Index: content/browser/site_per_process_browsertest.cc |
diff --git a/content/browser/site_per_process_browsertest.cc b/content/browser/site_per_process_browsertest.cc |
index 363449128d96f727f66a995f5c5064134256b2b5..92068e91cd604427c9b26d6e0fd5124edbcd333a 100644 |
--- a/content/browser/site_per_process_browsertest.cc |
+++ b/content/browser/site_per_process_browsertest.cc |
@@ -10283,7 +10283,7 @@ IN_PROC_BROWSER_TEST_F(SitePerProcessFeaturePolicyBrowserTest, |
const ParsedFeaturePolicyHeader initial_effective_policy = |
root->child_at(2)->effective_container_policy(); |
EXPECT_EQ(1UL, initial_effective_policy[0].origins.size()); |
- EXPECT_FALSE(initial_effective_policy[0].origins[0].unique()); |
+ EXPECT_FALSE(initial_effective_policy[0].origins[0].opaque()); |
// Set the "sandbox" attribute; pending policy should update, and should now |
// contain a unique origin, but effective policy should remain unchanged. |
@@ -10294,16 +10294,16 @@ IN_PROC_BROWSER_TEST_F(SitePerProcessFeaturePolicyBrowserTest, |
const ParsedFeaturePolicyHeader updated_pending_policy = |
root->child_at(2)->pending_container_policy_; |
EXPECT_EQ(1UL, updated_effective_policy[0].origins.size()); |
- EXPECT_FALSE(updated_effective_policy[0].origins[0].unique()); |
+ EXPECT_FALSE(updated_effective_policy[0].origins[0].opaque()); |
EXPECT_EQ(1UL, updated_pending_policy[0].origins.size()); |
- EXPECT_TRUE(updated_pending_policy[0].origins[0].unique()); |
+ EXPECT_TRUE(updated_pending_policy[0].origins[0].opaque()); |
// Navigate the frame; pending policy should now be committed. |
NavigateFrameToURL(root->child_at(2), nav_url); |
const ParsedFeaturePolicyHeader final_effective_policy = |
root->child_at(2)->effective_container_policy(); |
EXPECT_EQ(1UL, final_effective_policy[0].origins.size()); |
- EXPECT_TRUE(final_effective_policy[0].origins[0].unique()); |
+ EXPECT_TRUE(final_effective_policy[0].origins[0].opaque()); |
} |
// Test harness that allows for "barrier" style delaying of requests matching |