Index: third_party/WebKit/Source/core/dom/Document.cpp |
diff --git a/third_party/WebKit/Source/core/dom/Document.cpp b/third_party/WebKit/Source/core/dom/Document.cpp |
index 80701533c53fb47b240635b5e57d614c198f6831..3e2e08c5fd83597ce751980686ab01c35092cef5 100644 |
--- a/third_party/WebKit/Source/core/dom/Document.cpp |
+++ b/third_party/WebKit/Source/core/dom/Document.cpp |
@@ -2434,11 +2434,11 @@ void Document::open(Document* enteredDocument, ExceptionState& exceptionState) |
} |
if (enteredDocument) { |
- if (!securityOrigin()->canAccess(enteredDocument->securityOrigin())) { |
+ if (!getSecurityOrigin()->canAccess(enteredDocument->getSecurityOrigin())) { |
exceptionState.throwSecurityError("Can only call open() on same-origin documents."); |
return; |
} |
- setSecurityOrigin(enteredDocument->securityOrigin()); |
+ setSecurityOrigin(enteredDocument->getSecurityOrigin()); |
setURL(enteredDocument->url()); |
m_cookieURL = enteredDocument->cookieURL(); |
} |
@@ -2864,7 +2864,7 @@ void Document::write(const SegmentedString& text, Document* enteredDocument, Exc |
return; |
} |
- if (enteredDocument && !securityOrigin()->canAccess(enteredDocument->securityOrigin())) { |
+ if (enteredDocument && !getSecurityOrigin()->canAccess(enteredDocument->getSecurityOrigin())) { |
exceptionState.throwSecurityError("Can only call write() on same-origin documents."); |
return; |
} |
@@ -3178,7 +3178,7 @@ void Document::processReferrerPolicy(const String& policy) |
String Document::outgoingReferrer() const |
{ |
- if (securityOrigin()->isUnique()) { |
+ if (getSecurityOrigin()->isUnique()) { |
// Return |no-referrer|. |
return String(); |
} |
@@ -3353,7 +3353,7 @@ void Document::cloneDataFromDocument(const Document& other) |
setCompatibilityMode(other.getCompatibilityMode()); |
setEncodingData(other.m_encodingData); |
setContextFeatures(other.contextFeatures()); |
- setSecurityOrigin(other.securityOrigin()->isolatedCopy()); |
+ setSecurityOrigin(other.getSecurityOrigin()->isolatedCopy()); |
setMimeType(other.contentType()); |
} |
@@ -3394,9 +3394,9 @@ bool Document::isSecureContextImpl(String* errorMessage, const SecureContextChec |
if (SchemeRegistry::schemeShouldBypassSecureContextCheck(origin->protocol())) |
return true; |
} else { |
- if (!isOriginPotentiallyTrustworthy(securityOrigin(), errorMessage)) |
+ if (!isOriginPotentiallyTrustworthy(getSecurityOrigin(), errorMessage)) |
return false; |
- if (SchemeRegistry::schemeShouldBypassSecureContextCheck(securityOrigin()->protocol())) |
+ if (SchemeRegistry::schemeShouldBypassSecureContextCheck(getSecurityOrigin()->protocol())) |
return true; |
} |
@@ -3411,7 +3411,7 @@ bool Document::isSecureContextImpl(String* errorMessage, const SecureContextChec |
if (!isOriginPotentiallyTrustworthy(origin.get(), errorMessage)) |
return false; |
} else { |
- if (!isOriginPotentiallyTrustworthy(context->securityOrigin(), errorMessage)) |
+ if (!isOriginPotentiallyTrustworthy(context->getSecurityOrigin(), errorMessage)) |
return false; |
} |
} |
@@ -3952,11 +3952,11 @@ EventListener* Document::getWindowAttributeEventListener(const AtomicString& eve |
return domWindow->getAttributeEventListener(eventType); |
} |
-EventQueue* Document::eventQueue() const |
+EventQueue* Document::getEventQueue() const |
{ |
if (!m_domWindow) |
return 0; |
- return m_domWindow->eventQueue(); |
+ return m_domWindow->getEventQueue(); |
} |
void Document::enqueueAnimationFrameEvent(PassRefPtrWillBeRawPtr<Event> event) |
@@ -4097,7 +4097,7 @@ String Document::cookie(ExceptionState& exceptionState) const |
// InvalidStateError exception on getting if the Document has no |
// browsing context. |
- if (!securityOrigin()->canAccessCookies()) { |
+ if (!getSecurityOrigin()->canAccessCookies()) { |
if (isSandboxed(SandboxOrigin)) |
exceptionState.throwSecurityError("The document is sandboxed and lacks the 'allow-same-origin' flag."); |
else if (url().protocolIs("data")) |
@@ -4123,7 +4123,7 @@ void Document::setCookie(const String& value, ExceptionState& exceptionState) |
// InvalidStateError exception on setting if the Document has no |
