| Index: content/browser/child_process_security_policy_impl.cc
|
| diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc
|
| index 3f8e21611f472071e90c51c4d5b21a0f3762dbd0..6ffe46f185e26edf01d8a76f65a08a62710d16f1 100644
|
| --- a/content/browser/child_process_security_policy_impl.cc
|
| +++ b/content/browser/child_process_security_policy_impl.cc
|
| @@ -241,7 +241,8 @@ class ChildProcessSecurityPolicyImpl::SecurityState {
|
| // compatibility with many sites. The similar --site-per-process flag only
|
| // blocks JavaScript access to cross-site cookies (in
|
| // CanAccessCookiesForOrigin).
|
| - const CommandLine& command_line = *CommandLine::ForCurrentProcess();
|
| + const base::CommandLine& command_line =
|
| + *base::CommandLine::ForCurrentProcess();
|
| if (!command_line.HasSwitch(switches::kEnableStrictSiteIsolation))
|
| return true;
|
|
|
| @@ -585,7 +586,8 @@ bool ChildProcessSecurityPolicyImpl::CanLoadPage(int child_id,
|
| ResourceType resource_type) {
|
| // If --site-per-process flag is passed, we should enforce
|
| // stronger security restrictions on page navigation.
|
| - if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kSitePerProcess) &&
|
| + if (base::CommandLine::ForCurrentProcess()->HasSwitch(
|
| + switches::kSitePerProcess) &&
|
| IsResourceTypeFrame(resource_type)) {
|
| // TODO(nasko): Do the proper check for site-per-process, once
|
| // out-of-process iframes is ready to go.
|
|
|