9 9 10 10 var localImageLocation = layoutTestController.pathToLocalResource('file:///tmp/LayoutTests/http/tests/security/resources/compass.jpg'); … … 25 25 26 26 <p>This test is to see if a remote file can include a local image when the 27 access has been white listed using whiteListAccessFromOrigin.27 access has been white listed using addOriginAccessWhitelistEntry. 28 28 29 29 <p id=result>Test has not run. -
trunk/LayoutTests/http/tests/xmlhttprequest/origin-whitelisting-all.html
r47548 r57535 5 5 layoutTestController.dumpAsText(); 6 6 layoutTestController.waitUntilDone(); 7 layoutTestController. whiteListAccessFromOrigin("http://127.0.0.1:8000", "http", "", true);8 layoutTestController. whiteListAccessFromOrigin("http://localhost:8000", "http", "", true);7 layoutTestController.addOriginAccessWhitelistEntry("http://127.0.0.1:8000", "http", "", true); 8 layoutTestController.addOriginAccessWhitelistEntry("http://localhost:8000", "http", "", true); 9 9 10 10 function log(message) -
trunk/LayoutTests/http/tests/xmlhttprequest/origin-whitelisting-exact-match.html
r47548 r57535 5 5 layoutTestController.dumpAsText(); 6 6 layoutTestController.waitUntilDone(); 7 layoutTestController. whiteListAccessFromOrigin("http://127.0.0.1:8000", "http", "localhost", false);7 layoutTestController.addOriginAccessWhitelistEntry("http://127.0.0.1:8000", "http", "localhost", false); 8 8 9 9 function log(message) -
trunk/LayoutTests/http/tests/xmlhttprequest/origin-whitelisting-https.html
r47548 r57535 5 5 layoutTestController.dumpAsText(); 6 6 layoutTestController.waitUntilDone(); 7 layoutTestController. whiteListAccessFromOrigin("http://127.0.0.1:8000", "https", "localhost", false);7 layoutTestController.addOriginAccessWhitelistEntry("http://127.0.0.1:8000", "https", "localhost", false); 8 8 9 9 function log(message) -
trunk/LayoutTests/http/tests/xmlhttprequest/origin-whitelisting-ip-addresses-with-subdomains.html
r47548 r57535 4 4 layoutTestController.dumpAsText(); 5 5 layoutTestController.waitUntilDone(); 6 layoutTestController. whiteListAccessFromOrigin("http://localhost:8000", "http", "*.0.0.1", true);6 layoutTestController.addOriginAccessWhitelistEntry("http://localhost:8000", "http", "*.0.0.1", true); 7 7 8 8 function log(message) -
trunk/LayoutTests/http/tests/xmlhttprequest/origin-whitelisting-ip-addresses.html
r47548 r57535 4 4 layoutTestController.dumpAsText(); 5 5 layoutTestController.waitUntilDone(); 6 layoutTestController. whiteListAccessFromOrigin("http://localhost:8000", "http", "127.0.0.1", false);6 layoutTestController.addOriginAccessWhitelistEntry("http://localhost:8000", "http", "127.0.0.1", false); 7 7 8 8 function log(message) -
trunk/LayoutTests/http/tests/xmlhttprequest/origin-whitelisting-subdomains.html
r47548 r57535 5 5 layoutTestController.dumpAsText(); 6 6 layoutTestController.waitUntilDone(); 7 layoutTestController. whiteListAccessFromOrigin("http://127.0.0.1:8000", "http", "localhost", true);7 layoutTestController.addOriginAccessWhitelistEntry("http://127.0.0.1:8000", "http", "localhost", true); 8 8 9 9 function log(message) -
trunk/WebCore/ChangeLog