// browsing context. |
- if (!securityOrigin()->canAccessCookies()) { |
+ if (!getSecurityOrigin()->canAccessCookies()) { |
if (isSandboxed(SandboxOrigin)) |
exceptionState.throwSecurityError("The document is sandboxed and lacks the 'allow-same-origin' flag."); |
else if (url().protocolIs("data")) |
@@ -4149,7 +4149,7 @@ const AtomicString& Document::referrer() const |
String Document::domain() const |
{ |
- return securityOrigin()->domain(); |
+ return getSecurityOrigin()->domain(); |
} |
void Document::setDomain(const String& newDomain, ExceptionState& exceptionState) |
@@ -4161,8 +4161,8 @@ void Document::setDomain(const String& newDomain, ExceptionState& exceptionState |
return; |
} |
- if (SchemeRegistry::isDomainRelaxationForbiddenForURLScheme(securityOrigin()->protocol())) { |
- exceptionState.throwSecurityError("Assignment is forbidden for the '" + securityOrigin()->protocol() + "' scheme."); |
+ if (SchemeRegistry::isDomainRelaxationForbiddenForURLScheme(getSecurityOrigin()->protocol())) { |
+ exceptionState.throwSecurityError("Assignment is forbidden for the '" + getSecurityOrigin()->protocol() + "' scheme."); |
return; |
} |
@@ -4171,8 +4171,8 @@ void Document::setDomain(const String& newDomain, ExceptionState& exceptionState |
return; |
} |
- OriginAccessEntry accessEntry(securityOrigin()->protocol(), newDomain, OriginAccessEntry::AllowSubdomains); |
- OriginAccessEntry::MatchResult result = accessEntry.matchesOrigin(*securityOrigin()); |
+ OriginAccessEntry accessEntry(getSecurityOrigin()->protocol(), newDomain, OriginAccessEntry::AllowSubdomains); |
+ OriginAccessEntry::MatchResult result = accessEntry.matchesOrigin(*getSecurityOrigin()); |
if (result == OriginAccessEntry::DoesNotMatchOrigin) { |
exceptionState.throwSecurityError("'" + newDomain + "' is not a suffix of '" + domain() + "'."); |
return; |
@@ -4183,9 +4183,9 @@ void Document::setDomain(const String& newDomain, ExceptionState& exceptionState |
return; |
} |
- securityOrigin()->setDomainFromDOM(newDomain); |
+ getSecurityOrigin()->setDomainFromDOM(newDomain); |
if (m_frame) |
- m_frame->script().updateSecurityOrigin(securityOrigin()); |
+ m_frame->script().updateSecurityOrigin(getSecurityOrigin()); |
} |
// http://www.whatwg.org/specs/web-apps/current-work/#dom-document-lastmodified |
@@ -4228,7 +4228,7 @@ const KURL& Document::firstPartyForCookies() const |
// We use 'matchesDomain' here, as it turns out that some folks embed HTTPS login forms |
// into HTTP pages; we should allow this kind of upgrade. |
- if (accessEntry.matchesDomain(*currentDocument->securityOrigin()) == OriginAccessEntry::DoesNotMatchOrigin) |
+ if (accessEntry.matchesDomain(*currentDocument->getSecurityOrigin()) == OriginAccessEntry::DoesNotMatchOrigin) |
return SecurityOrigin::urlWithUniqueSecurityOrigin(); |
currentDocument = currentDocument->parentDocument(); |
@@ -4916,7 +4916,7 @@ bool Document::useSecureKeyboardEntryWhenActive() const |
void Document::initSecurityContext(const DocumentInit& initializer) |
{ |
- ASSERT(!securityOrigin()); |
+ ASSERT(!getSecurityOrigin()); |
if (!initializer.hasSecurityContext()) { |
// No source for a security context. |
@@ -4946,13 +4946,13 @@ void Document::initSecurityContext(const DocumentInit& initializer) |
// but we're also sandboxed, the only thing we inherit is the ability |
// to load local resources. This lets about:blank iframes in file:// |
// URL documents load images and other resources from the file system. |
- if (initializer.owner() && initializer.owner()->securityOrigin()->canLoadLocalResources()) |
- securityOrigin()->grantLoadLocalResources(); |
+ if (initializer.owner() && initializer.owner()->getSecurityOrigin()->canLoadLocalResources()) |
+ getSecurityOrigin()->grantLoadLocalResources(); |
} else if (initializer.owner()) { |
m_cookieURL = initializer.owner()->cookieURL(); |
// We alias the SecurityOrigins to match Firefox, see Bug 15313 |
// https://bugs.webkit.org/show_bug.cgi?id=15313 |
- setSecurityOrigin(initializer.owner()->securityOrigin()); |
+ setSecurityOrigin(initializer.owner()->getSecurityOrigin()); |
