Diff
Modified: trunk/Source/WebKit2/ChangeLog (169175 => 169176)
--- trunk/Source/WebKit2/ChangeLog 2014-05-21 20:39:36 UTC (rev 169175)
+++ trunk/Source/WebKit2/ChangeLog 2014-05-21 20:52:21 UTC (rev 169176)
@@ -1,3 +1,33 @@
+2014-05-21 Oliver Hunt <[email protected]>
+
+ [iOS] Enable sandboxing for the database process
+ https://bugs.webkit.org/show_bug.cgi?id=132963
+
+ Reviewed by Alexey Proskuryakov.
+
+ Simply ensure that the database process is running in a tight
+ sandbox. As part of this i've separated out ChildProcessIOS
+ and ensures that the database process loads a custom sandbox.
+
+ * Configurations/WebKit.xcconfig:
+ * DatabaseProcess/ios/DatabaseProcessIOS.mm:
+ (WebKit::DatabaseProcess::initializeSandbox):
+ * DatabaseProcess/ios/com.apple.WebKit.DatabasesIOS.sb: Added.
+ * Shared/ios/ChildProcessIOS.mm: Added.
+ Essentially cloned from the Mac version, only all the OSX
+ specific logic has been stripped.
+ (WebKit::ChildProcess::setApplicationIsDaemon):
+ (WebKit::ChildProcess::platformInitialize):
+ (WebKit::ChildProcess::initializeSandbox):
+ (WebKit::ChildProcess::setQOS):
+ * Shared/mac/ChildProcessMac.mm:
+ Remove all the IOS ifdefs.
+ (WebKit::ChildProcess::setApplicationIsDaemon):
+ (WebKit::ChildProcess::platformInitialize):
+ (WebKit::ChildProcess::initializeSandbox):
+ (WebKit::ChildProcess::setQOS):
+ * WebKit2.xcodeproj/project.pbxproj:
+
2014-05-21 Andy Estes <[email protected]>
[iOS] Create a UIPrintFormatter for WKWebView
Modified: trunk/Source/WebKit2/Configurations/WebKit.xcconfig (169175 => 169176)
--- trunk/Source/WebKit2/Configurations/WebKit.xcconfig 2014-05-21 20:39:36 UTC (rev 169175)
+++ trunk/Source/WebKit2/Configurations/WebKit.xcconfig 2014-05-21 20:52:21 UTC (rev 169176)
@@ -43,7 +43,7 @@
OTHER_LDFLAGS_macosx = $(ASAN_OTHER_LDFLAGS) $(FRAMEWORK_AND_LIBRARY_LDFLAGS) -framework WebCore -sub_umbrella WebCore -framework WebKitLegacy -sub_umbrella WebKitLegacy;
EXCLUDED_SOURCE_FILE_NAMES = $(EXCLUDED_SOURCE_FILE_NAMES_$(PLATFORM_NAME));
-EXCLUDED_SOURCE_FILE_NAMES_iphoneos = *.pdf com.apple.WebKit.DatabaseProcess.sb com.apple.WebKit.NetworkProcess.sb com.apple.WebProcess.sb PlugInSandboxProfiles/*.sb;
+EXCLUDED_SOURCE_FILE_NAMES_iphoneos = *.pdf com.apple.WebKit.Databases.sb com.apple.WebKit.NetworkProcess.sb com.apple.WebProcess.sb PlugInSandboxProfiles/*.sb;
EXCLUDED_SOURCE_FILE_NAMES_iphonesimulator = $(EXCLUDED_SOURCE_FILE_NAMES_iphoneos);
INSTALLHDRS_SCRIPT_PHASE = YES;
Modified: trunk/Source/WebKit2/DatabaseProcess/ios/DatabaseProcessIOS.mm (169175 => 169176)
--- trunk/Source/WebKit2/DatabaseProcess/ios/DatabaseProcessIOS.mm 2014-05-21 20:39:36 UTC (rev 169175)
+++ trunk/Source/WebKit2/DatabaseProcess/ios/DatabaseProcessIOS.mm 2014-05-21 20:52:21 UTC (rev 169176)
@@ -30,12 +30,15 @@
#import "DatabaseProcess.h"
#import "SandboxInitializationParameters.h"
+#import <WebCore/FileSystem.h>
#import <WebCore/LocalizedStrings.h>
#import <WebCore/NotImplemented.h>
#import <WebKitSystemInterface.h>
using namespace WebCore;
+#define ENABLE_MANUAL_DATABASE_SANDBOXING 0
+
namespace WebKit {
void DatabaseProcess::initializeProcess(const ChildProcessInitializationParameters&)
@@ -48,7 +51,12 @@
void DatabaseProcess::initializeSandbox(const ChildProcessInitializationParameters& parameters, SandboxInitializationParameters& sandboxParameters)
{
- notImplemented();
+#if ENABLE_MANUAL_DATABASE_SANDBOXING
+ // Need to overide the default, because service has a different bundle ID.
