| Index: third_party/WebKit/Source/web/WebRemoteFrameImpl.cpp
|
| diff --git a/third_party/WebKit/Source/web/WebRemoteFrameImpl.cpp b/third_party/WebKit/Source/web/WebRemoteFrameImpl.cpp
|
| index bd52f819860ec4762c90a0713dedb1638348d38d..6c6530b623cfa766d5694d2c9316cd149fe692b1 100644
|
| --- a/third_party/WebKit/Source/web/WebRemoteFrameImpl.cpp
|
| +++ b/third_party/WebKit/Source/web/WebRemoteFrameImpl.cpp
|
| @@ -696,6 +696,14 @@ void WebRemoteFrameImpl::setReplicatedShouldEnforceStrictMixedContentChecking(bo
|
| frame()->securityContext()->setShouldEnforceStrictMixedContentChecking(shouldEnforce);
|
| }
|
|
|
| +void WebRemoteFrameImpl::setReplicatedPotentiallyTrustworthyUniqueOrigin(bool isUniqueOriginPotentiallyTrustworthy) const
|
| +{
|
| + ASSERT(frame());
|
| + // If |isUniqueOriginPotentiallyTrustworthy| is true, then the origin must be unique.
|
| + ASSERT(!isUniqueOriginPotentiallyTrustworthy || frame()->securityContext()->getSecurityOrigin()->isUnique());
|
| + frame()->securityContext()->getSecurityOrigin()->setUniqueOriginIsPotentiallyTrustworthy(isUniqueOriginPotentiallyTrustworthy);
|
| +}
|
| +
|
| void WebRemoteFrameImpl::DispatchLoadEventForFrameOwner() const
|
| {
|
| ASSERT(frame()->owner()->isLocal());
|
|
|