Index: Source/platform/weborigin/SecurityOrigin.cpp |
diff --git a/Source/platform/weborigin/SecurityOrigin.cpp b/Source/platform/weborigin/SecurityOrigin.cpp |
index 5404ee5b95b9f9c665feeef3e0c11f9bb9e494a1..89dd6687a57740a8ed37de6cb30408b3f3bb029c 100644 |
--- a/Source/platform/weborigin/SecurityOrigin.cpp |
+++ b/Source/platform/weborigin/SecurityOrigin.cpp |
@@ -49,14 +49,6 @@ const int MaxAllowedPort = 65535; |
static SecurityOriginCache* s_originCache = 0; |
-static bool schemeRequiresAuthority(const KURL& url) |
-{ |
- // We expect URLs with these schemes to have authority components. If the |
- // URL lacks an authority component, we get concerned and mark the origin |
- // as unique. |
- return url.protocolIsInHTTPFamily() || url.protocolIs("ftp"); |
-} |
- |
static SecurityOrigin* cachedOrigin(const KURL& url) |
{ |
if (s_originCache) |
@@ -106,12 +98,6 @@ static bool shouldTreatAsUniqueOrigin(const KURL& url) |
relevantURL = url; |
} |
- // For edge case URLs that were probably misparsed, make sure that the origin is unique. |
- // FIXME: Do we really need to do this? This looks to be a hack around a |
- // security bug in CFNetwork that might have been fixed. |
- if (schemeRequiresAuthority(relevantURL) && relevantURL.host().isEmpty()) |
- return true; |
- |
// SchemeRegistry needs a lower case protocol because it uses HashMaps |
// that assume the scheme has already been canonicalized. |
String protocol = relevantURL.protocol().lower(); |