Chromium Code Reviews| Index: third_party/WebKit/Source/core/dom/Document.cpp |
| diff --git a/third_party/WebKit/Source/core/dom/Document.cpp b/third_party/WebKit/Source/core/dom/Document.cpp |
| index f0573887629fc669ea47dfd44cdb3d1389c40f38..ea3606509e4dc01258270b1cab6cbd66b4756d31 100644 |
| --- a/third_party/WebKit/Source/core/dom/Document.cpp |
| +++ b/third_party/WebKit/Source/core/dom/Document.cpp |
| @@ -5664,6 +5664,9 @@ bool Document::isSecureContext(String& errorMessage, const SecureContextCheck pr |
| return false; |
| } |
| + if (SecurityPolicy::shouldOriginBypassSecureContextCheck(*securityOrigin())) |
| + return true; |
| + |
|
robwu
2015/10/03 10:25:08
Putting this check here implies that the origin al
jww
2015/10/03 17:15:06
Yes, this is intentional because an origin should
robwu
2015/10/03 17:27:09
Yes, with the sandboxed frame being at the chrome-
jww
2015/10/03 17:56:59
I *think* that makes sense, although I'm still goi
robwu
2015/10/03 19:28:50
When I wrote my comment, I mistakenly assumed that
|
| if (privilegeContextCheck == StandardSecureContextCheck) { |
| Document* context = parentDocument(); |
| while (context) { |