| Index: extensions/browser/extension_web_contents_observer.cc
|
| diff --git a/extensions/browser/extension_web_contents_observer.cc b/extensions/browser/extension_web_contents_observer.cc
|
| index 0364f078e897aaf6e19a64c1fbb7e7b6f1225a7f..3fd73182f4fd5dc57b0d9fea5b67d53bc80e6145 100644
|
| --- a/extensions/browser/extension_web_contents_observer.cc
|
| +++ b/extensions/browser/extension_web_contents_observer.cc
|
| @@ -226,10 +226,9 @@ const Extension* ExtensionWebContentsObserver::GetExtensionFromFrame(
|
| const url::Origin& origin(render_frame_host->GetLastCommittedOrigin());
|
| // Without site isolation, this check is needed to eliminate non-extension
|
| // schemes. With site isolation, this is still needed to exclude sandboxed
|
| - // extension frames with a unique origin.
|
| - if (origin.unique() ||
|
| - site_url != content::SiteInstance::GetSiteForURL(browser_context,
|
| - origin.GetURL()))
|
| + // extension frames with an opaque origin.
|
| + if (origin.opaque() || site_url != content::SiteInstance::GetSiteForURL(
|
| + browser_context, origin.GetURL()))
|
| return nullptr;
|
| }
|
|
|
|
|