Index: third_party/WebKit/Source/core/workers/WorkerGlobalScope.cpp |
diff --git a/third_party/WebKit/Source/core/workers/WorkerGlobalScope.cpp b/third_party/WebKit/Source/core/workers/WorkerGlobalScope.cpp |
index e7c4d2eefc61bdd6e01766cd0f2686a40dbb65d8..a1cb6435d97736717c1b2e35e939f40679962ebe 100644 |
--- a/third_party/WebKit/Source/core/workers/WorkerGlobalScope.cpp |
+++ b/third_party/WebKit/Source/core/workers/WorkerGlobalScope.cpp |
@@ -359,12 +359,12 @@ void WorkerGlobalScope::exceptionHandled(int exceptionId, bool isHandled) |
addConsoleMessage(consoleMessage.release()); |
} |
-bool WorkerGlobalScope::isPrivilegedContext(String& errorMessage, const PrivilegeContextCheck privilegeContextCheck) const |
+bool WorkerGlobalScope::isSecureContext(String& errorMessage, const SecureContextCheck privilegeContextCheck) const |
{ |
// Until there are APIs that are available in workers and that |
// require a privileged context test that checks ancestors, just do |
// a simple check here. Once we have a need for a real |
- // |isPrivilegedContext| check here, we can check the responsible |
+ // |isSecureContext| check here, we can check the responsible |
// document for a privileged context at worker creation time, pass |
// it in via WorkerThreadStartupData, and check it here. |
return securityOrigin()->isPotentiallyTrustworthy(errorMessage); |