r57533 r57535 1 2010-04-13 Timothy Hatcher <timothy@apple.com> 2 3 Rename SecurityOrigin::whiteListAccessFromOrigin to addOriginAccessWhitelistEntry. 4 And SecurityOrigin::resetOriginAccessWhiteLists to resetOriginAccessWhitelists. 5 6 SecurityOrigin needs a way to remove individual OriginAccessEntries 7 https://bugs.webkit.org/show_bug.cgi?id=37449 8 9 Reviewed by Dave Hyatt. 10 11 * WebCore.base.exp: 12 * page/SecurityOrigin.cpp: 13 (WebCore::SecurityOrigin::addOriginAccessWhitelistEntry): 14 (WebCore::SecurityOrigin::resetOriginAccessWhitelists): 15 * page/SecurityOrigin.h: 16 1 17 2010-04-13 Geoffrey Garen <ggaren@apple.com> 2 18 -
trunk/WebCore/WebCore.base.exp
r57469 r57535 313 313 __ZN7WebCore14SecurityOrigin24registerURLSchemeAsLocalERKNS_6StringE 314 314 __ZN7WebCore14SecurityOrigin25registerURLSchemeAsSecureERKNS_6StringE 315 __ZN7WebCore14SecurityOrigin2 5whiteListAccessFromOriginERKS0_RKNS_6StringES5_b316 __ZN7WebCore14SecurityOrigin27resetOriginAccessWhite ListsEv315 __ZN7WebCore14SecurityOrigin29addOriginAccessWhitelistEntryERKS0_RKNS_6StringES5_b 316 __ZN7WebCore14SecurityOrigin27resetOriginAccessWhitelistsEv 317 317 __ZN7WebCore14SecurityOrigin40setDomainRelaxationForbiddenForURLSchemeEbRKNS_6StringE 318 318 __ZN7WebCore14SecurityOrigin6createERKNS_4KURLEi -
trunk/WebCore/page/SecurityOrigin.cpp
r57238 r57535 650 650 } 651 651 652 void SecurityOrigin:: whiteListAccessFromOrigin(const SecurityOrigin& sourceOrigin, const String& destinationProtocol, const String& destinationDomains, bool allowDestinationSubdomains)652 void SecurityOrigin::addOriginAccessWhitelistEntry(const SecurityOrigin& sourceOrigin, const String& destinationProtocol, const String& destinationDomains, bool allowDestinationSubdomains) 653 653 { 654 654 ASSERT(isMainThread()); … … 666 666 } 667 667 668 void SecurityOrigin::resetOriginAccessWhite Lists()668 void SecurityOrigin::resetOriginAccessWhitelists() 669 669 { 670 670 ASSERT(isMainThread()); -
trunk/WebCore/page/SecurityOrigin.h
r57238 r57535 195 195 static bool shouldTreatURLSchemeAsNoAccess(const String&); 196 196 197 static void whiteListAccessFromOrigin(const SecurityOrigin& sourceOrigin, const String& destinationProtocol, const String& destinationDomains, bool allowDestinationSubdomains);198 static void resetOriginAccessWhite Lists();197 static void addOriginAccessWhitelistEntry(const SecurityOrigin& sourceOrigin, const String& destinationProtocol, const String& destinationDomains, bool allowDestinationSubdomains); 198 static void resetOriginAccessWhitelists(); 199 199 200 200 private: -
trunk/WebKit/chromium/ChangeLog
r57529 r57535 1 2010-04-13 Timothy Hatcher <timothy@apple.com> 2 3 Rename SecurityOrigin::whiteListAccessFromOrigin to addOriginAccessWhitelistEntry. 4 And SecurityOrigin::resetOriginAccessWhiteLists to resetOriginAccessWhitelists. 5 6 SecurityOrigin needs a way to remove individual OriginAccessEntries 7 https://bugs.webkit.org/show_bug.cgi?id=37449 8 9 Reviewed by Dave Hyatt. 10 11 * src/WebSecurityPolicy.cpp: 12 (WebKit::WebSecurityPolicy::whiteListAccessFromOrigin): 13 (WebKit::WebSecurityPolicy::resetOriginAccessWhiteLists): 14 1 15 2010-04-13 Mikhail Naganov <mnaganov@chromium.org> 2 16 -
trunk/WebKit/chromium/src/WebSecurityPolicy.cpp
r55335 r57535 62 62 bool allowDestinationSubdomains) 63 63 { 64 SecurityOrigin:: whiteListAccessFromOrigin(64 SecurityOrigin::addOriginAccessWhitelistEntry( 65 65 *SecurityOrigin::create(sourceOrigin), destinationProtocol, 66 66 destinationHost, allowDestinationSubdomains); … … 69 69 void WebSecurityPolicy::resetOriginAccessWhiteLists() 70 70 { 71 SecurityOrigin::resetOriginAccessWhite Lists();71 SecurityOrigin::resetOriginAccessWhitelists(); 72 72 } 73 73 -
