| Index: content/renderer/render_frame_impl.cc
|
| diff --git a/content/renderer/render_frame_impl.cc b/content/renderer/render_frame_impl.cc
|
| index 15debe08d42f079668b8ce8611a0b4961d34cff4..ce268773717db9bfb059dcb6c77c2c381e47c06c 100644
|
| --- a/content/renderer/render_frame_impl.cc
|
| +++ b/content/renderer/render_frame_impl.cc
|
| @@ -2732,6 +2732,12 @@ void RenderFrameImpl::didEnforceStrictMixedContentChecking() {
|
| Send(new FrameHostMsg_EnforceStrictMixedContentChecking(routing_id_));
|
| }
|
|
|
| +void RenderFrameImpl::didUpdateToUniqueOrigin(
|
| + bool is_potentially_trustworthy_unique_origin) {
|
| + Send(new FrameHostMsg_UpdateToUniqueOrigin(
|
| + routing_id_, is_potentially_trustworthy_unique_origin));
|
| +}
|
| +
|
| void RenderFrameImpl::didChangeSandboxFlags(blink::WebFrame* child_frame,
|
| blink::WebSandboxFlags flags) {
|
| Send(new FrameHostMsg_DidChangeSandboxFlags(
|
| @@ -4417,6 +4423,10 @@ void RenderFrameImpl::SendDidCommitProvisionalLoad(
|
| params.should_enforce_strict_mixed_content_checking =
|
| frame->shouldEnforceStrictMixedContentChecking();
|
|
|
| + params.has_potentially_trustworthy_unique_origin =
|
| + frame->document().getSecurityOrigin().isUnique() &&
|
| + frame->document().getSecurityOrigin().isPotentiallyTrustworthy();
|
| +
|
| // Set the URL to be displayed in the browser UI to the user.
|
| params.url = GetLoadingUrl();
|
| DCHECK(!is_swapped_out_ || params.url == GURL(kSwappedOutURL));
|
|
|