Index: chrome/renderer/content_settings_observer.cc |
diff --git a/chrome/renderer/content_settings_observer.cc b/chrome/renderer/content_settings_observer.cc |
index 8bf046741d65ffa0b06a4183bd22d5d53de35c2c..ac80ba79c89cbe1cc78e7b7ae7cec6e8143e5bc8 100644 |
--- a/chrome/renderer/content_settings_observer.cc |
+++ b/chrome/renderer/content_settings_observer.cc |
@@ -483,7 +483,7 @@ bool ContentSettingsObserver::allowRunningInsecureContent( |
SendInsecureContentSignal(INSECURE_CONTENT_RUN_SWF); |
if (!allow_running_insecure_content_ && !allowed_per_settings) { |
- DidBlockContentType(CONTENT_SETTINGS_TYPE_MIXEDSCRIPT, origin.host()); |
+ DidBlockContentType(CONTENT_SETTINGS_TYPE_MIXEDSCRIPT, origin.toString()); |
sky
2016/06/16 16:22:47
I'm not familiar with this code, so why is toStrin
estark
2016/06/16 16:56:58
The browser-side IPC handler expects |details| to
sky
2016/06/16 17:42:49
Can DidBlockContentType take a GURL then? Also, it
estark
2016/06/16 18:29:23
Ah, that's a good point. It appears that this coul
Jialiu Lin
2016/06/16 20:47:17
Here is the CL originally introduced this rappor m
|
return false; |
} |