trunk/WebKit/gtk/ChangeLog
r57469 r57535 1 2010-04-13 Timothy Hatcher <timothy@apple.com> 2 3 Rename SecurityOrigin::whiteListAccessFromOrigin to addOriginAccessWhitelistEntry. 4 And SecurityOrigin::resetOriginAccessWhiteLists to resetOriginAccessWhitelists. 5 6 SecurityOrigin needs a way to remove individual OriginAccessEntries 7 https://bugs.webkit.org/show_bug.cgi?id=37449 8 9 Reviewed by Dave Hyatt. 10 11 * webkit/webkitprivate.cpp: 12 (webkit_white_list_access_from_origin): 13 (webkit_reset_origin_access_white_lists): 14 1 15 2010-04-11 Sheriff Bot <webkit.review.bot@gmail.com> 2 16 -
trunk/WebKit/gtk/webkit/webkitprivate.cpp
r56387 r57535 294 294 void webkit_white_list_access_from_origin(const gchar* sourceOrigin, const gchar* destinationProtocol, const gchar* destinationHost, bool allowDestinationSubdomains) 295 295 { 296 SecurityOrigin:: whiteListAccessFromOrigin(*SecurityOrigin::createFromString(sourceOrigin), destinationProtocol, destinationHost, allowDestinationSubdomains);296 SecurityOrigin::addOriginAccessWhitelistEntry(*SecurityOrigin::createFromString(sourceOrigin), destinationProtocol, destinationHost, allowDestinationSubdomains); 297 297 } 298 298 299 299 void webkit_reset_origin_access_white_lists() 300 300 { 301 SecurityOrigin::resetOriginAccessWhite Lists();302 } 301 SecurityOrigin::resetOriginAccessWhitelists(); 302 } -
trunk/WebKit/mac/ChangeLog
r57469 r57535 1 2010-04-13 Timothy Hatcher <timothy@apple.com> 2 3 Rename SecurityOrigin::whiteListAccessFromOrigin to addOriginAccessWhitelistEntry. 4 And SecurityOrigin::resetOriginAccessWhiteLists to resetOriginAccessWhitelists. 5 6 SecurityOrigin needs a way to remove individual OriginAccessEntries 7 https://bugs.webkit.org/show_bug.cgi?id=37449 8 9 Reviewed by Dave Hyatt. 10 11 * WebView/WebView.mm: 12 (+[WebView _addOriginAccessWhitelistEntryWithSourceOrigin:destinationProtocol:destinationHost:allowDestinationSubdomains:]): 13 (+[WebView _resetOriginAccessWhitelists]): 14 * WebView/WebViewPrivate.h: 15 1 16 2010-04-11 Sheriff Bot <webkit.review.bot@gmail.com> 2 17 -
trunk/WebKit/mac/WebView/WebView.mm
r57292 r57535 2248 2248 } 2249 2249 2250 + (void)_ whiteListAccessFromOrigin:(NSString *)sourceOrigin destinationProtocol:(NSString *)destinationProtocol destinationHost:(NSString *)destinationHost allowDestinationSubdomains:(BOOL)allowDestinationSubdomains2251 { 2252 SecurityOrigin:: whiteListAccessFromOrigin(*SecurityOrigin::createFromString(sourceOrigin), destinationProtocol, destinationHost, allowDestinationSubdomains);2253 } 2254 2255 +(void)_resetOriginAccessWhite Lists2256 { 2257 SecurityOrigin::resetOriginAccessWhite Lists();2250 + (void)_addOriginAccessWhitelistEntryWithSourceOrigin:(NSString *)sourceOrigin destinationProtocol:(NSString *)destinationProtocol destinationHost:(NSString *)destinationHost allowDestinationSubdomains:(BOOL)allowDestinationSubdomains 2251 { 2252 SecurityOrigin::addOriginAccessWhitelistEntry(*SecurityOrigin::createFromString(sourceOrigin), destinationProtocol, destinationHost, allowDestinationSubdomains); 2253 } 2254 2255 +(void)_resetOriginAccessWhitelists 2256 { 2257 SecurityOrigin::resetOriginAccessWhitelists(); 2258 2258 } 2259 2259 -
