Index: third_party/WebKit/Source/platform/weborigin/SecurityOrigin.cpp |
diff --git a/third_party/WebKit/Source/platform/weborigin/SecurityOrigin.cpp b/third_party/WebKit/Source/platform/weborigin/SecurityOrigin.cpp |
index 3883806fc08832c0cb79487ac847578726bfe9f5..c60fbfa5deb92b721ba3b806345bbe3f6a7f8a7f 100644 |
--- a/third_party/WebKit/Source/platform/weborigin/SecurityOrigin.cpp |
+++ b/third_party/WebKit/Source/platform/weborigin/SecurityOrigin.cpp |
@@ -56,7 +56,9 @@ static SecurityOrigin* getOriginFromMap(const KURL& url) { |
} |
bool SecurityOrigin::shouldUseInnerURL(const KURL& url) { |
- // FIXME: Blob URLs don't have inner URLs. Their form is "blob:<inner-origin>/<UUID>", so treating the part after "blob:" as a URL is incorrect. |
+ // FIXME: Blob URLs don't have inner URLs. Their form is |
+ // "blob:<inner-origin>/<UUID>", so treating the part after "blob:" as a URL |
+ // is incorrect. |
if (url.protocolIs("blob")) |
return true; |
if (url.protocolIs("filesystem")) |
@@ -223,7 +225,8 @@ bool SecurityOrigin::canAccess(const SecurityOrigin* other) const { |
if (isUnique() || other->isUnique()) |
return false; |
- // document.domain handling, as per https://html.spec.whatwg.org/multipage/browsers.html#dom-document-domain: |
+ // document.domain handling, as per |
+ // https://html.spec.whatwg.org/multipage/browsers.html#dom-document-domain: |
// |
// 1) Neither document has set document.domain. In this case, we insist |
// that the scheme, host, and port of the URLs match. |