Index: content/common/cross_site_document_classifier.cc |
diff --git a/content/common/cross_site_document_classifier.cc b/content/common/cross_site_document_classifier.cc |
index cc87c08d4b0b4e3da3307ebe3a1822582cda9455..7e2522e4f35ed32145fd7b497a0f1ea30f8c7b99 100644 |
--- a/content/common/cross_site_document_classifier.cc |
+++ b/content/common/cross_site_document_classifier.cc |
@@ -82,9 +82,9 @@ bool CrossSiteDocumentClassifier::IsBlockableScheme(const GURL& url) { |
return url.SchemeIs(url::kHttpScheme) || url.SchemeIs(url::kHttpsScheme); |
} |
-bool CrossSiteDocumentClassifier::IsSameSite(const GURL& frame_origin, |
+bool CrossSiteDocumentClassifier::IsSameSite(const url::Origin& frame_origin, |
const GURL& response_url) { |
- if (!frame_origin.is_valid() || !response_url.is_valid()) |
+ if (frame_origin.unique() || !response_url.is_valid()) |
return false; |
if (frame_origin.scheme() != response_url.scheme()) |
@@ -93,7 +93,7 @@ bool CrossSiteDocumentClassifier::IsSameSite(const GURL& frame_origin, |
// SameDomainOrHost() extracts the effective domains (public suffix plus one) |
// from the two URLs and compare them. |
return net::registry_controlled_domains::SameDomainOrHost( |
- frame_origin, response_url, |
+ response_url, frame_origin, |
net::registry_controlled_domains::INCLUDE_PRIVATE_REGISTRIES); |
} |
@@ -102,7 +102,7 @@ bool CrossSiteDocumentClassifier::IsSameSite(const GURL& frame_origin, |
// when frame is sub.a.com and it is not allowed to access a document |
// with sub1.a.com. But under Site Isolation, it's allowed. |
bool CrossSiteDocumentClassifier::IsValidCorsHeaderSet( |
- const GURL& frame_origin, |
+ const url::Origin& frame_origin, |
const GURL& website_origin, |
const std::string& access_control_origin) { |
// Many websites are sending back "\"*\"" instead of "*". This is |