Index: chrome/browser/loader/chrome_resource_dispatcher_host_delegate.cc |
diff --git a/chrome/browser/loader/chrome_resource_dispatcher_host_delegate.cc b/chrome/browser/loader/chrome_resource_dispatcher_host_delegate.cc |
index cde562989399e1a5cbb13dff2ccda27a1e7e7b20..a2f943e4c801cb410424d447e87c0e70912f6476 100644 |
--- a/chrome/browser/loader/chrome_resource_dispatcher_host_delegate.cc |
+++ b/chrome/browser/loader/chrome_resource_dispatcher_host_delegate.cc |
@@ -242,12 +242,16 @@ void LaunchURL( |
// If the URL is in whitelist, we launch it without asking the user and |
// without any additional security checks. Since the URL is whitelisted, |
// we assume it can be executed. |
+ // TODO(davidsac): External protocol handling needs to be |
+ // fixed for OOPIFs. See https://crbug.com/668289. |
if (is_whitelisted) { |
ExternalProtocolHandler::LaunchUrlWithoutSecurityCheck( |
- url, render_process_id, web_contents->GetRoutingID()); |
+ url, render_process_id, |
+ web_contents->GetRenderViewHost()->GetRoutingID()); |
} else { |
ExternalProtocolHandler::LaunchUrlWithDelegate( |
- url, render_process_id, web_contents->GetRoutingID(), page_transition, |
+ url, render_process_id, |
+ web_contents->GetRenderViewHost()->GetRoutingID(), page_transition, |
has_user_gesture, g_external_protocol_handler_delegate); |
} |
} |