| Index: third_party/WebKit/Source/core/workers/WorkerGlobalScope.cpp
|
| diff --git a/third_party/WebKit/Source/core/workers/WorkerGlobalScope.cpp b/third_party/WebKit/Source/core/workers/WorkerGlobalScope.cpp
|
| index e7c4d2eefc61bdd6e01766cd0f2686a40dbb65d8..a1cb6435d97736717c1b2e35e939f40679962ebe 100644
|
| --- a/third_party/WebKit/Source/core/workers/WorkerGlobalScope.cpp
|
| +++ b/third_party/WebKit/Source/core/workers/WorkerGlobalScope.cpp
|
| @@ -359,12 +359,12 @@ void WorkerGlobalScope::exceptionHandled(int exceptionId, bool isHandled)
|
| addConsoleMessage(consoleMessage.release());
|
| }
|
|
|
| -bool WorkerGlobalScope::isPrivilegedContext(String& errorMessage, const PrivilegeContextCheck privilegeContextCheck) const
|
| +bool WorkerGlobalScope::isSecureContext(String& errorMessage, const SecureContextCheck privilegeContextCheck) const
|
| {
|
| // Until there are APIs that are available in workers and that
|
| // require a privileged context test that checks ancestors, just do
|
| // a simple check here. Once we have a need for a real
|
| - // |isPrivilegedContext| check here, we can check the responsible
|
| + // |isSecureContext| check here, we can check the responsible
|
| // document for a privileged context at worker creation time, pass
|
| // it in via WorkerThreadStartupData, and check it here.
|
| return securityOrigin()->isPotentiallyTrustworthy(errorMessage);
|
|
|