+ NSBundle *webkit2Bundle = [NSBundle bundleForClass:NSClassFromString(@"WKView")];
+ sandboxParameters.setOverrideSandboxProfilePath([webkit2Bundle pathForResource:@"com.apple.WebKit.DatabasesIOS" ofType:@"sb"]);
+ ChildProcess::initializeSandbox(parameters, sandboxParameters);
+#endif
}
} // namespace WebKit
Added: trunk/Source/WebKit2/DatabaseProcess/ios/com.apple.WebKit.DatabasesIOS.sb (0 => 169176)
--- trunk/Source/WebKit2/DatabaseProcess/ios/com.apple.WebKit.DatabasesIOS.sb (rev 0)
+++ trunk/Source/WebKit2/DatabaseProcess/ios/com.apple.WebKit.DatabasesIOS.sb 2014-05-21 20:52:21 UTC (rev 169176)
@@ -0,0 +1,53 @@
+; Copyright (C) 2014 Apple Inc. All rights reserved.
+;
+; Redistribution and use in source and binary forms, with or without
+; modification, are permitted provided that the following conditions
+; are met:
+; 1. Redistributions of source code must retain the above copyright
+; notice, this list of conditions and the following disclaimer.
+; 2. Redistributions in binary form must reproduce the above copyright
+; notice, this list of conditions and the following disclaimer in the
+; documentation and/or other materials provided with the distribution.
+;
+; THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS''
+; AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
+; THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+; PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS
+; BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+; CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+; SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+; INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+; CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+; ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
+; THE POSSIBILITY OF SUCH DAMAGE.
+
+(version 1)
+(deny default (with partial-symbolication))
+(allow system-audit file-read-metadata)
+
+(import "common.sb")
+(import "removed-dev-nodes.sb")
+
+;; Sandbox extensions
+(define (apply-read-and-issue-extension op path-filter)
+ (op file-read* path-filter)
+ (op file-issue-extension (require-all (extension-class "com.apple.app-sandbox.read") path-filter)))
+(define (apply-write-and-issue-extension op path-filter)
+ (op file-write* path-filter)
+ (op file-issue-extension (require-all (extension-class "com.apple.app-sandbox.read-write") path-filter)))
+(define (read-only-and-issue-extensions path-filter)
+ (apply-read-and-issue-extension allow path-filter))
+(define (read-write-and-issue-extensions path-filter)
+ (apply-read-and-issue-extension allow path-filter)
+ (apply-write-and-issue-extension allow path-filter))
+(read-only-and-issue-extensions (extension "com.apple.app-sandbox.read"))
+(read-write-and-issue-extensions (extension "com.apple.app-sandbox.read-write"))
+
+;; FIXME: Should be removed once <rdar://problem/16329087> is fixed.
+(deny file-write-xattr (xattr "com.apple.quarantine") (with no-log))
+
+;; Reserve a namespace for additional protected extended attributes.
