Add networkreponce support from upstream. [2] Add a patch from upstream, to use the gzip encoding support in libsoup 2.28.2. However if a website still displays junk. This means that it usesing deflate which is not working in libsoup right now (like cvsweb.freebsd.org) [2] PR: ports/141859 [1] Submitted by: Carlos A. M. dos Santos <unixmania@gmail.com> Obtained from: Webkit svn trunk.
35 lines
1.7 KiB
Text
35 lines
1.7 KiB
Text
Committed to webkit trunk. Use libsoup 2.28.2 gzip encoding.
|
|
http://trac.webkit.org/changeset/52208
|
|
|
|
diff --git a/WebCore/platform/network/soup/ResourceHandleSoup.cpp b/WebCore/platform/network/soup/ResourceHandleSoup.cpp
|
|
index 6367a3e..5a229b8 100644
|
|
--- WebCore/platform/network/soup/ResourceHandleSoup.cpp
|
|
+++ WebCore/platform/network/soup/ResourceHandleSoup.cpp
|
|
@@ -548,12 +548,6 @@ static bool startHttp(ResourceHandle* handle)
|
|
// balanced by a deref() in finishedCallback, which should always run
|
|
handle->ref();
|
|
|
|
- // FIXME: For now, we cannot accept content encoded in anything
|
|
- // other than identity, so force servers to do it our way. When
|
|
- // libsoup gets proper Content-Encoding support we will want to
|
|
- // use it here instead.
|
|
- soup_message_headers_replace(d->m_msg->request_headers, "Accept-Encoding", "identity");
|
|
-
|
|
// Balanced in ResourceHandleInternal's destructor; we need to
|
|
// keep our own ref, because after queueing the message, the
|
|
// session owns the initial reference.
|
|
|
|
diff --git a/WebKit/gtk/webkit/webkitprivate.cpp b/WebKit/gtk/webkit/webkitprivate.cpp
|
|
index c80160c..95a5717 100644
|
|
--- WebKit/gtk/webkit/webkitprivate.cpp
|
|
+++ WebKit/gtk/webkit/webkitprivate.cpp
|
|
@@ -280,6 +280,8 @@ void webkit_init()
|
|
SoupSessionFeature* sniffer = static_cast<SoupSessionFeature*>(g_object_new(SOUP_TYPE_CONTENT_SNIFFER, NULL));
|
|
soup_session_add_feature(session, sniffer);
|
|
g_object_unref(sniffer);
|
|
+
|
|
+ soup_session_add_feature_by_type(session, SOUP_TYPE_CONTENT_DECODER);
|
|
}
|
|
|
|
void webkit_white_list_access_from_origin(const gchar* sourceOrigin, const gchar* destinationProtocol, const gchar* destinationHost, bool allowDestinationSubdomains)
|
|
|