Index: Source/platform/weborigin/SecurityOrigin.cpp |
diff --git a/Source/platform/weborigin/SecurityOrigin.cpp b/Source/platform/weborigin/SecurityOrigin.cpp |
index d971d8bf965743227ffc4b41a6df2d6cef541c4c..e05c71300b7ef71df3f37ebdee102dd6ee748844 100644 |
--- a/Source/platform/weborigin/SecurityOrigin.cpp |
+++ b/Source/platform/weborigin/SecurityOrigin.cpp |
@@ -134,9 +134,6 @@ SecurityOrigin::SecurityOrigin(const KURL& url) |
// By default, only local SecurityOrigins can load local resources. |
m_canLoadLocalResources = isLocal(); |
- |
- if (m_canLoadLocalResources) |
- m_filePath = url.path(); // In case enforceFilePathSeparation() is called. |
} |
SecurityOrigin::SecurityOrigin() |
@@ -157,7 +154,6 @@ SecurityOrigin::SecurityOrigin(const SecurityOrigin* other) |
: m_protocol(other->m_protocol.isolatedCopy()) |
, m_host(other->m_host.isolatedCopy()) |
, m_domain(other->m_domain.isolatedCopy()) |
- , m_filePath(other->m_filePath.isolatedCopy()) |
, m_port(other->m_port) |
, m_isUnique(other->m_isUnique) |
, m_universalAccess(other->m_universalAccess) |
@@ -275,10 +271,7 @@ bool SecurityOrigin::passesFileCheck(const SecurityOrigin* other) const |
{ |
ASSERT(isLocal() && other->isLocal()); |
- if (!m_enforceFilePathSeparation && !other->m_enforceFilePathSeparation) |
- return true; |
- |
- return (m_filePath == other->m_filePath); |
+ return !m_enforceFilePathSeparation && !other->m_enforceFilePathSeparation; |
dcheng
2015/06/01 21:08:53
I think we should rename m_enforceFilePathSeparati
TheJH
2015/06/02 11:59:19
What would be a good name? m_treatFileAsUniqueOrig
|
} |
bool SecurityOrigin::canRequest(const KURL& url) const |