Index: third_party/WebKit/Source/core/dom/ExecutionContext.cpp |
diff --git a/third_party/WebKit/Source/core/dom/ExecutionContext.cpp b/third_party/WebKit/Source/core/dom/ExecutionContext.cpp |
index bda769bdedcfb47109ea58a0043fe36e2dbbf6cc..26e13a778413adf8c4268ab974934f9a486d667b 100644 |
--- a/third_party/WebKit/Source/core/dom/ExecutionContext.cpp |
+++ b/third_party/WebKit/Source/core/dom/ExecutionContext.cpp |
@@ -144,7 +144,7 @@ bool ExecutionContext::shouldSanitizeScriptError(const String& sourceURL, Access |
{ |
if (corsStatus == OpaqueResource) |
return true; |
- return !(securityOrigin()->canRequestNoSuborigin(completeURL(sourceURL)) || corsStatus == SharableCrossOrigin); |
+ return !(getSecurityOrigin()->canRequestNoSuborigin(completeURL(sourceURL)) || corsStatus == SharableCrossOrigin); |
} |
void ExecutionContext::reportException(PassRefPtrWillBeRawPtr<ErrorEvent> event, int scriptId, PassRefPtr<ScriptCallStack> callStack, AccessControlStatus corsStatus) |
@@ -213,9 +213,9 @@ PublicURLManager& ExecutionContext::publicURLManager() |
return *m_publicURLManager; |
} |
-SecurityOrigin* ExecutionContext::securityOrigin() |
+SecurityOrigin* ExecutionContext::getSecurityOrigin() |
{ |
- return securityContext().securityOrigin(); |
+ return securityContext().getSecurityOrigin(); |
} |
ContentSecurityPolicy* ExecutionContext::contentSecurityPolicy() |