freebsd-ports/www/webkit-gtk2/files/patch-add-gzip
Koop Mast 5b0e3bea54 Look in LOCALBASE for flex, so we don't pick up the version from base. [1]
Add networkreponce support from upstream. [2]
Add a patch from upstream, to use the gzip encoding support in libsoup 2.28.2.
However if a website still displays junk. This means that it usesing deflate
which is not working in libsoup right now (like cvsweb.freebsd.org) [2]

PR:	ports/141859 [1]
Submitted by:	Carlos A. M. dos Santos <unixmania@gmail.com>
Obtained from:	Webkit svn trunk.
2009-12-23 20:17:31 +00:00

35 lines
1.7 KiB
Text

Committed to webkit trunk. Use libsoup 2.28.2 gzip encoding.
http://trac.webkit.org/changeset/52208
diff --git a/WebCore/platform/network/soup/ResourceHandleSoup.cpp b/WebCore/platform/network/soup/ResourceHandleSoup.cpp
index 6367a3e..5a229b8 100644
--- WebCore/platform/network/soup/ResourceHandleSoup.cpp
+++ WebCore/platform/network/soup/ResourceHandleSoup.cpp
@@ -548,12 +548,6 @@ static bool startHttp(ResourceHandle* handle)
// balanced by a deref() in finishedCallback, which should always run
handle->ref();
- // FIXME: For now, we cannot accept content encoded in anything
- // other than identity, so force servers to do it our way. When
- // libsoup gets proper Content-Encoding support we will want to
- // use it here instead.
- soup_message_headers_replace(d->m_msg->request_headers, "Accept-Encoding", "identity");
-
// Balanced in ResourceHandleInternal's destructor; we need to
// keep our own ref, because after queueing the message, the
// session owns the initial reference.
diff --git a/WebKit/gtk/webkit/webkitprivate.cpp b/WebKit/gtk/webkit/webkitprivate.cpp
index c80160c..95a5717 100644
--- WebKit/gtk/webkit/webkitprivate.cpp
+++ WebKit/gtk/webkit/webkitprivate.cpp
@@ -280,6 +280,8 @@ void webkit_init()
SoupSessionFeature* sniffer = static_cast<SoupSessionFeature*>(g_object_new(SOUP_TYPE_CONTENT_SNIFFER, NULL));
soup_session_add_feature(session, sniffer);
g_object_unref(sniffer);
+
+ soup_session_add_feature_by_type(session, SOUP_TYPE_CONTENT_DECODER);
}
void webkit_white_list_access_from_origin(const gchar* sourceOrigin, const gchar* destinationProtocol, const gchar* destinationHost, bool allowDestinationSubdomains)