Title: [240032] trunk/Source
Revision
240032
Author
hironori.fu...@sony.com
Date
2019-01-15 22:40:30 -0800 (Tue, 15 Jan 2019)

Log Message

Unreviewed WinCairo build fix.

Source/WebCore:

* platform/network/curl/ResourceHandleCurl.cpp:
(WebCore::ResourceHandle::createCurlRequest):
(WebCore::ResourceHandle::didReceiveAuthenticationChallenge):
(WebCore::ResourceHandle::receivedCredential):
(WebCore::ResourceHandle::getCredential):

Source/WebKit:

* WebProcess/WebPage/WebPageInspectorTargetController.cpp:
(WebKit::WebPageInspectorTargetController::connectInspector): Use 'auto' instead of unprefixed InspectorTarget.
(WebKit::WebPageInspectorTargetController::disconnectInspector): Ditto.
(WebKit::WebPageInspectorTargetController::sendMessageToTargetBackend): Ditto.

Modified Paths

Diff

Modified: trunk/Source/WebCore/ChangeLog (240031 => 240032)


--- trunk/Source/WebCore/ChangeLog	2019-01-16 05:03:07 UTC (rev 240031)
+++ trunk/Source/WebCore/ChangeLog	2019-01-16 06:40:30 UTC (rev 240032)
@@ -1,3 +1,13 @@
+2019-01-15  Fujii Hironori  <hironori.fu...@sony.com>
+
+        Unreviewed WinCairo build fix.
+
+        * platform/network/curl/ResourceHandleCurl.cpp:
+        (WebCore::ResourceHandle::createCurlRequest):
+        (WebCore::ResourceHandle::didReceiveAuthenticationChallenge):
+        (WebCore::ResourceHandle::receivedCredential):
+        (WebCore::ResourceHandle::getCredential):
+
 2019-01-15  Alex Christensen  <achristen...@webkit.org>
 
         Reduce use of NetworkStorageSession::defaultStorageSession in WebCore

Modified: trunk/Source/WebCore/platform/network/curl/ResourceHandleCurl.cpp (240031 => 240032)


--- trunk/Source/WebCore/platform/network/curl/ResourceHandleCurl.cpp	2019-01-16 05:03:07 UTC (rev 240031)
+++ trunk/Source/WebCore/platform/network/curl/ResourceHandleCurl.cpp	2019-01-16 06:40:30 UTC (rev 240032)
@@ -145,7 +145,7 @@
     if (status == RequestStatus::NewRequest) {
         addCacheValidationHeaders(request);
 
-        auto& storageSession = *context()->storageSession(PAL::SessionID::defaultSessionID());
+        auto& storageSession = *context()->storageSession();
         auto& cookieJar = storageSession.cookieStorage();
         auto includeSecureCookies = request.url().protocolIs("https") ? IncludeSecureCookies::Yes : IncludeSecureCookies::No;
         String cookieHeaderField = cookieJar.cookieRequestHeaderFieldValue(storageSession, request.firstPartyForCookies(), SameSiteInfo::create(request), request.url(), WTF::nullopt, WTF::nullopt, includeSecureCookies).first;
@@ -231,7 +231,7 @@
         URL urlToStore;
         if (challenge.failureResponse().httpStatusCode() == 401)
             urlToStore = challenge.failureResponse().url();
-        context()->storageSession(PAL::SessionID::defaultSessionID())->credentialStorage().set(partition, credential, challenge.protectionSpace(), urlToStore);
+        context()->storageSession()->credentialStorage().set(partition, credential, challenge.protectionSpace(), urlToStore);
 
         restartRequestWithCredential(challenge.protectionSpace(), credential);
 
@@ -246,16 +246,16 @@
             // The stored credential wasn't accepted, stop using it.
             // There is a race condition here, since a different credential might have already been stored by another ResourceHandle,
             // but the observable effect should be very minor, if any.
-            context()->storageSession(PAL::SessionID::defaultSessionID())->credentialStorage().remove(partition, challenge.protectionSpace());
+            context()->storageSession()->credentialStorage().remove(partition, challenge.protectionSpace());
         }
 
         if (!challenge.previousFailureCount()) {
-            Credential credential = context()->storageSession(PAL::SessionID::defaultSessionID())->credentialStorage().get(partition, challenge.protectionSpace());
+            Credential credential = context()->storageSession()->credentialStorage().get(partition, challenge.protectionSpace());
             if (!credential.isEmpty() && credential != d->m_initialCredential) {
                 ASSERT(credential.persistence() == CredentialPersistenceNone);
                 if (challenge.failureResponse().httpStatusCode() == 401) {
                     // Store the credential back, possibly adding it as a default for this directory.
-                    context()->storageSession(PAL::SessionID::defaultSessionID())->credentialStorage().set(partition, credential, challenge.protectionSpace(), challenge.failureResponse().url());
+                    context()->storageSession()->credentialStorage().set(partition, credential, challenge.protectionSpace(), challenge.failureResponse().url());
                 }
 
