| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 1999 Lars Knoll (knoll@kde.org) | 2 * Copyright (C) 1999 Lars Knoll (knoll@kde.org) |
| 3 * (C) 1999 Antti Koivisto (koivisto@kde.org) | 3 * (C) 1999 Antti Koivisto (koivisto@kde.org) |
| 4 * (C) 2001 Dirk Mueller (mueller@kde.org) | 4 * (C) 2001 Dirk Mueller (mueller@kde.org) |
| 5 * (C) 2006 Alexey Proskuryakov (ap@webkit.org) | 5 * (C) 2006 Alexey Proskuryakov (ap@webkit.org) |
| 6 * Copyright (C) 2004, 2005, 2006, 2007, 2008, 2009, 2011, 2012 Apple Inc. All r
ights reserved. | 6 * Copyright (C) 2004, 2005, 2006, 2007, 2008, 2009, 2011, 2012 Apple Inc. All r
ights reserved. |
| 7 * Copyright (C) 2008, 2009 Torch Mobile Inc. All rights reserved. (http://www.t
orchmobile.com/) | 7 * Copyright (C) 2008, 2009 Torch Mobile Inc. All rights reserved. (http://www.t
orchmobile.com/) |
| 8 * Copyright (C) 2008, 2009, 2011, 2012 Google Inc. All rights reserved. | 8 * Copyright (C) 2008, 2009, 2011, 2012 Google Inc. All rights reserved. |
| 9 * Copyright (C) 2010 Nokia Corporation and/or its subsidiary(-ies) | 9 * Copyright (C) 2010 Nokia Corporation and/or its subsidiary(-ies) |
| 10 * Copyright (C) Research In Motion Limited 2010-2011. All rights reserved. | 10 * Copyright (C) Research In Motion Limited 2010-2011. All rights reserved. |
| (...skipping 4785 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 4796 // loading URL with a fresh content security policy. | 4796 // loading URL with a fresh content security policy. |
| 4797 m_cookieURL = m_url; | 4797 m_cookieURL = m_url; |
| 4798 enforceSandboxFlags(initializer.sandboxFlags()); | 4798 enforceSandboxFlags(initializer.sandboxFlags()); |
| 4799 setSecurityOrigin(isSandboxed(SandboxOrigin) ? SecurityOrigin::createUnique(
) : SecurityOrigin::create(m_url)); | 4799 setSecurityOrigin(isSandboxed(SandboxOrigin) ? SecurityOrigin::createUnique(
) : SecurityOrigin::create(m_url)); |
| 4800 setContentSecurityPolicy(contentSecurityPolicyFor(this)); | 4800 setContentSecurityPolicy(contentSecurityPolicyFor(this)); |
| 4801 | 4801 |
| 4802 if (Settings* settings = initializer.settings()) { | 4802 if (Settings* settings = initializer.settings()) { |
| 4803 if (!settings->webSecurityEnabled()) { | 4803 if (!settings->webSecurityEnabled()) { |
| 4804 // Web security is turned off. We should let this document access ev
ery other document. This is used primary by testing | 4804 // Web security is turned off. We should let this document access ev
ery other document. This is used primary by testing |
| 4805 // harnesses for web sites. | 4805 // harnesses for web sites. |
| 4806 securityOrigin()->grantUniversalAccess(); | 4806 securityOrigin()->setUniversalAccess(true); |
| 4807 } else if (securityOrigin()->isLocal()) { | 4807 } else if (securityOrigin()->isLocal()) { |
| 4808 if (settings->allowUniversalAccessFromFileURLs()) { | 4808 if (settings->allowUniversalAccessFromFileURLs()) { |
| 4809 // Some clients want local URLs to have universal access, but th
at setting is dangerous for other clients. | 4809 // Some clients want local URLs to have universal access, but th
at setting is dangerous for other clients. |
| 4810 securityOrigin()->grantUniversalAccess(); | 4810 securityOrigin()->setUniversalAccess(true); |
| 4811 } else if (!settings->allowFileAccessFromFileURLs()) { | 4811 } else if (!settings->allowFileAccessFromFileURLs()) { |
| 4812 // Some clients want local URLs to have even tighter restriction
s by default, and not be able to access other local files. | 4812 // Some clients want local URLs to have even tighter restriction
s by default, and not be able to access other local files. |
| 4813 // FIXME 81578: The naming of this is confusing. Files with rest
ricted access to other local files | 4813 // FIXME 81578: The naming of this is confusing. Files with rest
ricted access to other local files |
| 4814 // still can have other privileges that can be remembered, there
by not making them unique origins. | 4814 // still can have other privileges that can be remembered, there
by not making them unique origins. |
| 4815 securityOrigin()->enforceFilePathSeparation(); | 4815 securityOrigin()->enforceFilePathSeparation(); |
| 4816 } | 4816 } |
| 4817 } | 4817 } |
| 4818 } | 4818 } |
| 4819 | 4819 |
| 4820 if (initializer.shouldTreatURLAsSrcdocDocument()) { | 4820 if (initializer.shouldTreatURLAsSrcdocDocument()) { |
| (...skipping 1066 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 5887 using namespace blink; | 5887 using namespace blink; |
| 5888 void showLiveDocumentInstances() | 5888 void showLiveDocumentInstances() |
| 5889 { | 5889 { |
| 5890 WeakDocumentSet& set = liveDocumentSet(); | 5890 WeakDocumentSet& set = liveDocumentSet(); |
| 5891 fprintf(stderr, "There are %u documents currently alive:\n", set.size()); | 5891 fprintf(stderr, "There are %u documents currently alive:\n", set.size()); |
| 5892 for (WeakDocumentSet::const_iterator it = set.begin(); it != set.end(); ++it
) { | 5892 for (WeakDocumentSet::const_iterator it = set.begin(); it != set.end(); ++it
) { |
| 5893 fprintf(stderr, "- Document %p URL: %s\n", *it, (*it)->url().string().ut
f8().data()); | 5893 fprintf(stderr, "- Document %p URL: %s\n", *it, (*it)->url().string().ut
f8().data()); |
| 5894 } | 5894 } |
| 5895 } | 5895 } |
| 5896 #endif | 5896 #endif |
| OLD | NEW |