trunk/WebKit/mac/WebView/WebViewPrivate.h
r57292 r57535 490 490 // - destinationHost: The host to grant access to. 491 491 // - allowDestinationSubdomains: If host is a domain, setting this to YES will whitelist host and all its subdomains, recursively. 492 + (void)_ whiteListAccessFromOrigin:(NSString *)sourceOrigin destinationProtocol:(NSString *)destinationProtocol destinationHost:(NSString *)destinationHost allowDestinationSubdomains:(BOOL)allowDestinationSubdomains;493 494 // Removes all white list entries created with _ whiteListAccessFromOrigin.495 + (void)_resetOriginAccessWhite Lists;492 + (void)_addOriginAccessWhitelistEntryWithSourceOrigin:(NSString *)sourceOrigin destinationProtocol:(NSString *)destinationProtocol destinationHost:(NSString *)destinationHost allowDestinationSubdomains:(BOOL)allowDestinationSubdomains; 493 494 // Removes all white list entries created with _addOriginAccessWhitelistEntryWithSourceOrigin. 495 + (void)_resetOriginAccessWhitelists; 496 496 497 497 + (void)_addUserScriptToGroup:(NSString *)groupName world:(WebScriptWorld *)world source:(NSString *)source url:(NSURL *)url whitelist:(NSArray *)whitelist blacklist:(NSArray *)blacklist injectionTime:(WebUserScriptInjectionTime)injectionTime; -
trunk/WebKit/qt/ChangeLog
r57469 r57535 1 2010-04-13 Timothy Hatcher <timothy@apple.com> 2 3 Rename SecurityOrigin::whiteListAccessFromOrigin to addOriginAccessWhitelistEntry. 4 And SecurityOrigin::resetOriginAccessWhiteLists to resetOriginAccessWhitelists. 5 6 SecurityOrigin needs a way to remove individual OriginAccessEntries 7 https://bugs.webkit.org/show_bug.cgi?id=37449 8 9 Reviewed by Dave Hyatt. 10 11 * WebCoreSupport/DumpRenderTreeSupportQt.cpp: 12 (DumpRenderTreeSupportQt::whiteListAccessFromOrigin): 13 (DumpRenderTreeSupportQt::resetOriginAccessWhiteLists): 14 1 15 2010-04-11 Sheriff Bot <webkit.review.bot@gmail.com> 2 16 -
trunk/WebKit/qt/WebCoreSupport/DumpRenderTreeSupportQt.cpp
r57433 r57535 317 317 void DumpRenderTreeSupportQt::whiteListAccessFromOrigin(const QString& sourceOrigin, const QString& destinationProtocol, const QString& destinationHost, bool allowDestinationSubdomains) 318 318 { 319 SecurityOrigin:: whiteListAccessFromOrigin(*SecurityOrigin::createFromString(sourceOrigin), destinationProtocol, destinationHost, allowDestinationSubdomains);319 SecurityOrigin::addOriginAccessWhitelistEntry(*SecurityOrigin::createFromString(sourceOrigin), destinationProtocol, destinationHost, allowDestinationSubdomains); 320 320 } 321 321 322 322 void DumpRenderTreeSupportQt::resetOriginAccessWhiteLists() 323 323 { 324 SecurityOrigin::resetOriginAccessWhite Lists();324 SecurityOrigin::resetOriginAccessWhitelists(); 325 325 } 326 326 -
trunk/WebKit/win/ChangeLog
r57469 r57535 1 2010-04-13 Timothy Hatcher <timothy@apple.com> 2 3 Rename SecurityOrigin::whiteListAccessFromOrigin to addOriginAccessWhitelistEntry. 4 And SecurityOrigin::resetOriginAccessWhiteLists to resetOriginAccessWhitelists. 5 6 SecurityOrigin needs a way to remove individual OriginAccessEntries 7 https://bugs.webkit.org/show_bug.cgi?id=37449 8 9 Reviewed by Dave Hyatt. 10 11 * Interfaces/IWebViewPrivate.idl: 12 * WebView.cpp: 13 (WebView::addOriginAccessWhitelistEntry): 14 (WebView::resetOriginAccessWhitelists): 15 * WebView.h: 16 1 17 2010-04-11 Sheriff Bot <webkit.review.bot@gmail.com> 2 18 -
