/external/chromium_org/third_party/WebKit/Source/core/workers/ |
H A D | AbstractWorker.cpp | 54 KURL scriptURL = executionContext()->completeURL(url); local 55 if (!scriptURL.isValid()) { 61 if (!executionContext()->securityOrigin()->canRequest(scriptURL)) { 62 exceptionState.throwSecurityError("Script at '" + scriptURL.elidedString() + "' cannot be accessed from origin '" + executionContext()->securityOrigin()->toString() + "'."); 66 if (executionContext()->contentSecurityPolicy() && !executionContext()->contentSecurityPolicy()->allowWorkerContextFromSource(scriptURL)) { 67 exceptionState.throwSecurityError("Access to the script at '" + scriptURL.elidedString() + "' is denied by the document's Content Security Policy."); 71 return scriptURL;
|
H A D | WorkerThreadStartupData.cpp | 38 WorkerThreadStartupData::WorkerThreadStartupData(const KURL& scriptURL, const String& userAgent, const String& sourceCode, WorkerThreadStartMode startMode, const String& contentSecurityPolicy, ContentSecurityPolicyHeaderType contentSecurityPolicyType, PassOwnPtrWillBeRawPtr<WorkerClients> workerClients) argument 39 : m_scriptURL(scriptURL.copy())
|
H A D | SharedWorker.cpp | 80 KURL scriptURL = worker->resolveURL(url, exceptionState); local 81 if (scriptURL.isEmpty()) 85 document->frame()->loader().client()->sharedWorkerRepositoryClient()->connect(worker.get(), remotePort.release(), scriptURL, name, exceptionState);
|
H A D | WorkerThreadStartupData.h | 50 static PassOwnPtrWillBeRawPtr<WorkerThreadStartupData> create(const KURL& scriptURL, const String& userAgent, const String& sourceCode, WorkerThreadStartMode startMode, const String& contentSecurityPolicy, ContentSecurityPolicyHeaderType contentSecurityPolicyType, PassOwnPtrWillBeRawPtr<WorkerClients> workerClients) argument 52 return adoptPtrWillBeNoop(new WorkerThreadStartupData(scriptURL, userAgent, sourceCode, startMode, contentSecurityPolicy, contentSecurityPolicyType, workerClients)); 68 WorkerThreadStartupData(const KURL& scriptURL, const String& userAgent, const String& sourceCode, WorkerThreadStartMode, const String& contentSecurityPolicy, ContentSecurityPolicyHeaderType contentSecurityPolicyType, PassOwnPtrWillBeRawPtr<WorkerClients>);
|
H A D | Worker.cpp | 68 KURL scriptURL = worker->resolveURL(url, exceptionState); local 69 if (scriptURL.isEmpty()) 73 worker->m_scriptLoader->loadAsynchronously(*context, scriptURL, DenyCrossOriginRequests, worker.get());
|
H A D | WorkerMessagingProxy.cpp | 110 void WorkerMessagingProxy::startWorkerGlobalScope(const KURL& scriptURL, const String& userAgent, const String& sourceCode, WorkerThreadStartMode startMode) argument 120 OwnPtrWillBeRawPtr<WorkerThreadStartupData> startupData = WorkerThreadStartupData::create(scriptURL, userAgent, sourceCode, startMode, document->contentSecurityPolicy()->deprecatedHeader(), document->contentSecurityPolicy()->deprecatedHeaderType(), m_workerClients.release()); 126 m_workerInspectorProxy->workerThreadCreated(m_executionContext.get(), m_workerThread.get(), scriptURL);
|
H A D | WorkerThread.cpp | 248 KURL scriptURL = m_startupData->m_scriptURL; local 283 script->evaluate(ScriptSourceCode(sourceCode, scriptURL));
|
/external/chromium_org/third_party/WebKit/public/web/ |
H A D | WebEmbeddedWorkerStartData.h | 56 WebURL scriptURL; member in struct:blink::WebEmbeddedWorkerStartData
|
H A D | WebPermissionClient.h | 70 virtual bool allowScriptFromSource(bool enabledPerSettings, const WebURL& scriptURL) { return enabledPerSettings; } argument
|
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/bindings/ |
H A D | CompilerScriptMapping.js | 244 var scriptURL = WebInspector.ParsedURL.completeURL(script.target().resourceTreeModel.inspectedPageURL(), script.sourceURL); variable 245 if (!scriptURL) { 249 var sourceMapURL = WebInspector.ParsedURL.completeURL(scriptURL, script.sourceMapURL); 270 WebInspector.SourceMap.load(sourceMapURL, scriptURL, sourceMapLoaded.bind(this));
