| Index: third_party/WebKit/Source/core/xmlhttprequest/XMLHttpRequest.cpp
|
| diff --git a/third_party/WebKit/Source/core/xmlhttprequest/XMLHttpRequest.cpp b/third_party/WebKit/Source/core/xmlhttprequest/XMLHttpRequest.cpp
|
| index f4a5a3b460d0b4ec9859bb05124b762d8d3f8293..8e7328751d6644002bef8bd1639ef9da45c48f2a 100644
|
| --- a/third_party/WebKit/Source/core/xmlhttprequest/XMLHttpRequest.cpp
|
| +++ b/third_party/WebKit/Source/core/xmlhttprequest/XMLHttpRequest.cpp
|
| @@ -1232,7 +1232,8 @@ String XMLHttpRequest::getAllResponseHeaders() const
|
| StringBuilder stringBuilder;
|
|
|
| HTTPHeaderSet accessControlExposeHeaderSet;
|
| - parseAccessControlExposeHeadersAllowList(m_response.httpHeaderField(HTTPNames::Access_Control_Expose_Headers), accessControlExposeHeaderSet);
|
| + extractCorsExposedHeaderNamesList(m_response, accessControlExposeHeaderSet);
|
| +
|
| HTTPHeaderMap::const_iterator end = m_response.httpHeaderFields().end();
|
| for (HTTPHeaderMap::const_iterator it = m_response.httpHeaderFields().begin(); it!= end; ++it) {
|
| // Hide any headers whose name is a forbidden response-header name.
|
| @@ -1269,7 +1270,7 @@ const AtomicString& XMLHttpRequest::getResponseHeader(const AtomicString& name)
|
| }
|
|
|
| HTTPHeaderSet accessControlExposeHeaderSet;
|
| - parseAccessControlExposeHeadersAllowList(m_response.httpHeaderField(HTTPNames::Access_Control_Expose_Headers), accessControlExposeHeaderSet);
|
| + extractCorsExposedHeaderNamesList(m_response, accessControlExposeHeaderSet);
|
|
|
| if (!m_sameOriginRequest && !isOnAccessControlResponseHeaderWhitelist(name) && !accessControlExposeHeaderSet.contains(name)) {
|
| logConsoleError(getExecutionContext(), "Refused to get unsafe header \"" + name + "\"");
|
|
|