Index: content/renderer/render_view_browsertest.cc |
diff --git a/content/renderer/render_view_browsertest.cc b/content/renderer/render_view_browsertest.cc |
index be020d4c0faff2ee32c4420d8ac46ff24f973ec0..a47e73dfdb4ae0edb2a1e236f7916065d51c5940 100644 |
--- a/content/renderer/render_view_browsertest.cc |
+++ b/content/renderer/render_view_browsertest.cc |
@@ -178,7 +178,7 @@ FrameReplicationState ReconstructReplicationStateForTesting( |
result.sandbox_flags = frame->effectiveSandboxFlags(); |
// result.should_enforce_strict_mixed_content_checking is calculated in the |
// browser... |
- result.origin = frame->securityOrigin(); |
+ result.origin = frame->getSecurityOrigin(); |
return result; |
} |
@@ -932,7 +932,8 @@ TEST_F(RenderViewImplTest, OriginReplicationForSwapOut) { |
EXPECT_TRUE(web_frame->firstChild()->isWebRemoteFrame()); |
// Expect the origin to be updated properly. |
- blink::WebSecurityOrigin origin = web_frame->firstChild()->securityOrigin(); |
+ blink::WebSecurityOrigin origin = |
+ web_frame->firstChild()->getSecurityOrigin(); |
EXPECT_EQ(origin.toString(), |
WebString::fromUTF8(replication_state.origin.Serialize())); |
@@ -943,7 +944,7 @@ TEST_F(RenderViewImplTest, OriginReplicationForSwapOut) { |
RenderFrame::FromWebFrame(web_frame->lastChild())); |
child_frame2->SwapOut(kProxyRoutingId + 1, true, replication_state); |
EXPECT_TRUE(web_frame->lastChild()->isWebRemoteFrame()); |
- EXPECT_TRUE(web_frame->lastChild()->securityOrigin().isUnique()); |
+ EXPECT_TRUE(web_frame->lastChild()->getSecurityOrigin().isUnique()); |
} |
// Test for https://crbug.com/568676, where a parent detaches a remote child |