Index: third_party/WebKit/Source/core/frame/DOMWindow.cpp |
diff --git a/third_party/WebKit/Source/core/frame/DOMWindow.cpp b/third_party/WebKit/Source/core/frame/DOMWindow.cpp |
index 831460a2baca733a3cd921b9204c230d89fc9d23..0507b7d1252c0ce4a0802558acecedf63a0be698 100644 |
--- a/third_party/WebKit/Source/core/frame/DOMWindow.cpp |
+++ b/third_party/WebKit/Source/core/frame/DOMWindow.cpp |
@@ -137,9 +137,10 @@ bool DOMWindow::isInsecureScriptAccess(LocalDOMWindow& callingWindow, |
// FIXME: The name canAccess seems to be a roundabout way to ask "can |
// execute script". Can we name the SecurityOrigin function better to make |
// this more clear? |
- if (callingWindow.document()->getSecurityOrigin()->canAccessCheckSuborigins( |
- frame()->securityContext()->getSecurityOrigin())) |
+ if (callingWindow.document()->getSecurityOrigin()->canAccess( |
+ frame()->securityContext()->getSecurityOrigin())) { |
return false; |
+ } |
} |
callingWindow.printErrorMessage( |
@@ -270,8 +271,7 @@ String DOMWindow::crossDomainAccessErrorMessage( |
// It's possible for a remote frame to be same origin with respect to a |
// local frame, but it must still be treated as a disallowed cross-domain |
// access. See https://crbug.com/601629. |
- ASSERT(frame()->isRemoteFrame() || |
- !activeOrigin->canAccessCheckSuborigins(targetOrigin)); |
+ DCHECK(frame()->isRemoteFrame() || !activeOrigin->canAccess(targetOrigin)); |
String message = "Blocked a frame with origin \"" + activeOrigin->toString() + |
"\" from accessing a frame with origin \"" + |