+(deny file-read-xattr file-write-xattr (xattr-regex #"^com\.apple\.security\.private\."))
+
+(if (defined? 'vnode-type)
+ (deny file-write-create (vnode-type SYMLINK)))
Added: trunk/Source/WebKit2/Shared/ios/ChildProcessIOS.mm (0 => 169176)
--- trunk/Source/WebKit2/Shared/ios/ChildProcessIOS.mm (rev 0)
+++ trunk/Source/WebKit2/Shared/ios/ChildProcessIOS.mm 2014-05-21 20:52:21 UTC (rev 169176)
@@ -0,0 +1,126 @@
+/*
+ * Copyright (C) 2012, 2014 Apple Inc. All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS''
+ * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
+ * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+ * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS
+ * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
+ * THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#import "config.h"
+
+#if PLATFORM(IOS)
+
+#import "ChildProcess.h"
+
+#import "SandboxInitializationParameters.h"
+#import "WebKitSystemInterface.h"
+#import <WebCore/FileSystem.h>
+#import <WebCore/SystemVersionMac.h>
+#import <mach/mach.h>
+#import <mach/task.h>
+#import <pwd.h>
+#import <stdlib.h>
+#import <sysexits.h>
+
+#ifndef ENABLE_MANUAL_SANDBOXING
+#define ENABLE_MANUAL_SANDBOXING 0
+#endif
+
+#if ENABLE_MANUAL_SANDBOXING
+
+// We have to #undef __APPLE_API_PRIVATE to prevent sandbox.h from looking for a header file that does not exist (<rdar://problem/9679211>).
+#undef __APPLE_API_PRIVATE
+#import <sandbox.h>
+
+#define SANDBOX_NAMED_EXTERNAL 0x0003
+extern "C" int sandbox_init_with_parameters(const char *profile, uint64_t flags, const char *const parameters[], char **errorbuf);
+
+#endif
+
+using namespace WebCore;
+
+namespace WebKit {
+
+void ChildProcess::setApplicationIsDaemon()
+{
+}
+
+void ChildProcess::platformInitialize()
+{
+ [[NSFileManager defaultManager] changeCurrentDirectoryPath:[[NSBundle mainBundle] bundlePath]];
+}
+
+void ChildProcess::initializeSandbox(const ChildProcessInitializationParameters& parameters, SandboxInitializationParameters& sandboxParameters)
+{
+#if ENABLE_MANUAL_SANDBOXING
+ NSBundle *webkit2Bundle = [NSBundle bundleForClass:NSClassFromString(@"WKView")];
+ String defaultProfilePath = [webkit2Bundle pathForResource:[[NSBundle mainBundle] bundleIdentifier] ofType:@"sb"];
+ if (sandboxParameters.systemDirectorySuffix().isNull()) {
+ String defaultSystemDirectorySuffix = String([[NSBundle mainBundle] bundleIdentifier]) + "+" + parameters.clientIdentifier;
+ sandboxParameters.setSystemDirectorySuffix(defaultSystemDirectorySuffix);
+ }
+
+ String sandboxImportPath = "/usr/local/share/sandbox/imports";
+ sandboxParameters.addPathParameter("IMPORT_DIR", fileSystemRepresentation(sandboxImportPath).data());
+
+ switch (sandboxParameters.mode()) {
+ case SandboxInitializationParameters::UseDefaultSandboxProfilePath:
+ case SandboxInitializationParameters::UseOverrideSandboxProfilePath: {