                 restartRequestWithCredential(challenge.protectionSpace(), credential);
@@ -289,7 +289,7 @@
     if (shouldUseCredentialStorage()) {
         if (challenge.failureResponse().httpStatusCode() == 401) {
             URL urlToStore = challenge.failureResponse().url();
-            context()->storageSession(PAL::SessionID::defaultSessionID())->credentialStorage().set(partition, credential, challenge.protectionSpace(), urlToStore);
+            context()->storageSession()->credentialStorage().set(partition, credential, challenge.protectionSpace(), urlToStore);
         }
     }
 
@@ -346,13 +346,13 @@
         if (credential.isEmpty()) {
             // <rdar://problem/7174050> - For URLs that match the paths of those previously challenged for HTTP Basic authentication, 
             // try and reuse the credential preemptively, as allowed by RFC 2617.
-            d->m_initialCredential = context()->storageSession(PAL::SessionID::defaultSessionID())->credentialStorage().get(partition, request.url());
+            d->m_initialCredential = context()->storageSession()->credentialStorage().get(partition, request.url());
         } else if (!redirect) {
             // If there is already a protection space known for the URL, update stored credentials
             // before sending a request. This makes it possible to implement logout by sending an
             // XMLHttpRequest with known incorrect credentials, and aborting it immediately (so that
             // an authentication dialog doesn't pop up).
-            context()->storageSession(PAL::SessionID::defaultSessionID())->credentialStorage().set(partition, credential, request.url());
+            context()->storageSession()->credentialStorage().set(partition, credential, request.url());
         }
     }
 

Modified: trunk/Source/WebKit/ChangeLog (240031 => 240032)


--- trunk/Source/WebKit/ChangeLog	2019-01-16 05:03:07 UTC (rev 240031)
+++ trunk/Source/WebKit/ChangeLog	2019-01-16 06:40:30 UTC (rev 240032)
@@ -1,3 +1,12 @@
+2019-01-15  Fujii Hironori  <hironori.fu...@sony.com>
+
+        Unreviewed WinCairo build fix.
+
+        * WebProcess/WebPage/WebPageInspectorTargetController.cpp:
+        (WebKit::WebPageInspectorTargetController::connectInspector): Use 'auto' instead of unprefixed InspectorTarget.
+        (WebKit::WebPageInspectorTargetController::disconnectInspector): Ditto.
+        (WebKit::WebPageInspectorTargetController::sendMessageToTargetBackend): Ditto.
+
 2019-01-15  Alex Christensen  <achristen...@webkit.org>
 
         Reduce use of NetworkStorageSession::defaultStorageSession in WebCore

Modified: trunk/Source/WebKit/WebProcess/WebPage/WebPageInspectorTargetController.cpp (240031 => 240032)


--- trunk/Source/WebKit/WebProcess/WebPage/WebPageInspectorTargetController.cpp	2019-01-16 05:03:07 UTC (rev 240031)
+++ trunk/Source/WebKit/WebProcess/WebPage/WebPageInspectorTargetController.cpp	2019-01-16 06:40:30 UTC (rev 240032)
@@ -63,7 +63,7 @@
 
 void WebPageInspectorTargetController::connectInspector(const String& targetId, Inspector::FrontendChannel::ConnectionType connectionType)
 {
-    InspectorTarget* target = m_targets.get(targetId);
+    auto target = m_targets.get(targetId);
     if (!target)
         return;
 
@@ -78,7 +78,7 @@
 
 void WebPageInspectorTargetController::disconnectInspector(const String& targetId)
 {
-    InspectorTarget* target = m_targets.get(targetId);
+    auto target = m_targets.get(targetId);
     if (!target)
         return;
 
@@ -91,7 +91,7 @@
 
 void WebPageInspectorTargetController::sendMessageToTargetBackend(const String& targetId, const String& message)
 {
-    InspectorTarget* target = m_targets.get(targetId);
+    auto target = m_targets.get(targetId);
     if (!target)
         return;
 
_______________________________________________
webkit-changes mailing list
webkit-changes@lists.webkit.org
https://lists.webkit.org/mailman/listinfo/webkit-changes

Reply via email to