trunk/WebKit/win/Interfaces/IWebViewPrivate.idl
r55408 r57535 208 208 // - destinationHost: The host to grant access to. 209 209 // - allowDestinationSubdomains: If host is a domain, setting this to YES will whitelist host and all its subdomains, recursively. 210 HRESULT whiteListAccessFromOrigin([in] BSTR sourceOrigin, [in] BSTR destinationProtocol, [in] BSTR destinationHost, [in] BOOL allowDestinationSubdomains);211 212 // Removes all white list entries created with whiteListAccessFromOrigin.213 HRESULT resetOriginAccessWhite Lists();210 HRESULT addOriginAccessWhitelistEntry([in] BSTR sourceOrigin, [in] BSTR destinationProtocol, [in] BSTR destinationHost, [in] BOOL allowDestinationSubdomains); 211 212 // Removes all white list entries created with addOriginAccessWhitelistEntry. 213 HRESULT resetOriginAccessWhitelists(); 214 214 215 215 HRESULT setHistoryDelegate([in] IWebHistoryDelegate* historyDelegate); -
trunk/WebKit/win/WebView.cpp
r57302 r57535 6035 6035 } 6036 6036 6037 HRESULT WebView:: whiteListAccessFromOrigin(BSTR sourceOrigin, BSTR destinationProtocol, BSTR destinationHost, BOOL allowDestinationSubdomains)6038 { 6039 SecurityOrigin:: whiteListAccessFromOrigin(*SecurityOrigin::createFromString(String(sourceOrigin, SysStringLen(sourceOrigin))), String(destinationProtocol, SysStringLen(destinationProtocol)), String(destinationHost, SysStringLen(destinationHost)), allowDestinationSubdomains);6040 return S_OK; 6041 } 6042 6043 HRESULT WebView::resetOriginAccessWhite Lists()6044 { 6045 SecurityOrigin::resetOriginAccessWhite Lists();6037 HRESULT WebView::addOriginAccessWhitelistEntry(BSTR sourceOrigin, BSTR destinationProtocol, BSTR destinationHost, BOOL allowDestinationSubdomains) 6038 { 6039 SecurityOrigin::addOriginAccessWhitelistEntry(*SecurityOrigin::createFromString(String(sourceOrigin, SysStringLen(sourceOrigin))), String(destinationProtocol, SysStringLen(destinationProtocol)), String(destinationHost, SysStringLen(destinationHost)), allowDestinationSubdomains); 6040 return S_OK; 6041 } 6042 6043 HRESULT WebView::resetOriginAccessWhitelists() 6044 { 6045 SecurityOrigin::resetOriginAccessWhitelists(); 6046 6046 return S_OK; 6047 6047 } -
trunk/WebKit/win/WebView.h
r55592 r57535 762 762 virtual HRESULT STDMETHODCALLTYPE invalidateBackingStore(const RECT*); 763 763 764 virtual HRESULT STDMETHODCALLTYPE whiteListAccessFromOrigin(BSTR sourceOrigin, BSTR destinationProtocol, BSTR destinationHost, BOOL allowDestinationSubdomains); 765 virtual HRESULT STDMETHODCALLTYPE resetOriginAccessWhiteLists(); 766 764 virtual HRESULT STDMETHODCALLTYPE addOriginAccessWhitelistEntry(BSTR sourceOrigin, BSTR destinationProtocol, BSTR destinationHost, BOOL allowDestinationSubdomains); 765 virtual HRESULT STDMETHODCALLTYPE resetOriginAccessWhitelists(); 767 766 768 767 virtual HRESULT STDMETHODCALLTYPE setHistoryDelegate(IWebHistoryDelegate* historyDelegate); -
trunk/WebKitTools/ChangeLog
