| Index: content/child/blink_platform_impl_unittest.cc
|
| diff --git a/content/child/blink_platform_impl_unittest.cc b/content/child/blink_platform_impl_unittest.cc
|
| index 28f7dfbfd27fea2d99b98b3806f1e14ff8a58c7f..97140e8eecaf0aa35f90799a6aeb7b30e91f0b5a 100644
|
| --- a/content/child/blink_platform_impl_unittest.cc
|
| +++ b/content/child/blink_platform_impl_unittest.cc
|
| @@ -21,8 +21,10 @@ void CheckCastedOriginsAlreadyNormalized(
|
| url::Origin::UnsafelyCreateOriginWithoutNormalization(
|
| origin.protocol().utf8(), origin.host().utf8(),
|
| origin.effectivePort());
|
| - url::Origin non_checked_origin = url::Origin::CreateFromNormalizedTuple(
|
| - origin.protocol().utf8(), origin.host().utf8(), origin.effectivePort());
|
| + url::Origin non_checked_origin =
|
| + url::Origin::CreateFromNormalizedTupleWithSuborigin(
|
| + origin.protocol().utf8(), origin.host().utf8(),
|
| + origin.effectivePort(), origin.suborigin().utf8());
|
| EXPECT_EQ(checked_origin.scheme(), non_checked_origin.scheme());
|
| EXPECT_EQ(checked_origin.host(), non_checked_origin.host());
|
| EXPECT_EQ(checked_origin.port(), non_checked_origin.port());
|
| @@ -144,7 +146,7 @@ TEST(BlinkPlatformTest, CastWebSecurityOrigin) {
|
| }
|
|
|
| // This test ensures that WebSecurityOrigins can safely use
|
| -// url::Origin::CreateFromNormalizedTuple when doing conversions.
|
| +// url::Origin::CreateFromNormalizedTupleWithSuborigin when doing conversions.
|
| TEST(BlinkPlatformTest, WebSecurityOriginNormalization) {
|
| struct TestCases {
|
| const char* url;
|
|
|