Modified: trunk/Source/WebCore/platform/network/curl/ResourceHandleCurl.cpp (240031 => 240032)
--- trunk/Source/WebCore/platform/network/curl/ResourceHandleCurl.cpp 2019-01-16 05:03:07 UTC (rev 240031)
+++ trunk/Source/WebCore/platform/network/curl/ResourceHandleCurl.cpp 2019-01-16 06:40:30 UTC (rev 240032)
@@ -145,7 +145,7 @@
if (status == RequestStatus::NewRequest) {
addCacheValidationHeaders(request);
- auto& storageSession = *context()->storageSession(PAL::SessionID::defaultSessionID());
+ auto& storageSession = *context()->storageSession();
auto& cookieJar = storageSession.cookieStorage();
auto includeSecureCookies = request.url().protocolIs("https") ? IncludeSecureCookies::Yes : IncludeSecureCookies::No;
String cookieHeaderField = cookieJar.cookieRequestHeaderFieldValue(storageSession, request.firstPartyForCookies(), SameSiteInfo::create(request), request.url(), WTF::nullopt, WTF::nullopt, includeSecureCookies).first;
@@ -231,7 +231,7 @@
URL urlToStore;
if (challenge.failureResponse().httpStatusCode() == 401)
urlToStore = challenge.failureResponse().url();
- context()->storageSession(PAL::SessionID::defaultSessionID())->credentialStorage().set(partition, credential, challenge.protectionSpace(), urlToStore);
+ context()->storageSession()->credentialStorage().set(partition, credential, challenge.protectionSpace(), urlToStore);
restartRequestWithCredential(challenge.protectionSpace(), credential);
@@ -246,16 +246,16 @@
// The stored credential wasn't accepted, stop using it.
// There is a race condition here, since a different credential might have already been stored by another ResourceHandle,
// but the observable effect should be very minor, if any.
- context()->storageSession(PAL::SessionID::defaultSessionID())->credentialStorage().remove(partition, challenge.protectionSpace());
+ context()->storageSession()->credentialStorage().remove(partition, challenge.protectionSpace());
}
if (!challenge.previousFailureCount()) {
- Credential credential = context()->storageSession(PAL::SessionID::defaultSessionID())->credentialStorage().get(partition, challenge.protectionSpace());
+ Credential credential = context()->storageSession()->credentialStorage().get(partition, challenge.protectionSpace());
if (!credential.isEmpty() && credential != d->m_initialCredential) {
ASSERT(credential.persistence() == CredentialPersistenceNone);
if (challenge.failureResponse().httpStatusCode() == 401) {
// Store the credential back, possibly adding it as a default for this directory.
- context()->storageSession(PAL::SessionID::defaultSessionID())->credentialStorage().set(partition, credential, challenge.protectionSpace(), challenge.failureResponse().url());
+ context()->storageSession()->credentialStorage().set(partition, credential, challenge.protectionSpace(), challenge.failureResponse().url());
}
restartRequestWithCredential(challenge.protectionSpace(), credential);
@@ -289,7 +289,7 @@
if (shouldUseCredentialStorage()) {
if (challenge.failureResponse().httpStatusCode() == 401) {
URL urlToStore = challenge.failureResponse().url();
- context()->storageSession(PAL::SessionID::defaultSessionID())->credentialStorage().set(partition, credential, challenge.protectionSpace(), urlToStore);
+ context()->storageSession()->credentialStorage().set(partition, credential, challenge.protectionSpace(), urlToStore);
}
}
@@ -346,13 +346,13 @@
if (credential.isEmpty()) {
// <rdar://problem/7174050> - For URLs that match the paths of those previously challenged for HTTP Basic authentication,
// try and reuse the credential preemptively, as allowed by RFC 2617.
- d->m_initialCredential = context()->storageSession(PAL::SessionID::defaultSessionID())->credentialStorage().get(partition, request.url());
+ d->m_initialCredential = context()->storageSession()->credentialStorage().get(partition, request.url());
} else if (!redirect) {
// If there is already a protection space known for the URL, update stored credentials
// before sending a request. This makes it possible to implement logout by sending an
// XMLHttpRequest with known incorrect credentials, and aborting it immediately (so that
// an authentication dialog doesn't pop up).
- context()->storageSession(PAL::SessionID::defaultSessionID())->credentialStorage().set(partition, credential, request.url());
+ context()->storageSession()->credentialStorage().set(partition, credential, request.url());
}
}
Modified: trunk/Source/WebKit/WebProcess/WebPage/WebPageInspectorTargetController.cpp (240031 => 240032)
--- trunk/Source/WebKit/WebProcess/WebPage/WebPageInspectorTargetController.cpp 2019-01-16 05:03:07 UTC (rev 240031)
+++ trunk/Source/WebKit/WebProcess/WebPage/WebPageInspectorTargetController.cpp 2019-01-16 06:40:30 UTC (rev 240032)
@@ -63,7 +63,7 @@
void WebPageInspectorTargetController::connectInspector(const String& targetId, Inspector::FrontendChannel::ConnectionType connectionType)
{
- InspectorTarget* target = m_targets.get(targetId);
+ auto target = m_targets.get(targetId);
if (!target)
return;
@@ -78,7 +78,7 @@
void WebPageInspectorTargetController::disconnectInspector(const String& targetId)
{
- InspectorTarget* target = m_targets.get(targetId);
+ auto target = m_targets.get(targetId);
if (!target)
return;
@@ -91,7 +91,7 @@
void WebPageInspectorTargetController::sendMessageToTargetBackend(const String& targetId, const String& message)
{
- InspectorTarget* target = m_targets.get(targetId);
+ auto target = m_targets.get(targetId);
if (!target)
return;