Index: third_party/WebKit/Source/core/loader/DocumentThreadableLoader.cpp |
diff --git a/third_party/WebKit/Source/core/loader/DocumentThreadableLoader.cpp b/third_party/WebKit/Source/core/loader/DocumentThreadableLoader.cpp |
index c9ccdf98b273f3a4a8b73d97204ddd27f5ba054e..7a42c3e3dc6702d3d6ff45f562d71b08d3637cad 100644 |
--- a/third_party/WebKit/Source/core/loader/DocumentThreadableLoader.cpp |
+++ b/third_party/WebKit/Source/core/loader/DocumentThreadableLoader.cpp |
@@ -141,7 +141,7 @@ void DocumentThreadableLoader::start(const ResourceRequest& request) |
// Setting an outgoing referer is only supported in the async code path. |
ASSERT(m_async || request.httpReferrer().isEmpty()); |
- m_sameOriginRequest = securityOrigin()->canRequestNoSuborigin(request.url()); |
+ m_sameOriginRequest = getSecurityOrigin()->canRequestNoSuborigin(request.url()); |
m_requestContext = request.requestContext(); |
m_redirectMode = request.fetchRedirectMode(); |
@@ -272,7 +272,7 @@ void DocumentThreadableLoader::makeCrossOriginAccessRequest(const ResourceReques |
if ((m_options.preflightPolicy == ConsiderPreflight && FetchUtils::isSimpleOrForbiddenRequest(request.httpMethod(), request.httpHeaderFields())) || m_options.preflightPolicy == PreventPreflight) { |
ResourceRequest crossOriginRequest(request); |
ResourceLoaderOptions crossOriginOptions(m_resourceLoaderOptions); |
- updateRequestForAccessControl(crossOriginRequest, securityOrigin(), effectiveAllowCredentials()); |
+ updateRequestForAccessControl(crossOriginRequest, getSecurityOrigin(), effectiveAllowCredentials()); |
// We update the credentials mode according to effectiveAllowCredentials() here for backward compatibility. But this is not correct. |
// FIXME: We should set it in the caller of DocumentThreadableLoader. |
crossOriginRequest.setFetchCredentialsMode(effectiveAllowCredentials() == AllowStoredCredentials ? WebURLRequest::FetchCredentialsModeInclude : WebURLRequest::FetchCredentialsModeOmit); |
@@ -292,12 +292,12 @@ void DocumentThreadableLoader::makeCrossOriginAccessRequest(const ResourceReques |
m_actualOptions = crossOriginOptions; |
bool shouldForcePreflight = InspectorInstrumentation::shouldForceCORSPreflight(m_document); |
- bool canSkipPreflight = CrossOriginPreflightResultCache::shared().canSkipPreflight(securityOrigin()->toString(), m_actualRequest.url(), effectiveAllowCredentials(), m_actualRequest.httpMethod(), m_actualRequest.httpHeaderFields()); |
+ bool canSkipPreflight = CrossOriginPreflightResultCache::shared().canSkipPreflight(getSecurityOrigin()->toString(), m_actualRequest.url(), effectiveAllowCredentials(), m_actualRequest.httpMethod(), m_actualRequest.httpHeaderFields()); |
if (canSkipPreflight && !shouldForcePreflight) { |
loadActualRequest(); |
// |this| may be dead here in async mode. |
} else { |
- ResourceRequest preflightRequest = createAccessControlPreflightRequest(m_actualRequest, securityOrigin()); |
+ ResourceRequest preflightRequest = createAccessControlPreflightRequest(m_actualRequest, getSecurityOrigin()); |
// Create a ResourceLoaderOptions for preflight. |
ResourceLoaderOptions preflightOptions = m_actualOptions; |
preflightOptions.allowCredentials = DoNotAllowStoredCredentials; |
@@ -475,7 +475,7 @@ void DocumentThreadableLoader::redirectReceived(Resource* resource, ResourceRequ |
// The redirect response must pass the access control check if the |
// original request was not same-origin. |
allowRedirect = CrossOriginAccessControl::isLegalRedirectLocation(request.url(), accessControlErrorDescription) |
- && (m_sameOriginRequest || passesAccessControlCheck(redirectResponse, effectiveAllowCredentials(), securityOrigin(), accessControlErrorDescription, m_requestContext)); |
