OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 1999 Lars Knoll (knoll@kde.org) | 2 * Copyright (C) 1999 Lars Knoll (knoll@kde.org) |
3 * (C) 1999 Antti Koivisto (koivisto@kde.org) | 3 * (C) 1999 Antti Koivisto (koivisto@kde.org) |
4 * Copyright (C) 2004, 2005, 2006, 2007, 2009, 2010 Apple Inc. All rights reserv
ed. | 4 * Copyright (C) 2004, 2005, 2006, 2007, 2009, 2010 Apple Inc. All rights reserv
ed. |
5 * | 5 * |
6 * This library is free software; you can redistribute it and/or | 6 * This library is free software; you can redistribute it and/or |
7 * modify it under the terms of the GNU Library General Public | 7 * modify it under the terms of the GNU Library General Public |
8 * License as published by the Free Software Foundation; either | 8 * License as published by the Free Software Foundation; either |
9 * version 2 of the License, or (at your option) any later version. | 9 * version 2 of the License, or (at your option) any later version. |
10 * | 10 * |
(...skipping 201 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
212 | 212 |
213 static void configureRequest(FetchRequest& request, ImageLoader::BypassMainWorld
Behavior bypassBehavior, Element& element, const ClientHintsPreferences& clientH
intsPreferences) | 213 static void configureRequest(FetchRequest& request, ImageLoader::BypassMainWorld
Behavior bypassBehavior, Element& element, const ClientHintsPreferences& clientH
intsPreferences) |
214 { | 214 { |
215 if (bypassBehavior == ImageLoader::BypassMainWorldCSP) | 215 if (bypassBehavior == ImageLoader::BypassMainWorldCSP) |
216 request.setContentSecurityCheck(DoNotCheckContentSecurityPolicy); | 216 request.setContentSecurityCheck(DoNotCheckContentSecurityPolicy); |
217 | 217 |
218 AtomicString crossOriginMode = element.fastGetAttribute(HTMLNames::crossorig
inAttr); | 218 AtomicString crossOriginMode = element.fastGetAttribute(HTMLNames::crossorig
inAttr); |
219 if (!crossOriginMode.isNull()) | 219 if (!crossOriginMode.isNull()) |
220 request.setCrossOriginAccessControl(element.document().securityOrigin(),
crossOriginMode); | 220 request.setCrossOriginAccessControl(element.document().securityOrigin(),
crossOriginMode); |
221 | 221 |
222 if (clientHintsPreferences.shouldSendRW() && isHTMLImageElement(element)) { | 222 if (clientHintsPreferences.shouldSendResourceWidth() && isHTMLImageElement(e
lement)) { |
223 FetchRequest::ResourceWidth resourceWidth; | 223 FetchRequest::ResourceWidth resourceWidth; |
224 resourceWidth.width = toHTMLImageElement(element).sourceSize(element); | 224 resourceWidth.width = toHTMLImageElement(element).sourceSize(element); |
225 resourceWidth.isSet = true; | 225 resourceWidth.isSet = true; |
226 request.setResourceWidth(resourceWidth); | 226 request.setResourceWidth(resourceWidth); |
227 } | 227 } |
228 } | 228 } |
229 | 229 |
230 inline void ImageLoader::dispatchErrorEvent() | 230 inline void ImageLoader::dispatchErrorEvent() |
231 { | 231 { |
232 m_hasPendingErrorEvent = true; | 232 m_hasPendingErrorEvent = true; |
(...skipping 418 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
651 #endif | 651 #endif |
652 } | 652 } |
653 | 653 |
654 #if ENABLE(OILPAN) | 654 #if ENABLE(OILPAN) |
655 ImageLoader::ImageLoaderClientRemover::~ImageLoaderClientRemover() | 655 ImageLoader::ImageLoaderClientRemover::~ImageLoaderClientRemover() |
656 { | 656 { |
657 m_loader.willRemoveClient(m_client); | 657 m_loader.willRemoveClient(m_client); |
658 } | 658 } |
659 #endif | 659 #endif |
660 } | 660 } |
OLD | NEW |