| Index: third_party/WebKit/Source/core/dom/ExecutionContext.cpp
|
| diff --git a/third_party/WebKit/Source/core/dom/ExecutionContext.cpp b/third_party/WebKit/Source/core/dom/ExecutionContext.cpp
|
| index bda769bdedcfb47109ea58a0043fe36e2dbbf6cc..26e13a778413adf8c4268ab974934f9a486d667b 100644
|
| --- a/third_party/WebKit/Source/core/dom/ExecutionContext.cpp
|
| +++ b/third_party/WebKit/Source/core/dom/ExecutionContext.cpp
|
| @@ -144,7 +144,7 @@ bool ExecutionContext::shouldSanitizeScriptError(const String& sourceURL, Access
|
| {
|
| if (corsStatus == OpaqueResource)
|
| return true;
|
| - return !(securityOrigin()->canRequestNoSuborigin(completeURL(sourceURL)) || corsStatus == SharableCrossOrigin);
|
| + return !(getSecurityOrigin()->canRequestNoSuborigin(completeURL(sourceURL)) || corsStatus == SharableCrossOrigin);
|
| }
|
|
|
| void ExecutionContext::reportException(PassRefPtrWillBeRawPtr<ErrorEvent> event, int scriptId, PassRefPtr<ScriptCallStack> callStack, AccessControlStatus corsStatus)
|
| @@ -213,9 +213,9 @@ PublicURLManager& ExecutionContext::publicURLManager()
|
| return *m_publicURLManager;
|
| }
|
|
|
| -SecurityOrigin* ExecutionContext::securityOrigin()
|
| +SecurityOrigin* ExecutionContext::getSecurityOrigin()
|
| {
|
| - return securityContext().securityOrigin();
|
| + return securityContext().getSecurityOrigin();
|
| }
|
|
|
| ContentSecurityPolicy* ExecutionContext::contentSecurityPolicy()
|
|
|