| Index: third_party/WebKit/LayoutTests/http/tests/xmlhttprequest/xhr-to-blob-in-isolated-world.html | 
| diff --git a/third_party/WebKit/LayoutTests/http/tests/xmlhttprequest/xhr-to-blob-in-isolated-world.html b/third_party/WebKit/LayoutTests/http/tests/xmlhttprequest/xhr-to-blob-in-isolated-world.html | 
| index aac852c321174d7d978d06ab4400e4beb82db399..abcf0bada2b34e35677c81a52874a179d1aadadc 100644 | 
| --- a/third_party/WebKit/LayoutTests/http/tests/xmlhttprequest/xhr-to-blob-in-isolated-world.html | 
| +++ b/third_party/WebKit/LayoutTests/http/tests/xmlhttprequest/xhr-to-blob-in-isolated-world.html | 
| @@ -6,8 +6,16 @@ if (!window.testRunner) { | 
| document.body.appendChild(document.createTextNode("This test requires window.testRunner")); | 
| } else { | 
| testRunner.dumpAsText(); | 
| -    testRunner.setIsolatedWorldSecurityOrigin(1, "chrome-extension://123"); | 
| -    testRunner.evaluateScriptInIsolatedWorld(1, "var xhr = new XMLHttpRequest(); xhr.open('GET', 'blob:chrome-extension://123/456789', false); xhr.send();"); | 
| +    // We're using a fake HTTP URL instead of chrome-extension: URL which is | 
| +    // the most common use case of isolated world. This is because the | 
| +    // ResourceDispatcherHostImpl validates Origin headers received from a | 
| +    // renderer by consulting the ChildProcessSecurityPolicyImpl, and it | 
| +    // doesn't allow the chrome-extension scheme in the content_shell. Instead | 
| +    // of adding more test infrastructure for allowing the scheme, we chose to | 
| +    // use the safe HTTP scheme as it's sufficient for the purpose of this test | 
| +    // case. | 
| +    testRunner.setIsolatedWorldSecurityOrigin(1, "http://123"); | 
| +    testRunner.evaluateScriptInIsolatedWorld(1, "var xhr = new XMLHttpRequest(); xhr.open('GET', 'blob:http://123/456789', false); xhr.send();"); | 
| } | 
| </script> | 
| </body> | 
|  |