| Index: content/browser/frame_host/frame_tree_node.cc
|
| diff --git a/content/browser/frame_host/frame_tree_node.cc b/content/browser/frame_host/frame_tree_node.cc
|
| index 7ef7ca46df61e4cd3d93f61cad43c963a2c4f462..509da71c31ad57797f4ebf7ab3b47427c577c508 100644
|
| --- a/content/browser/frame_host/frame_tree_node.cc
|
| +++ b/content/browser/frame_host/frame_tree_node.cc
|
| @@ -98,7 +98,8 @@ FrameTreeNode::FrameTreeNode(
|
| name,
|
| unique_name,
|
| blink::WebSandboxFlags::None,
|
| - false /* should enforce strict mixed content checking */),
|
| + false /* should enforce strict mixed content checking */,
|
| + false /* is a potentially trustworthy unique origin */),
|
| pending_sandbox_flags_(blink::WebSandboxFlags::None),
|
| frame_owner_properties_(frame_owner_properties),
|
| loading_progress_(kLoadingProgressNotStarted) {
|
| @@ -241,6 +242,18 @@ void FrameTreeNode::SetEnforceStrictMixedContentChecking(bool should_enforce) {
|
| should_enforce;
|
| }
|
|
|
| +void FrameTreeNode::SetUniqueOriginPotentiallyTrustworthy(
|
| + bool is_unique_origin_potentially_trustworthy) {
|
| + if (replication_state_.is_potentially_trustworthy_unique_origin ==
|
| + is_unique_origin_potentially_trustworthy) {
|
| + return;
|
| + }
|
| + render_manager_.OnSetUniqueOriginPotentiallyTrustworthy(
|
| + is_unique_origin_potentially_trustworthy);
|
| + replication_state_.is_potentially_trustworthy_unique_origin =
|
| + is_unique_origin_potentially_trustworthy;
|
| +}
|
| +
|
| void FrameTreeNode::SetPendingSandboxFlags(
|
| blink::WebSandboxFlags sandbox_flags) {
|
| pending_sandbox_flags_ = sandbox_flags;
|
|
|