r57532 r57535 1 2010-04-13 Timothy Hatcher <timothy@apple.com> 2 3 Rename SecurityOrigin::whiteListAccessFromOrigin to addOriginAccessWhitelistEntry. 4 And LayoutTestController.whiteListAccessFromOrigin to addOriginAccessWhitelistEntry. 5 And SecurityOrigin::resetOriginAccessWhiteLists to resetOriginAccessWhitelists. 6 7 SecurityOrigin needs a way to remove individual OriginAccessEntries 8 https://bugs.webkit.org/show_bug.cgi?id=37449 9 10 Reviewed by Dave Hyatt. 11 12 * DumpRenderTree/LayoutTestController.cpp: 13 (addOriginAccessWhitelistEntryCallback): 14 (LayoutTestController::staticFunctions): 15 * DumpRenderTree/LayoutTestController.h: 16 * DumpRenderTree/chromium/LayoutTestController.cpp: 17 (LayoutTestController::LayoutTestController): 18 (LayoutTestController::addOriginAccessWhitelistEntry): 19 * DumpRenderTree/chromium/LayoutTestController.h: 20 * DumpRenderTree/gtk/LayoutTestControllerGtk.cpp: 21 (LayoutTestController::addOriginAccessWhitelistEntry): 22 * DumpRenderTree/mac/DumpRenderTree.mm: 23 (resetWebViewToConsistentStateBeforeTesting): 24 * DumpRenderTree/mac/LayoutTestControllerMac.mm: 25 (LayoutTestController::addOriginAccessWhitelistEntry): 26 * DumpRenderTree/qt/LayoutTestControllerQt.cpp: 27 (LayoutTestController::addOriginAccessWhitelistEntry): 28 * DumpRenderTree/qt/LayoutTestControllerQt.h: 29 * DumpRenderTree/win/DumpRenderTree.cpp: 30 (resetWebViewToConsistentStateBeforeTesting): 31 * DumpRenderTree/win/LayoutTestControllerWin.cpp: 32 (LayoutTestController::addOriginAccessWhitelistEntry): 33 * DumpRenderTree/wx/LayoutTestControllerWx.cpp: 34 (LayoutTestController::addOriginAccessWhitelistEntry): 35 1 36 2010-04-13 Tor Arne Vestbø <tor.arne.vestbo@nokia.com> 2 37 -
trunk/WebKitTools/DumpRenderTree/LayoutTestController.cpp
r57292 r57535 1275 1275 } 1276 1276 1277 static JSValueRef whiteListAccessFromOriginCallback(JSContextRef context, JSObjectRef, JSObjectRef thisObject, size_t argumentCount, const JSValueRef arguments[], JSValueRef* exception)1277 static JSValueRef addOriginAccessWhitelistEntryCallback(JSContextRef context, JSObjectRef, JSObjectRef thisObject, size_t argumentCount, const JSValueRef arguments[], JSValueRef* exception) 1278 1278 { 1279 1279 if (argumentCount != 4) … … 1289 1289 1290 1290 LayoutTestController* controller = static_cast<LayoutTestController*>(JSObjectGetPrivate(thisObject)); 1291 controller-> whiteListAccessFromOrigin(sourceOrigin.get(), destinationProtocol.get(), destinationHost.get(), allowDestinationSubdomains);1291 controller->addOriginAccessWhitelistEntry(sourceOrigin.get(), destinationProtocol.get(), destinationHost.get(), allowDestinationSubdomains); 1292 1292 return JSValueMakeUndefined(context); 1293 1293 } … … 1551 1551 { "waitUntilDone", waitUntilDoneCallback, kJSPropertyAttributeReadOnly | kJSPropertyAttributeDontDelete }, 1552 1552 { "windowCount", windowCountCallback, kJSPropertyAttributeReadOnly | kJSPropertyAttributeDontDelete }, 1553 { " whiteListAccessFromOrigin", whiteListAccessFromOriginCallback, kJSPropertyAttributeReadOnly | kJSPropertyAttributeDontDelete },1553 { "addOriginAccessWhitelistEntry", addOriginAccessWhitelistEntryCallback, kJSPropertyAttributeReadOnly | kJSPropertyAttributeDontDelete }, 1554 1554 { "setScrollbarPolicy", setScrollbarPolicyCallback, kJSPropertyAttributeReadOnly | kJSPropertyAttributeDontDelete }, 1555 1555 { 0, 0, 0 } -
trunk/WebKitTools/DumpRenderTree/LayoutTestController.h
