| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2007, 2008 Apple Inc. All rights reserved. | 2 * Copyright (C) 2007, 2008 Apple Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions | 5 * modification, are permitted provided that the following conditions |
| 6 * are met: | 6 * are met: |
| 7 * | 7 * |
| 8 * 1. Redistributions of source code must retain the above copyright | 8 * 1. Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * 2. Redistributions in binary form must reproduce the above copyright | 10 * 2. Redistributions in binary form must reproduce the above copyright |
| (...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 46 WTF_MAKE_NONCOPYABLE(SecurityOrigin); | 46 WTF_MAKE_NONCOPYABLE(SecurityOrigin); |
| 47 | 47 |
| 48 public: | 48 public: |
| 49 static PassRefPtr<SecurityOrigin> create(const KURL&); | 49 static PassRefPtr<SecurityOrigin> create(const KURL&); |
| 50 static PassRefPtr<SecurityOrigin> createUnique(); | 50 static PassRefPtr<SecurityOrigin> createUnique(); |
| 51 | 51 |
| 52 static PassRefPtr<SecurityOrigin> createFromString(const String&); | 52 static PassRefPtr<SecurityOrigin> createFromString(const String&); |
| 53 static PassRefPtr<SecurityOrigin> create(const String& protocol, | 53 static PassRefPtr<SecurityOrigin> create(const String& protocol, |
| 54 const String& host, | 54 const String& host, |
| 55 int port); | 55 int port); |
| 56 static PassRefPtr<SecurityOrigin> create(const String& protocol, |
| 57 const String& host, |
| 58 int port, |
| 59 const String& suborigin); |
| 56 | 60 |
| 57 static void setMap(URLSecurityOriginMap*); | 61 static void setMap(URLSecurityOriginMap*); |
| 58 | 62 |
| 59 // Some URL schemes use nested URLs for their security context. For example, | 63 // Some URL schemes use nested URLs for their security context. For example, |
| 60 // filesystem URLs look like the following: | 64 // filesystem URLs look like the following: |
| 61 // | 65 // |
| 62 // filesystem:http://example.com/temporary/path/to/file.png | 66 // filesystem:http://example.com/temporary/path/to/file.png |
| 63 // | 67 // |
| 64 // We're supposed to use "http://example.com" as the origin. | 68 // We're supposed to use "http://example.com" as the origin. |
| 65 // | 69 // |
| (...skipping 231 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 297 bool m_universalAccess; | 301 bool m_universalAccess; |
| 298 bool m_domainWasSetInDOM; | 302 bool m_domainWasSetInDOM; |
| 299 bool m_canLoadLocalResources; | 303 bool m_canLoadLocalResources; |
| 300 bool m_blockLocalAccessFromLocalOrigin; | 304 bool m_blockLocalAccessFromLocalOrigin; |
| 301 bool m_isUniqueOriginPotentiallyTrustworthy; | 305 bool m_isUniqueOriginPotentiallyTrustworthy; |
| 302 }; | 306 }; |
| 303 | 307 |
| 304 } // namespace blink | 308 } // namespace blink |
| 305 | 309 |
| 306 #endif // SecurityOrigin_h | 310 #endif // SecurityOrigin_h |
| OLD | NEW |