} else { |
m_cookieURL = m_url; |
setSecurityOrigin(SecurityOrigin::create(m_url)); |
@@ -4962,7 +4962,7 @@ void Document::initSecurityContext(const DocumentInit& initializer) |
// the former via the 'treat-as-public-address' directive (see |
// https://mikewest.github.io/cors-rfc1918/#csp). |
if (initializer.isHostedInReservedIPRange()) { |
- setAddressSpace(securityOrigin()->isLocalhost() ? WebAddressSpaceLocal : WebAddressSpacePrivate); |
+ setAddressSpace(getSecurityOrigin()->isLocalhost() ? WebAddressSpaceLocal : WebAddressSpacePrivate); |
} else { |
setAddressSpace(WebAddressSpacePublic); |
} |
@@ -4977,21 +4977,21 @@ void Document::initSecurityContext(const DocumentInit& initializer) |
initContentSecurityPolicy(); |
} |
- if (securityOrigin()->hasSuborigin()) |
- enforceSuborigin(securityOrigin()->suboriginName()); |
+ if (getSecurityOrigin()->hasSuborigin()) |
+ enforceSuborigin(getSecurityOrigin()->suboriginName()); |
if (Settings* settings = initializer.settings()) { |
if (!settings->webSecurityEnabled()) { |
// Web security is turned off. We should let this document access every other document. This is used primary by testing |
// harnesses for web sites. |
- securityOrigin()->grantUniversalAccess(); |
- } else if (securityOrigin()->isLocal()) { |
+ getSecurityOrigin()->grantUniversalAccess(); |
+ } else if (getSecurityOrigin()->isLocal()) { |
if (settings->allowUniversalAccessFromFileURLs()) { |
// Some clients want local URLs to have universal access, but that setting is dangerous for other clients. |
- securityOrigin()->grantUniversalAccess(); |
+ getSecurityOrigin()->grantUniversalAccess(); |
} else if (!settings->allowFileAccessFromFileURLs()) { |
// Some clients do not want local URLs to have access to other local URLs. |
- securityOrigin()->blockLocalAccessFromLocalOrigin(); |
+ getSecurityOrigin()->blockLocalAccessFromLocalOrigin(); |
} |
} |
} |
@@ -5001,8 +5001,8 @@ void Document::initSecurityContext(const DocumentInit& initializer) |
setBaseURLOverride(initializer.parentBaseURL()); |
} |
- if (securityOrigin()->hasSuborigin()) |
- enforceSuborigin(securityOrigin()->suboriginName()); |
+ if (getSecurityOrigin()->hasSuborigin()) |
+ enforceSuborigin(getSecurityOrigin()->suboriginName()); |
} |
void Document::initContentSecurityPolicy(PassRefPtrWillBeRawPtr<ContentSecurityPolicy> csp) |
@@ -5024,7 +5024,7 @@ void Document::initContentSecurityPolicy(PassRefPtrWillBeRawPtr<ContentSecurityP |
bool Document::isSecureTransitionTo(const KURL& url) const |
{ |
RefPtr<SecurityOrigin> other = SecurityOrigin::create(url); |
- return securityOrigin()->canAccess(other.get()); |
+ return getSecurityOrigin()->canAccess(other.get()); |
} |
bool Document::allowInlineEventHandlers(Node* node, EventListener* listener, const String& contextURL, const WTF::OrdinalNumber& contextLine) |
@@ -5073,7 +5073,7 @@ void Document::didUpdateSecurityOrigin() |
{ |
if (!m_frame) |
return; |
- m_frame->updateSecurityOrigin(securityOrigin()); |
+ m_frame->updateSecurityOrigin(getSecurityOrigin()); |
} |
bool Document::isContextThread() const |
@@ -5121,7 +5121,7 @@ void Document::initDNSPrefetch() |
Settings* settings = this->settings(); |
m_haveExplicitlyDisabledDNSPrefetch = false; |
- m_isDNSPrefetchEnabled = settings && settings->dnsPrefetchingEnabled() && securityOrigin()->protocol() == "http"; |
+ m_isDNSPrefetchEnabled = settings && settings->dnsPrefetchingEnabled() && getSecurityOrigin()->protocol() == "http"; |
// Inherit DNS prefetch opt-out from parent frame |
if (Document* parent = parentDocument()) { |
@@ -5184,7 +5184,7 @@ void Document::addConsoleMessage(PassRefPtrWillBeRawPtr<ConsoleMessage> consoleM |
if (!m_frame) |
return; |
- if (!consoleMessage->scriptState() && consoleMessage->url().isNull() && !consoleMessage->lineNumber()) { |
+ if (!consoleMessage->getScriptState() && consoleMessage->url().isNull() && !consoleMessage->lineNumber()) { |
consoleMessage->setURL(url().getString()); |
if (!isInDocumentWrite() && scriptableDocumentParser()) { |
ScriptableDocumentParser* parser = scriptableDocumentParser(); |