r57292 r57535 226 226 unsigned numberOfActiveAnimations() const; 227 227 228 void whiteListAccessFromOrigin(JSStringRef sourceOrigin, JSStringRef destinationProtocol, JSStringRef destinationHost, bool allowDestinationSubdomains);228 void addOriginAccessWhitelistEntry(JSStringRef sourceOrigin, JSStringRef destinationProtocol, JSStringRef destinationHost, bool allowDestinationSubdomains); 229 229 230 230 void addUserScript(JSStringRef source, bool runAtStart); -
trunk/WebKitTools/DumpRenderTree/chromium/LayoutTestController.cpp
r57188 r57535 109 109 bindMethod("setWillSendRequestReturnsNullOnRedirect", &LayoutTestController::setWillSendRequestReturnsNullOnRedirect); 110 110 bindMethod("setWillSendRequestReturnsNull", &LayoutTestController::setWillSendRequestReturnsNull); 111 bindMethod(" whiteListAccessFromOrigin", &LayoutTestController::whiteListAccessFromOrigin);111 bindMethod("addOriginAccessWhitelistEntry", &LayoutTestController::addOriginAccessWhitelistEntry); 112 112 bindMethod("clearAllDatabases", &LayoutTestController::clearAllDatabases); 113 113 bindMethod("setDatabaseQuota", &LayoutTestController::setDatabaseQuota); … … 1025 1025 } 1026 1026 1027 void LayoutTestController:: whiteListAccessFromOrigin(const CppArgumentList& arguments, CppVariant* result)1027 void LayoutTestController::addOriginAccessWhitelistEntry(const CppArgumentList& arguments, CppVariant* result) 1028 1028 { 1029 1029 result->setNull(); -
trunk/WebKitTools/DumpRenderTree/chromium/LayoutTestController.h
r56612 r57535 228 228 void fallbackMethod(const CppArgumentList&, CppVariant*); 229 229 230 // Allows layout tests to call SecurityOrigin:: whiteListAccessFromOrigin().231 void whiteListAccessFromOrigin(const CppArgumentList&, CppVariant*);230 // Allows layout tests to call SecurityOrigin::addOriginAccessWhitelistEntry(). 231 void addOriginAccessWhitelistEntry(const CppArgumentList&, CppVariant*); 232 232 233 233 // Clears all databases. -
trunk/WebKitTools/DumpRenderTree/gtk/LayoutTestControllerGtk.cpp
r57339 r57535 256 256 } 257 257 258 void LayoutTestController:: whiteListAccessFromOrigin(JSStringRef sourceOrigin, JSStringRef protocol, JSStringRef host, bool includeSubdomains)258 void LayoutTestController::addOriginAccessWhitelistEntry(JSStringRef sourceOrigin, JSStringRef protocol, JSStringRef host, bool includeSubdomains) 259 259 { 260 260 gchar* sourceOriginGChar = JSStringCopyUTF8CString(sourceOrigin); -
trunk/WebKitTools/DumpRenderTree/mac/DumpRenderTree.mm
r57328 r57535 1171 1171 1172 1172 [WebView _setUsesTestModeFocusRingColor:YES]; 1173 [WebView _resetOriginAccessWhite Lists];1173 [WebView _resetOriginAccessWhitelists]; 1174 1174 } 1175 1175 -
trunk/WebKitTools/DumpRenderTree/mac/LayoutTestControllerMac.mm
r57292 r57535 563 563 } 564 564 565 void LayoutTestController:: whiteListAccessFromOrigin(JSStringRef sourceOrigin, JSStringRef destinationProtocol, JSStringRef destinationHost, bool allowDestinationSubdomains)565 void LayoutTestController::addOriginAccessWhitelistEntry(JSStringRef sourceOrigin, JSStringRef destinationProtocol, JSStringRef destinationHost, bool allowDestinationSubdomains) 566 566 { 567 567 RetainPtr<CFStringRef> sourceOriginCF(AdoptCF, JSStringCopyCFString(kCFAllocatorDefault, sourceOrigin)); … … 571 571 RetainPtr<CFStringRef> hostCF(AdoptCF, JSStringCopyCFString(kCFAllocatorDefault, destinationHost)); 572 572 NSString *destinationHostNS = (NSString *)hostCF.get(); 573 [WebView _ whiteListAccessFromOrigin:sourceOriginNS destinationProtocol:destinationProtocolNS destinationHost:destinationHostNS allowDestinationSubdomains:allowDestinationSubdomains];573 [WebView _addOriginAccessWhitelistEntryWithSourceOrigin:sourceOriginNS destinationProtocol:destinationProtocolNS destinationHost:destinationHostNS allowDestinationSubdomains:allowDestinationSubdomains]; 574 574 } 575 575 -
