Index: third_party/WebKit/Source/core/html/HTMLFrameElementBase.cpp |
diff --git a/third_party/WebKit/Source/core/html/HTMLFrameElementBase.cpp b/third_party/WebKit/Source/core/html/HTMLFrameElementBase.cpp |
index 783f9c4301f10f37660fe7c80f60c71f3432b3e1..e4220b0b5b1494729f2daa86f1eb9b9e50c45ba1 100644 |
--- a/third_party/WebKit/Source/core/html/HTMLFrameElementBase.cpp |
+++ b/third_party/WebKit/Source/core/html/HTMLFrameElementBase.cpp |
@@ -57,7 +57,7 @@ bool HTMLFrameElementBase::isURLAllowed() const { |
const KURL& completeURL = document().completeURL(m_URL); |
- if (contentFrame() && protocolIsJavaScript(completeURL)) { |
+ if (contentFrame() && completeURL.protocolIsJavaScript()) { |
// Check if the caller can execute script in the context of the content |
// frame. NB: This check can be invoked without any JS on the stack for some |
// parser operations. In such case, we use the origin of the frame element's |
@@ -93,7 +93,7 @@ void HTMLFrameElementBase::openURL(bool replaceCurrentItem) { |
// Support for <frame src="javascript:string"> |
KURL scriptURL; |
KURL url = document().completeURL(m_URL); |
- if (protocolIsJavaScript(m_URL)) { |
+ if (url.protocolIsJavaScript()) { |
// We'll set/execute |scriptURL| iff CSP allows us to execute inline |
// JavaScript. If CSP blocks inline JavaScript, then exit early if |
// we're trying to execute script in an existing document. If we're |