Index: third_party/WebKit/Source/core/fetch/Resource.cpp |
diff --git a/third_party/WebKit/Source/core/fetch/Resource.cpp b/third_party/WebKit/Source/core/fetch/Resource.cpp |
index 91bc63f6a9e6bec5c9d69e802d8613f5697c6988..b23dff7d18f08dbf625fc677e95bd4fa16b0ab30 100644 |
--- a/third_party/WebKit/Source/core/fetch/Resource.cpp |
+++ b/third_party/WebKit/Source/core/fetch/Resource.cpp |
@@ -444,24 +444,21 @@ AtomicString Resource::httpContentType() const { |
} |
bool Resource::passesAccessControlCheck(SecurityOrigin* securityOrigin) const { |
- String ignoredErrorDescription; |
- return passesAccessControlCheck(securityOrigin, ignoredErrorDescription); |
-} |
+ StoredCredentials storedCredentials = |
+ lastResourceRequest().allowStoredCredentials() |
+ ? AllowStoredCredentials |
+ : DoNotAllowStoredCredentials; |
+ CrossOriginAccessControl::AccessStatus status = |
+ CrossOriginAccessControl::checkAccess(m_response, storedCredentials, |
+ securityOrigin); |
-bool Resource::passesAccessControlCheck(SecurityOrigin* securityOrigin, |
- String& errorDescription) const { |
- return blink::passesAccessControlCheck( |
- m_response, lastResourceRequest().allowStoredCredentials() |
- ? AllowStoredCredentials |
- : DoNotAllowStoredCredentials, |
- securityOrigin, errorDescription, lastResourceRequest().requestContext()); |
+ return status == CrossOriginAccessControl::kAccessAllowed; |
} |
bool Resource::isEligibleForIntegrityCheck( |
SecurityOrigin* securityOrigin) const { |
- String ignoredErrorDescription; |
return securityOrigin->canRequest(resourceRequest().url()) || |
- passesAccessControlCheck(securityOrigin, ignoredErrorDescription); |
+ passesAccessControlCheck(securityOrigin); |
} |
void Resource::setIntegrityDisposition( |