+ String sandboxProfilePath = sandboxParameters.mode() == SandboxInitializationParameters::UseDefaultSandboxProfilePath ? defaultProfilePath : sandboxParameters.overrideSandboxProfilePath();
+ if (!sandboxProfilePath.isEmpty()) {
+ CString profilePath = fileSystemRepresentation(sandboxProfilePath);
+ char* errorBuf;
+ if (sandbox_init_with_parameters(profilePath.data(), SANDBOX_NAMED_EXTERNAL, sandboxParameters.namedParameterArray(), &errorBuf)) {
+ WTFLogAlways("%s: Couldn't initialize sandbox profile [%s], error '%s'\n", getprogname(), profilePath.data(), errorBuf);
+ for (size_t i = 0, count = sandboxParameters.count(); i != count; ++i)
+ WTFLogAlways("%s=%s\n", sandboxParameters.name(i), sandboxParameters.value(i));
+ exit(EX_NOPERM);
+ }
+ }
+
+ break;
+ }
+ case SandboxInitializationParameters::UseSandboxProfile: {
+ char* errorBuf;
+ if (sandbox_init_with_parameters(sandboxParameters.sandboxProfile().utf8().data(), 0, sandboxParameters.namedParameterArray(), &errorBuf)) {
+ WTFLogAlways("%s: Couldn't initialize sandbox profile, error '%s'\n", getprogname(), errorBuf);
+ for (size_t i = 0, count = sandboxParameters.count(); i != count; ++i)
+ WTFLogAlways("%s=%s\n", sandboxParameters.name(i), sandboxParameters.value(i));
+ exit(EX_NOPERM);
+ }
+
+ break;
+ }
+ }
+#else
+ UNUSED_PARAM(parameters);
+ UNUSED_PARAM(sandboxParameters);
+ RELEASE_ASSERT_NOT_REACHED();
+#endif
+}
+
+void ChildProcess::setQOS(int, int)
+{
+
+}
+
+} // namespace WebKit
+
+#endif
Modified: trunk/Source/WebKit2/Shared/mac/ChildProcessMac.mm (169175 => 169176)
--- trunk/Source/WebKit2/Shared/mac/ChildProcessMac.mm 2014-05-21 20:39:36 UTC (rev 169175)
+++ trunk/Source/WebKit2/Shared/mac/ChildProcessMac.mm 2014-05-21 20:52:21 UTC (rev 169176)
@@ -24,6 +24,8 @@
*/
#import "config.h"
+
+#if PLATFORM(MAC)
#import "ChildProcess.h"
#import "SandboxInitializationParameters.h"
@@ -36,10 +38,6 @@
#import <stdlib.h>
#import <sysexits.h>
-#if PLATFORM(IOS)
-#import <WebCore/FloatingPointEnvironment.h>
-#endif
-
// We have to #undef __APPLE_API_PRIVATE to prevent sandbox.h from looking for a header file that does not exist (<rdar://problem/9679211>).
#undef __APPLE_API_PRIVATE
#import <sandbox.h>
@@ -53,7 +51,7 @@
#endif
#endif
-#if !PLATFORM(IOS) && __MAC_OS_X_VERSION_MIN_REQUIRED >= 1090
+#if __MAC_OS_X_VERSION_MIN_REQUIRED >= 1090
typedef bool (^LSServerConnectionAllowedBlock) ( CFDictionaryRef optionsRef );
extern "C" void _LSSetApplicationLaunchServicesServerConnectionStatus(uint64_t flags, LSServerConnectionAllowedBlock block);
extern "C" CFDictionaryRef _LSApplicationCheckIn(int sessionID, CFDictionaryRef applicationInfo);
@@ -65,7 +63,7 @@
namespace WebKit {
-#if !PLATFORM(IOS) && __MAC_OS_X_VERSION_MIN_REQUIRED >= 1090
+#if __MAC_OS_X_VERSION_MIN_REQUIRED >= 1090
static void initializeTimerCoalescingPolicy()
{
// Set task_latency and task_throughput QOS tiers as appropriate for a visible application.