+ && (m_sameOriginRequest || passesAccessControlCheck(redirectResponse, effectiveAllowCredentials(), getSecurityOrigin(), accessControlErrorDescription, m_requestContext)); |
} |
if (allowRedirect) { |
@@ -571,7 +571,7 @@ void DocumentThreadableLoader::handlePreflightResponse(const ResourceResponse& r |
{ |
String accessControlErrorDescription; |
- if (!passesAccessControlCheck(response, effectiveAllowCredentials(), securityOrigin(), accessControlErrorDescription, m_requestContext)) { |
+ if (!passesAccessControlCheck(response, effectiveAllowCredentials(), getSecurityOrigin(), accessControlErrorDescription, m_requestContext)) { |
handlePreflightFailure(response.url().getString(), "Response to preflight request doesn't pass access control check: " + accessControlErrorDescription); |
// |this| may be dead here in async mode. |
return; |
@@ -592,7 +592,7 @@ void DocumentThreadableLoader::handlePreflightResponse(const ResourceResponse& r |
return; |
} |
- CrossOriginPreflightResultCache::shared().appendEntry(securityOrigin()->toString(), m_actualRequest.url(), preflightResult.release()); |
+ CrossOriginPreflightResultCache::shared().appendEntry(getSecurityOrigin()->toString(), m_actualRequest.url(), preflightResult.release()); |
} |
void DocumentThreadableLoader::reportResponseReceived(unsigned long identifier, const ResourceResponse& response) |
@@ -646,12 +646,12 @@ void DocumentThreadableLoader::handleResponse(unsigned long identifier, const Re |
// loadFallbackRequestForServiceWorker(). |
// FIXME: We should use |m_sameOriginRequest| when we will support |
// Suborigins (crbug.com/336894) for Service Worker. |
- ASSERT(m_fallbackRequestForServiceWorker.isNull() || securityOrigin()->canRequest(m_fallbackRequestForServiceWorker.url())); |
+ ASSERT(m_fallbackRequestForServiceWorker.isNull() || getSecurityOrigin()->canRequest(m_fallbackRequestForServiceWorker.url())); |
m_fallbackRequestForServiceWorker = ResourceRequest(); |
if (!m_sameOriginRequest && m_options.crossOriginRequestPolicy == UseAccessControl) { |
String accessControlErrorDescription; |
- if (!passesAccessControlCheck(response, effectiveAllowCredentials(), securityOrigin(), accessControlErrorDescription, m_requestContext)) { |
+ if (!passesAccessControlCheck(response, effectiveAllowCredentials(), getSecurityOrigin(), accessControlErrorDescription, m_requestContext)) { |
reportResponseReceived(identifier, response); |
ThreadableLoaderClient* client = m_client; |
@@ -772,7 +772,7 @@ void DocumentThreadableLoader::loadActualRequest() |
m_actualRequest = ResourceRequest(); |
m_actualOptions = ResourceLoaderOptions(); |
- actualRequest.setHTTPOrigin(securityOrigin()); |
+ actualRequest.setHTTPOrigin(getSecurityOrigin()); |
clearResource(); |
@@ -908,7 +908,7 @@ bool DocumentThreadableLoader::isAllowedRedirect(const KURL& url) const |
if (m_options.crossOriginRequestPolicy == AllowCrossOriginRequests) |
return true; |
- return m_sameOriginRequest && securityOrigin()->canRequest(url); |
+ return m_sameOriginRequest && getSecurityOrigin()->canRequest(url); |
} |
bool DocumentThreadableLoader::isAllowedByContentSecurityPolicy(const KURL& url, ContentSecurityPolicy::RedirectStatus redirectStatus) const |
@@ -926,9 +926,9 @@ StoredCredentials DocumentThreadableLoader::effectiveAllowCredentials() const |
return m_resourceLoaderOptions.allowCredentials; |
} |
-SecurityOrigin* DocumentThreadableLoader::securityOrigin() const |
+SecurityOrigin* DocumentThreadableLoader::getSecurityOrigin() const |
{ |
- return m_securityOrigin ? m_securityOrigin.get() : document().securityOrigin(); |
+ return m_securityOrigin ? m_securityOrigin.get() : document().getSecurityOrigin(); |
} |
Document& DocumentThreadableLoader::document() const |