| Index: chrome/browser/browsing_data/cookies_tree_model.cc
|
| diff --git a/chrome/browser/browsing_data/cookies_tree_model.cc b/chrome/browser/browsing_data/cookies_tree_model.cc
|
| index 959624e12a0d987bad35f31d0e4275cfa89e3e80..0b7d81e412e5dbe9724cf4d0fc7ac95c432869ca 100644
|
| --- a/chrome/browser/browsing_data/cookies_tree_model.cc
|
| +++ b/chrome/browser/browsing_data/cookies_tree_model.cc
|
| @@ -117,21 +117,6 @@ std::string CanonicalizeHost(const GURL& url) {
|
| return retval;
|
| }
|
|
|
| -// When creating a cookie tree node from a cookie, strip the port of the
|
| -// cookie source and treat all non-file:// URLs as http://.
|
| -GURL CanonicalizeCookieSource(const net::CanonicalCookie& cookie) {
|
| - GURL url = cookie.Source();
|
| - if (url.SchemeIsFile())
|
| - return url;
|
| -
|
| - url::Replacements<char> replacements;
|
| - replacements.ClearPort();
|
| - if (url.SchemeIsCryptographic())
|
| - replacements.SetScheme("http", url::Component(0, 4));
|
| -
|
| - return url.GetOrigin().ReplaceComponents(replacements);
|
| -}
|
| -
|
| #if defined(ENABLE_EXTENSIONS)
|
| bool TypeIsProtected(CookieTreeNode::DetailedInfo::NodeType type) {
|
| switch (type) {
|
| @@ -971,14 +956,12 @@ void CookiesTreeModel::ScopedBatchUpdateNotifier::StartBatchUpdate() {
|
| // CookiesTreeModel, public:
|
| CookiesTreeModel::CookiesTreeModel(
|
| LocalDataContainer* data_container,
|
| - ExtensionSpecialStoragePolicy* special_storage_policy,
|
| - bool group_by_cookie_source)
|
| + ExtensionSpecialStoragePolicy* special_storage_policy)
|
| : ui::TreeNodeModel<CookieTreeNode>(new CookieTreeRootNode(this)),
|
| - data_container_(data_container),
|
| #if defined(ENABLE_EXTENSIONS)
|
| special_storage_policy_(special_storage_policy),
|
| #endif
|
| - group_by_cookie_source_(group_by_cookie_source) {
|
| + data_container_(data_container) {
|
| data_container_->Init(this);
|
| }
|
|
|
| @@ -1219,18 +1202,13 @@ void CookiesTreeModel::PopulateCookieInfoWithFilter(
|
| notifier->StartBatchUpdate();
|
| for (CookieList::iterator it = container->cookie_list_.begin();
|
| it != container->cookie_list_.end(); ++it) {
|
| - GURL source = CanonicalizeCookieSource(*it);
|
| - if (source.is_empty() || !group_by_cookie_source_) {
|
| - std::string domain = it->Domain();
|
| - if (domain.length() > 1 && domain[0] == '.')
|
| - domain = domain.substr(1);
|
| -
|
| - // We treat secure cookies just the same as normal ones.
|
| - source = GURL(std::string(url::kHttpScheme) +
|
| - url::kStandardSchemeSeparator + domain + "/");
|
| - }
|
| - if (!source.SchemeIsHTTPOrHTTPS())
|
| - continue;
|
| + std::string domain = it->Domain();
|
| + if (domain.length() > 1 && domain[0] == '.')
|
| + domain = domain.substr(1);
|
| +
|
| + // Cookies ignore schemes, so group all HTTP and HTTPS cookies together.
|
| + GURL source(std::string(url::kHttpScheme) + url::kStandardSchemeSeparator +
|
| + domain + "/");
|
|
|
| if (filter.empty() || (CookieTreeHostNode::TitleForUrl(source)
|
| .find(filter) != base::string16::npos)) {
|
|
|