OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2006, 2007, 2008 Apple Inc. All rights reserved. | 2 * Copyright (C) 2006, 2007, 2008 Apple Inc. All rights reserved. |
3 * Copyright (C) 2011 Google Inc. All rights reserved. | 3 * Copyright (C) 2011 Google Inc. All rights reserved. |
4 * | 4 * |
5 * Redistribution and use in source and binary forms, with or without | 5 * Redistribution and use in source and binary forms, with or without |
6 * modification, are permitted provided that the following conditions | 6 * modification, are permitted provided that the following conditions |
7 * are met: | 7 * are met: |
8 * | 8 * |
9 * 1. Redistributions of source code must retain the above copyright | 9 * 1. Redistributions of source code must retain the above copyright |
10 * notice, this list of conditions and the following disclaimer. | 10 * notice, this list of conditions and the following disclaimer. |
(...skipping 347 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
358 // If the redirecting url is not allowed to display content from the target | 358 // If the redirecting url is not allowed to display content from the target |
359 // origin, then block the redirect. | 359 // origin, then block the redirect. |
360 const KURL& requestURL = m_request.url(); | 360 const KURL& requestURL = m_request.url(); |
361 RefPtr<SecurityOrigin> redirectingOrigin = | 361 RefPtr<SecurityOrigin> redirectingOrigin = |
362 SecurityOrigin::create(redirectResponse.url()); | 362 SecurityOrigin::create(redirectResponse.url()); |
363 if (!redirectingOrigin->canDisplay(requestURL)) { | 363 if (!redirectingOrigin->canDisplay(requestURL)) { |
364 FrameLoader::reportLocalLoadFailed(m_frame, requestURL.getString()); | 364 FrameLoader::reportLocalLoadFailed(m_frame, requestURL.getString()); |
365 m_fetcher->stopFetching(); | 365 m_fetcher->stopFetching(); |
366 return false; | 366 return false; |
367 } | 367 } |
368 if (!frameLoader().shouldContinueForNavigationPolicy( | 368 if (frameLoader().shouldContinueForNavigationPolicy( |
369 m_request, SubstituteData(), this, CheckContentSecurityPolicy, | 369 m_request, SubstituteData(), this, CheckContentSecurityPolicy, |
370 m_navigationType, NavigationPolicyCurrentTab, m_loadType, | 370 m_navigationType, NavigationPolicyCurrentTab, m_loadType, |
371 isClientRedirect(), nullptr)) { | 371 isClientRedirect(), nullptr) != NavigationPolicyCurrentTab) { |
372 m_fetcher->stopFetching(); | 372 m_fetcher->stopFetching(); |
373 return false; | 373 return false; |
374 } | 374 } |
375 | 375 |
376 DCHECK(timing().fetchStart()); | 376 DCHECK(timing().fetchStart()); |
377 appendRedirect(requestURL); | 377 appendRedirect(requestURL); |
378 timing().addRedirect(redirectResponse.url(), requestURL); | 378 timing().addRedirect(redirectResponse.url(), requestURL); |
379 | 379 |
380 // If a redirection happens during a back/forward navigation, don't restore | 380 // If a redirection happens during a back/forward navigation, don't restore |
381 // any state from the old HistoryItem. There is a provisional history item for | 381 // any state from the old HistoryItem. There is a provisional history item for |
(...skipping 429 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
811 m_writer ? m_writer->encoding() : emptyAtom, true, | 811 m_writer ? m_writer->encoding() : emptyAtom, true, |
812 ForceSynchronousParsing); | 812 ForceSynchronousParsing); |
813 if (!source.isNull()) | 813 if (!source.isNull()) |
814 m_writer->appendReplacingData(source); | 814 m_writer->appendReplacingData(source); |
815 endWriting(); | 815 endWriting(); |
816 } | 816 } |
817 | 817 |
818 DEFINE_WEAK_IDENTIFIER_MAP(DocumentLoader); | 818 DEFINE_WEAK_IDENTIFIER_MAP(DocumentLoader); |
819 | 819 |
820 } // namespace blink | 820 } // namespace blink |
OLD | NEW |