Index: third_party/WebKit/Source/core/dom/Document.cpp |
diff --git a/third_party/WebKit/Source/core/dom/Document.cpp b/third_party/WebKit/Source/core/dom/Document.cpp |
index f0573887629fc669ea47dfd44cdb3d1389c40f38..ea3606509e4dc01258270b1cab6cbd66b4756d31 100644 |
--- a/third_party/WebKit/Source/core/dom/Document.cpp |
+++ b/third_party/WebKit/Source/core/dom/Document.cpp |
@@ -5664,6 +5664,9 @@ bool Document::isSecureContext(String& errorMessage, const SecureContextCheck pr |
return false; |
} |
+ if (SecurityPolicy::shouldOriginBypassSecureContextCheck(*securityOrigin())) |
+ return true; |
+ |
robwu
2015/10/03 10:25:08
Putting this check here implies that the origin al
jww
2015/10/03 17:15:06
Yes, this is intentional because an origin should
robwu
2015/10/03 17:27:09
Yes, with the sandboxed frame being at the chrome-
jww
2015/10/03 17:56:59
I *think* that makes sense, although I'm still goi
robwu
2015/10/03 19:28:50
When I wrote my comment, I mistakenly assumed that
|
if (privilegeContextCheck == StandardSecureContextCheck) { |
Document* context = parentDocument(); |
while (context) { |