@@ -77,7 +75,6 @@
void ChildProcess::setApplicationIsDaemon()
{
-#if !PLATFORM(IOS)
OSStatus error = SetApplicationIsDaemon(true);
ASSERT_UNUSED(error, error == noErr);
@@ -85,19 +82,13 @@
_LSSetApplicationLaunchServicesServerConnectionStatus(0, 0);
RetainPtr<CFDictionaryRef> unused = _LSApplicationCheckIn(-2, CFBundleGetInfoDictionary(CFBundleGetMainBundle()));
#endif
-#endif // !PLATFORM(IOS)
}
void ChildProcess::platformInitialize()
{
-#if !PLATFORM(IOS) && __MAC_OS_X_VERSION_MIN_REQUIRED >= 1090
+#if __MAC_OS_X_VERSION_MIN_REQUIRED >= 1090
initializeTimerCoalescingPolicy();
#endif
-#if PLATFORM(IOS)
- FloatingPointEnvironment& floatingPointEnvironment = FloatingPointEnvironment::shared();
- floatingPointEnvironment.enableDenormalSupport();
- floatingPointEnvironment.saveMainThreadEnvironment();
-#endif
[[NSFileManager defaultManager] changeCurrentDirectoryPath:[[NSBundle mainBundle] bundlePath]];
}
@@ -122,7 +113,7 @@
String osVersion = osVersionParts[0] + '.' + osVersionParts[1];
sandboxParameters.addParameter("_OS_VERSION", osVersion.utf8().data());
-#if !PLATFORM(IOS) && __MAC_OS_X_VERSION_MIN_REQUIRED >= 1080
+#if __MAC_OS_X_VERSION_MIN_REQUIRED >= 1080
// Use private temporary and cache directories.
setenv("DIRHELPER_USER_DIR_SUFFIX", fileSystemRepresentation(sandboxParameters.systemDirectorySuffix()).data(), 0);
char temporaryDirectory[PATH_MAX];
@@ -187,14 +178,12 @@
}
}
-#if !PLATFORM(IOS)
// This will override LSFileQuarantineEnabled from Info.plist unless sandbox quarantine is globally disabled.
OSStatus error = WKEnableSandboxStyleFileQuarantine();
if (error) {
WTFLogAlways("%s: Couldn't enable sandbox style file quarantine: %ld\n", getprogname(), (long)error);
exit(EX_NOPERM);
}
-#endif
}
#if USE(APPKIT)
@@ -210,7 +199,7 @@
void ChildProcess::setQOS(int latencyQOS, int throughputQOS)
{
-#if !PLATFORM(IOS) && __MAC_OS_X_VERSION_MIN_REQUIRED >= 1090
+#if __MAC_OS_X_VERSION_MIN_REQUIRED >= 1090
if (!latencyQOS && !throughputQOS)
return;
@@ -227,3 +216,5 @@
}
} // namespace WebKit
+
+#endif
Modified: trunk/Source/WebKit2/WebKit2.xcodeproj/project.pbxproj (169175 => 169176)
--- trunk/Source/WebKit2/WebKit2.xcodeproj/project.pbxproj 2014-05-21 20:39:36 UTC (rev 169175)
+++ trunk/Source/WebKit2/WebKit2.xcodeproj/project.pbxproj 2014-05-21 20:52:21 UTC (rev 169176)
@@ -1072,6 +1072,7 @@
A5EFD38C16B0E88C00B2F0E8 /* WKPageVisibilityTypes.h in Headers */ = {isa = PBXBuildFile; fileRef = A5EFD38B16B0E88C00B2F0E8 /* WKPageVisibilityTypes.h */; settings = {ATTRIBUTES = (Private, ); }; };
A7D792D61767CB6E00881CBE /* ActivityAssertion.cpp in Sources */ = {isa = PBXBuildFile; fileRef = A7D792D51767CB6E00881CBE /* ActivityAssertion.cpp */; };
A7D792D81767CCA300881CBE /* ActivityAssertion.h in Headers */ = {isa = PBXBuildFile; fileRef = A7D792D41767CB0900881CBE /* ActivityAssertion.h */; };
+ A7E93CED1925331100A1DC48 /* ChildProcessIOS.mm in Sources */ = {isa = PBXBuildFile; fileRef = A7E93CEB192531AA00A1DC48 /* ChildProcessIOS.mm */; };