|
/external/chromium_org/content/shell/renderer/test_runner/ |
H A D | web_permissions.cc | 41 const blink::WebURL& scriptURL) { 46 NormalizeLayoutTestURL(scriptURL.spec()) + "): " + 40 allowScriptFromSource(bool enabled_per_settings, const blink::WebURL& scriptURL) argument
|
/external/chromium_org/third_party/WebKit/Source/modules/serviceworkers/ |
H A D | ServiceWorker.cpp | 115 String ServiceWorker::scriptURL() const function in class:blink::ServiceWorker
|
H A D | ServiceWorkerContainer.cpp | 131 KURL scriptURL = executionContext->completeURL(url); local 132 scriptURL.removeFragmentIdentifier(); 133 if (!documentOrigin->canRequest(scriptURL)) { 138 m_provider->registerServiceWorker(patternURL, scriptURL, new CallbackPromiseAdapter<ServiceWorkerRegistration, ServiceWorkerError>(resolver));
|
H A D | ServiceWorkerContainerTest.cpp | 134 virtual void registerServiceWorker(const WebURL& pattern, const WebURL& scriptURL, WebServiceWorkerRegistrationCallbacks* callbacks) OVERRIDE 172 void testRegisterRejected(const String& scriptURL, const String& scope, const ScriptValueTest& valueTest) argument 182 ScriptPromise promise = container->registerServiceWorker(scriptState(), scriptURL, *options); 280 virtual void registerServiceWorker(const WebURL& pattern, const WebURL& scriptURL, WebServiceWorkerRegistrationCallbacks* callbacks) OVERRIDE 284 m_owner.m_registerScriptURL = scriptURL;
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
H A D | ScriptLoader.cpp | 246 KURL scriptURL = (!elementDocument.isInDocumentWrite() && m_parserInserted) ? elementDocument.url() : KURL(); local 247 executeScript(ScriptSourceCode(scriptContent(), scriptURL, position));
|
/external/chromium_org/third_party/WebKit/Source/web/ |
H A D | WebEmbeddedWorkerImpl.cpp | 83 void load(ExecutionContext* loadingContext, const KURL& scriptURL, const Closure& callback) argument 89 *loadingContext, scriptURL, DenyCrossOriginRequests, this); 309 webFrame->frame()->loader().load(FrameLoadRequest(0, ResourceRequest(m_workerStartData.scriptURL), SubstituteData(buffer, "text/html", "UTF-8", KURL()))); 366 m_workerStartData.scriptURL, 409 KURL scriptURL = m_mainScriptLoader->url(); local 412 scriptURL, 427 m_workerInspectorProxy->workerThreadCreated(document, m_workerThread.get(), scriptURL);
|
H A D | WebSharedWorkerImpl.cpp | 89 void load(ExecutionContext* loadingContext, const KURL& scriptURL, const Closure& receiveResponseCallback, const Closure& finishCallback) argument 96 *loadingContext, scriptURL, DenyCrossOriginRequests, this);
|
H A D | FrameLoaderClientImpl.cpp | 187 bool FrameLoaderClientImpl::allowScriptFromSource(bool enabledPerSettings, const KURL& scriptURL) argument 190 return m_webFrame->permissionClient()->allowScriptFromSource(enabledPerSettings, scriptURL);
|
/external/chromium_org/third_party/WebKit/Source/core/inspector/ |
H A D | InspectorDebuggerAgent.cpp | 488 PassRefPtrWillBeRawPtr<JavaScriptCallFrame> InspectorDebuggerAgent::topCallFrameSkipUnknownSources(String* scriptURL, bool* isBlackboxed) argument 497 *scriptURL = scriptSourceURL(it->value); 499 || (m_cachedSkipStackRegExp && !scriptURL->isEmpty() && m_cachedSkipStackRegExp->match(*scriptURL) != -1); 1351 String scriptURL = hasSourceURL ? script.sourceURL : script.url; local 1358 m_frontend->scriptParsed(scriptId, scriptURL, script.startLine, script.startColumn, script.endLine, script.endColumn, isContentScript, sourceMapURLParam, hasSourceURLParam); 1360 m_frontend->scriptFailedToParse(scriptId, scriptURL, script.startLine, script.startColumn, script.endLine, script.endColumn, isContentScript, sourceMapURLParam, hasSourceURLParam); 1364 if (scriptURL.isEmpty() || hasSyntaxError) 1378 if (!matches(scriptURL, url, isRegex))
|