Chromium Code Reviews| Index: content/renderer/render_frame_impl.cc |
| diff --git a/content/renderer/render_frame_impl.cc b/content/renderer/render_frame_impl.cc |
| index 1ababbbe32c6b05884bfe936730cea01f86bd89b..0257039a662cf8a0b4703838420cfe32822bcb2c 100644 |
| --- a/content/renderer/render_frame_impl.cc |
| +++ b/content/renderer/render_frame_impl.cc |
| @@ -4772,6 +4772,13 @@ void RenderFrameImpl::SendDidCommitProvisionalLoad( |
| render_view_->SetZoomLevel(render_view_->page_zoom_level()); |
| } |
| + // Standard URLs must match the reported origin, when it is not unique. |
| + if (params.url.IsStandard() && !params.origin.unique() && |
| + render_view_->GetWebkitPreferences().web_security_enabled) { |
|
Charlie Reis
2016/07/15 20:33:17
Ah, good point. We'll need to skip the check for
nasko
2016/07/15 20:56:31
Such check added. However, all tests passed before
|
| + CHECK(params.origin.IsSameOriginWith(url::Origin(params.url))) |
| + << " url:" << params.url << " origin:" << params.origin; |
| + } |
| + |
| // This message needs to be sent before any of allowScripts(), |
| // allowImages(), allowPlugins() is called for the new page, so that when |
| // these functions send a ViewHostMsg_ContentBlocked message, it arrives |