Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(148)

Side by Side Diff: third_party/WebKit/Source/platform/weborigin/SecurityOrigin.cpp

Issue 1878273002: Remove URLencode/URLdecode for the inner origin of blob: URLs (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Unescape constants in tests & code Created 4 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 /* 1 /*
2 * Copyright (C) 2007 Apple Inc. All rights reserved. 2 * Copyright (C) 2007 Apple Inc. All rights reserved.
3 * 3 *
4 * Redistribution and use in source and binary forms, with or without 4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions 5 * modification, are permitted provided that the following conditions
6 * are met: 6 * are met:
7 * 7 *
8 * 1. Redistributions of source code must retain the above copyright 8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer. 9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright 10 * 2. Redistributions in binary form must reproduce the above copyright
(...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after
68 68
69 // In general, extracting the inner URL varies by scheme. It just so happens 69 // In general, extracting the inner URL varies by scheme. It just so happens
70 // that all the URL schemes we currently support that use inner URLs for their 70 // that all the URL schemes we currently support that use inner URLs for their
71 // security origin can be parsed using this algorithm. 71 // security origin can be parsed using this algorithm.
72 KURL SecurityOrigin::extractInnerURL(const KURL& url) 72 KURL SecurityOrigin::extractInnerURL(const KURL& url)
73 { 73 {
74 if (url.innerURL()) 74 if (url.innerURL())
75 return *url.innerURL(); 75 return *url.innerURL();
76 // FIXME: Update this callsite to use the innerURL member function when 76 // FIXME: Update this callsite to use the innerURL member function when
77 // we finish implementing it. 77 // we finish implementing it.
78 return KURL(ParsedURLString, decodeURLEscapeSequences(url.path())); 78 return KURL(ParsedURLString, url.path());
79 } 79 }
80 80
81 void SecurityOrigin::setCache(SecurityOriginCache* originCache) 81 void SecurityOrigin::setCache(SecurityOriginCache* originCache)
82 { 82 {
83 s_originCache = originCache; 83 s_originCache = originCache;
84 } 84 }
85 85
86 static bool shouldTreatAsUniqueOrigin(const KURL& url) 86 static bool shouldTreatAsUniqueOrigin(const KURL& url)
87 { 87 {
88 if (!url.isValid()) 88 if (!url.isValid())
(...skipping 486 matching lines...) Expand 10 before | Expand all | Expand 10 after
575 m_blockLocalAccessFromLocalOrigin = privilegeData->m_blockLocalAccessFromLoc alOrigin; 575 m_blockLocalAccessFromLocalOrigin = privilegeData->m_blockLocalAccessFromLoc alOrigin;
576 } 576 }
577 577
578 void SecurityOrigin::setUniqueOriginIsPotentiallyTrustworthy(bool isUniqueOrigin PotentiallyTrustworthy) 578 void SecurityOrigin::setUniqueOriginIsPotentiallyTrustworthy(bool isUniqueOrigin PotentiallyTrustworthy)
579 { 579 {
580 ASSERT(!isUniqueOriginPotentiallyTrustworthy || isUnique()); 580 ASSERT(!isUniqueOriginPotentiallyTrustworthy || isUnique());
581 m_isUniqueOriginPotentiallyTrustworthy = isUniqueOriginPotentiallyTrustworth y; 581 m_isUniqueOriginPotentiallyTrustworthy = isUniqueOriginPotentiallyTrustworth y;
582 } 582 }
583 583
584 } // namespace blink 584 } // namespace blink
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698