B62E7310143047A60069EC35 /* WKHitTestResult.cpp in Sources */ = {isa = PBXBuildFile; fileRef = B62E730F143047A60069EC35 /* WKHitTestResult.cpp */; };
B62E7312143047B00069EC35 /* WKHitTestResult.h in Headers */ = {isa = PBXBuildFile; fileRef = B62E7311143047B00069EC35 /* WKHitTestResult.h */; settings = {ATTRIBUTES = (Private, ); }; };
B63403F914910D57001070B5 /* APIObject.cpp in Sources */ = {isa = PBXBuildFile; fileRef = B63403F814910D57001070B5 /* APIObject.cpp */; };
@@ -3071,6 +3072,8 @@
A72D5D7F1236CBA800A88B15 /* WebSerializedScriptValue.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = WebSerializedScriptValue.h; sourceTree = "<group>"; };
A7D792D41767CB0900881CBE /* ActivityAssertion.h */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.h; path = ActivityAssertion.h; sourceTree = "<group>"; };
A7D792D51767CB6E00881CBE /* ActivityAssertion.cpp */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.cpp.cpp; path = ActivityAssertion.cpp; sourceTree = "<group>"; };
+ A7E93CE9192527B600A1DC48 /* com.apple.WebKit.DatabasesIOS.sb */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text; path = com.apple.WebKit.DatabasesIOS.sb; sourceTree = "<group>"; };
+ A7E93CEB192531AA00A1DC48 /* ChildProcessIOS.mm */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.cpp.objcpp; name = ChildProcessIOS.mm; path = ios/ChildProcessIOS.mm; sourceTree = "<group>"; };
B396EA5512E0ED2D00F4FEB7 /* config.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = config.h; sourceTree = "<group>"; };
B62E730F143047A60069EC35 /* WKHitTestResult.cpp */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.cpp.cpp; path = WKHitTestResult.cpp; sourceTree = "<group>"; };
B62E7311143047B00069EC35 /* WKHitTestResult.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = WKHitTestResult.h; sourceTree = "<group>"; };
@@ -4655,6 +4658,7 @@
children = (
2DA9449D1884E4F000ED86DB /* GestureTypes.h */,
2DA944971884E4F000ED86DB /* NativeWebKeyboardEventIOS.mm */,
+ A7E93CEB192531AA00A1DC48 /* ChildProcessIOS.mm */,
2DA944981884E4F000ED86DB /* NativeWebTouchEventIOS.mm */,
A118A9EC1907AD6F00F7C92B /* QuickLookDocumentData.cpp */,
A118A9ED1907AD6F00F7C92B /* QuickLookDocumentData.h */,
@@ -6823,6 +6827,7 @@
isa = PBXGroup;
children = (
E1FEF39C190F791C00731658 /* DatabaseProcessIOS.mm */,
+ A7E93CE9192527B600A1DC48 /* com.apple.WebKit.DatabasesIOS.sb */,
);
path = ios;
sourceTree = "<group>";
@@ -8759,6 +8764,7 @@
1A1B0EB518A424950038481A /* WKNavigationResponse.mm in Sources */,
1A0EC907124C0AB8007EF4A5 /* PluginProcessConnection.cpp in Sources */,
1A0EC910124C0AF5007EF4A5 /* PluginProcessConnectionManager.cpp in Sources */,
+ A7E93CED1925331100A1DC48 /* ChildProcessIOS.mm in Sources */,
2DD13BD518F7DADD00E130A1 /* FindControllerIOS.mm in Sources */,
1A7865B916CAC71500ACE83A /* PluginProcessConnectionManagerMessageReceiver.cpp in Sources */,
1A2BB6D014117B4D000F35D4 /* PluginProcessConnectionMessageReceiver.cpp in Sources */,