OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2007 Apple Inc. All rights reserved. | 2 * Copyright (C) 2007 Apple Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions | 5 * modification, are permitted provided that the following conditions |
6 * are met: | 6 * are met: |
7 * | 7 * |
8 * 1. Redistributions of source code must retain the above copyright | 8 * 1. Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * 2. Redistributions in binary form must reproduce the above copyright | 10 * 2. Redistributions in binary form must reproduce the above copyright |
(...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
68 | 68 |
69 // In general, extracting the inner URL varies by scheme. It just so happens | 69 // In general, extracting the inner URL varies by scheme. It just so happens |
70 // that all the URL schemes we currently support that use inner URLs for their | 70 // that all the URL schemes we currently support that use inner URLs for their |
71 // security origin can be parsed using this algorithm. | 71 // security origin can be parsed using this algorithm. |
72 KURL SecurityOrigin::extractInnerURL(const KURL& url) | 72 KURL SecurityOrigin::extractInnerURL(const KURL& url) |
73 { | 73 { |
74 if (url.innerURL()) | 74 if (url.innerURL()) |
75 return *url.innerURL(); | 75 return *url.innerURL(); |
76 // FIXME: Update this callsite to use the innerURL member function when | 76 // FIXME: Update this callsite to use the innerURL member function when |
77 // we finish implementing it. | 77 // we finish implementing it. |
78 return KURL(ParsedURLString, decodeURLEscapeSequences(url.path())); | 78 return KURL(ParsedURLString, url.path()); |
79 } | 79 } |
80 | 80 |
81 void SecurityOrigin::setCache(SecurityOriginCache* originCache) | 81 void SecurityOrigin::setCache(SecurityOriginCache* originCache) |
82 { | 82 { |
83 s_originCache = originCache; | 83 s_originCache = originCache; |
84 } | 84 } |
85 | 85 |
86 static bool shouldTreatAsUniqueOrigin(const KURL& url) | 86 static bool shouldTreatAsUniqueOrigin(const KURL& url) |
87 { | 87 { |
88 if (!url.isValid()) | 88 if (!url.isValid()) |
(...skipping 486 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
575 m_blockLocalAccessFromLocalOrigin = privilegeData->m_blockLocalAccessFromLoc
alOrigin; | 575 m_blockLocalAccessFromLocalOrigin = privilegeData->m_blockLocalAccessFromLoc
alOrigin; |
576 } | 576 } |
577 | 577 |
578 void SecurityOrigin::setUniqueOriginIsPotentiallyTrustworthy(bool isUniqueOrigin
PotentiallyTrustworthy) | 578 void SecurityOrigin::setUniqueOriginIsPotentiallyTrustworthy(bool isUniqueOrigin
PotentiallyTrustworthy) |
579 { | 579 { |
580 ASSERT(!isUniqueOriginPotentiallyTrustworthy || isUnique()); | 580 ASSERT(!isUniqueOriginPotentiallyTrustworthy || isUnique()); |
581 m_isUniqueOriginPotentiallyTrustworthy = isUniqueOriginPotentiallyTrustworth
y; | 581 m_isUniqueOriginPotentiallyTrustworthy = isUniqueOriginPotentiallyTrustworth
y; |
582 } | 582 } |
583 | 583 |
584 } // namespace blink | 584 } // namespace blink |
OLD | NEW |