trunk/WebKitTools/DumpRenderTree/qt/LayoutTestControllerQt.cpp
r57449 r57535 476 476 } 477 477 478 void LayoutTestController:: whiteListAccessFromOrigin(const QString& sourceOrigin, const QString& destinationProtocol, const QString& destinationHost, bool allowDestinationSubdomains)478 void LayoutTestController::addOriginAccessWhitelistEntry(const QString& sourceOrigin, const QString& destinationProtocol, const QString& destinationHost, bool allowDestinationSubdomains) 479 479 { 480 480 DumpRenderTreeSupportQt::whiteListAccessFromOrigin(sourceOrigin, destinationProtocol, destinationHost, allowDestinationSubdomains); -
trunk/WebKitTools/DumpRenderTree/qt/LayoutTestControllerQt.h
r57449 r57535 154 154 unsigned numberOfActiveAnimations() const; 155 155 156 void whiteListAccessFromOrigin(const QString& sourceOrigin, const QString& destinationProtocol, const QString& destinationHost, bool allowDestinationSubdomains);156 void addOriginAccessWhitelistEntry(const QString& sourceOrigin, const QString& destinationProtocol, const QString& destinationHost, bool allowDestinationSubdomains); 157 157 158 158 void dispatchPendingLoadRequests(); -
trunk/WebKitTools/DumpRenderTree/win/DumpRenderTree.cpp
r56718 r57535 843 843 844 844 webViewPrivate->clearMainFrameName(); 845 webViewPrivate->resetOriginAccessWhite Lists();845 webViewPrivate->resetOriginAccessWhitelists(); 846 846 847 847 BSTR groupName; -
trunk/WebKitTools/DumpRenderTree/win/LayoutTestControllerWin.cpp
r57339 r57535 984 984 } 985 985 986 void LayoutTestController:: whiteListAccessFromOrigin(JSStringRef sourceOrigin, JSStringRef destinationProtocol, JSStringRef destinationHost, bool allowDestinationSubdomains)986 void LayoutTestController::addOriginAccessWhitelistEntry(JSStringRef sourceOrigin, JSStringRef destinationProtocol, JSStringRef destinationHost, bool allowDestinationSubdomains) 987 987 { 988 988 COMPtr<IWebViewPrivate> webView; … … 990 990 return; 991 991 992 webView-> whiteListAccessFromOrigin(bstrT(sourceOrigin).GetBSTR(), bstrT(destinationProtocol).GetBSTR(), bstrT(destinationHost).GetBSTR(), allowDestinationSubdomains);992 webView->addOriginAccessWhitelistEntry(bstrT(sourceOrigin).GetBSTR(), bstrT(destinationProtocol).GetBSTR(), bstrT(destinationHost).GetBSTR(), allowDestinationSubdomains); 993 993 } 994 994 -
trunk/WebKitTools/DumpRenderTree/wx/LayoutTestControllerWx.cpp
r57376 r57535 361 361 } 362 362 363 void LayoutTestController:: whiteListAccessFromOrigin(JSStringRef sourceOrigin, JSStringRef destinationProtocol, JSStringRef destinationHost, bool allowDestinationSubdomains)363 void LayoutTestController::addOriginAccessWhitelistEntry(JSStringRef sourceOrigin, JSStringRef destinationProtocol, JSStringRef destinationHost, bool allowDestinationSubdomains) 364 364 { 365 365
Note: See TracChangeset
for help on using the changeset viewer.