Index: third_party/WebKit/Source/bindings/core/v8/WindowProxy.cpp |
diff --git a/third_party/WebKit/Source/bindings/core/v8/WindowProxy.cpp b/third_party/WebKit/Source/bindings/core/v8/WindowProxy.cpp |
index 60c4b8c22aa4f2bbce52234533592ac149023994..19e62421b367c519d2529984dceeaa6eaf6462d0 100644 |
--- a/third_party/WebKit/Source/bindings/core/v8/WindowProxy.cpp |
+++ b/third_party/WebKit/Source/bindings/core/v8/WindowProxy.cpp |
@@ -257,7 +257,7 @@ bool WindowProxy::initialize() |
if (m_world->isMainWorld()) { |
// ActivityLogger for main world is updated within updateDocument(). |
updateDocument(); |
- origin = m_frame->securityContext()->securityOrigin(); |
+ origin = m_frame->securityContext()->getSecurityOrigin(); |
// FIXME: Can this be removed when CSP moves to browser? |
ContentSecurityPolicy* csp = m_frame->securityContext()->contentSecurityPolicy(); |
context->AllowCodeGenerationFromStrings(csp->allowEval(0, ContentSecurityPolicy::SuppressReport)); |
@@ -475,7 +475,7 @@ void WindowProxy::setSecurityToken(SecurityOrigin* origin) |
if (m_world->isPrivateScriptIsolatedWorld()) { |
token = "private-script://" + token; |
} else if (m_world->isIsolatedWorld()) { |
- SecurityOrigin* frameSecurityOrigin = m_frame->securityContext()->securityOrigin(); |
+ SecurityOrigin* frameSecurityOrigin = m_frame->securityContext()->getSecurityOrigin(); |
String frameSecurityToken = frameSecurityOrigin->toString(); |
// We need to check the return value of domainWasSetInDOM() on the |
// frame's SecurityOrigin because, if that's the case, only |
@@ -504,7 +504,7 @@ void WindowProxy::updateDocument() |
return; |
updateActivityLogger(); |
updateDocumentProperty(); |
- updateSecurityOrigin(m_frame->securityContext()->securityOrigin()); |
+ updateSecurityOrigin(m_frame->securityContext()->getSecurityOrigin()); |
} |
static v8::Local<v8::Value> getNamedProperty(HTMLDocument* htmlDocument, const AtomicString& key, v8::Local<v8::Object> creationContext, v8::Isolate* isolate) |