OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2012 Google, Inc. All rights reserved. | 2 * Copyright (C) 2012 Google, Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions | 5 * modification, are permitted provided that the following conditions |
6 * are met: | 6 * are met: |
7 * 1. Redistributions of source code must retain the above copyright | 7 * 1. Redistributions of source code must retain the above copyright |
8 * notice, this list of conditions and the following disclaimer. | 8 * notice, this list of conditions and the following disclaimer. |
9 * 2. Redistributions in binary form must reproduce the above copyright | 9 * 2. Redistributions in binary form must reproduce the above copyright |
10 * notice, this list of conditions and the following disclaimer in the | 10 * notice, this list of conditions and the following disclaimer in the |
(...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
62 , m_defer(NoDefer) | 62 , m_defer(NoDefer) |
63 , m_originRestriction(UseDefaultOriginRestrictionForType) | 63 , m_originRestriction(UseDefaultOriginRestrictionForType) |
64 { | 64 { |
65 m_options.initiatorInfo = initiator; | 65 m_options.initiatorInfo = initiator; |
66 } | 66 } |
67 | 67 |
68 FetchRequest::~FetchRequest() | 68 FetchRequest::~FetchRequest() |
69 { | 69 { |
70 } | 70 } |
71 | 71 |
72 void FetchRequest::setCrossOriginAccessControl(SecurityOrigin* origin, StoredCre
dentials allowCredentials, CredentialRequest requested) | |
73 { | |
74 ASSERT(requested == ClientDidNotRequestCredentials || allowCredentials == Al
lowStoredCredentials); | |
75 updateRequestForAccessControl(m_resourceRequest, origin, allowCredentials); | |
76 m_options.corsEnabled = IsCORSEnabled; | |
77 m_options.securityOrigin = origin; | |
78 m_options.credentialsRequested = requested; | |
79 } | |
80 | |
81 void FetchRequest::setCrossOriginAccessControl(SecurityOrigin* origin, StoredCre
dentials allowCredentials) | 72 void FetchRequest::setCrossOriginAccessControl(SecurityOrigin* origin, StoredCre
dentials allowCredentials) |
82 { | 73 { |
83 setCrossOriginAccessControl(origin, allowCredentials, allowCredentials == Al
lowStoredCredentials ? ClientRequestedCredentials : ClientDidNotRequestCredentia
ls); | 74 updateRequestForAccessControl(m_resourceRequest, origin, allowCredentials); |
| 75 m_options.corsEnabled = IsCORSEnabled; |
| 76 m_options.securityOrigin = origin; |
84 } | 77 } |
85 | 78 |
86 void FetchRequest::setCrossOriginAccessControl(SecurityOrigin* origin, const Ato
micString& crossOriginMode) | 79 void FetchRequest::setCrossOriginAccessControl(SecurityOrigin* origin, const Ato
micString& crossOriginMode) |
87 { | 80 { |
88 setCrossOriginAccessControl(origin, equalIgnoringCase(crossOriginMode, "use-
credentials") ? AllowStoredCredentials : DoNotAllowStoredCredentials); | 81 setCrossOriginAccessControl(origin, equalIgnoringCase(crossOriginMode, "use-
credentials") ? AllowStoredCredentials : DoNotAllowStoredCredentials); |
89 } | 82 } |
90 | 83 |
91 } // namespace WebCore | 84 } // namespace WebCore |
OLD | NEW |