| Index: Source/core/fetch/CrossOriginAccessControl.cpp
|
| diff --git a/Source/core/fetch/CrossOriginAccessControl.cpp b/Source/core/fetch/CrossOriginAccessControl.cpp
|
| index 98d2b1a7734902740dc2f692cc42445a52a8299d..bc49ccd769b63648e250fd8af6a9ed1dbf9abdee 100644
|
| --- a/Source/core/fetch/CrossOriginAccessControl.cpp
|
| +++ b/Source/core/fetch/CrossOriginAccessControl.cpp
|
| @@ -103,7 +103,7 @@ bool isOnAccessControlResponseHeaderWhitelist(const String& name)
|
| void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, StoredCredentials allowCredentials)
|
| {
|
| request.removeCredentials();
|
| - request.setAllowCookies(allowCredentials == AllowStoredCredentials);
|
| + request.setAllowStoredCredentials(allowCredentials == AllowStoredCredentials);
|
|
|
| if (securityOrigin)
|
| request.setHTTPOrigin(securityOrigin->toAtomicString());
|
| @@ -240,7 +240,7 @@ bool CrossOriginAccessControl::handleRedirect(Resource* resource, SecurityOrigin
|
| bool allowRedirect = isLegalRedirectLocation(requestURL, errorDescription);
|
| if (allowRedirect) {
|
| // Step 5: perform resource sharing access check.
|
| - StoredCredentials withCredentials = resource->resourceRequest().allowCookies() ? AllowStoredCredentials : DoNotAllowStoredCredentials;
|
| + StoredCredentials withCredentials = resource->resourceRequest().allowStoredCredentials() ? AllowStoredCredentials : DoNotAllowStoredCredentials;
|
| allowRedirect = passesAccessControlCheck(redirectResponse, withCredentials, securityOrigin, errorDescription);
|
| if (allowRedirect) {
|
| RefPtr<SecurityOrigin> originalOrigin = SecurityOrigin::create(originalURL);
|
|
|