Changeset 99543 in webkit
- Timestamp:
- Nov 8, 2011 3:46:40 AM (12 years ago)
- Location:
- trunk/Source/WebCore
- Files:
-
- 3 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/Source/WebCore/ChangeLog
r99541 r99543 1 2011-11-08 Nikolas Zimmermann <nzimmermann@rim.com> 2 3 Switch SVGImage cache to store ImageBuffers instead of whole SVGImages, including a DOM/Render tree 4 https://bugs.webkit.org/show_bug.cgi?id=71368 5 6 Reviewed by Zoltan Herczeg. 7 8 When determining whether the canvas would be tainted, we need access to the SVGImage, not its cached BitmapImage. 9 Otherwhise wrong assumptions are mode, leading to regressions. 10 11 Fixes http/tests/security/canvas-remote-read-svg-image.html and related tests on the bots. 12 13 * html/canvas/CanvasRenderingContext.cpp: 14 (WebCore::CanvasRenderingContext::wouldTaintOrigin): Forgot to switch them back to use cachedImage->image(). 15 * html/canvas/CanvasRenderingContext2D.cpp: 16 (WebCore::isOriginClean): Ditto. 17 1 18 2011-11-08 Vsevolod Vlasov <vsevik@chromium.org> 2 19 -
trunk/Source/WebCore/html/canvas/CanvasRenderingContext.cpp
r97448 r99543 62 62 63 63 CachedImage* cachedImage = image->cachedImage(); 64 if (!cachedImage->image ForRenderer(image->renderer())->hasSingleSecurityOrigin())64 if (!cachedImage->image()->hasSingleSecurityOrigin()) 65 65 return true; 66 66 -
trunk/Source/WebCore/html/canvas/CanvasRenderingContext2D.cpp
r99506 r99543 88 88 static bool isOriginClean(CachedImage* cachedImage, HTMLImageElement* image, SecurityOrigin* securityOrigin) 89 89 { 90 if (!cachedImage->image ForRenderer(image->renderer())->hasSingleSecurityOrigin())90 if (!cachedImage->image()->hasSingleSecurityOrigin()) 91 91 return false; 92 92 if (cachedImage->passesAccessControlCheck(securityOrigin))
Note: See TracChangeset
for help on using the changeset viewer.