| Index: content/renderer/render_view_impl.cc
|
| diff --git a/content/renderer/render_view_impl.cc b/content/renderer/render_view_impl.cc
|
| index 79f0cd1810837155153170aab399c95e442256a1..3f21403e359259cfde64d065611d1f2f69344044 100644
|
| --- a/content/renderer/render_view_impl.cc
|
| +++ b/content/renderer/render_view_impl.cc
|
| @@ -1413,29 +1413,7 @@ WebView* RenderViewImpl::CreateView(WebLocalFrame* creator,
|
| if (frame_name != "_blank")
|
| params->frame_name = frame_name.Utf8(
|
| WebString::UTF8ConversionMode::kStrictReplacingErrorsWithFFFD);
|
| - params->opener_url = creator->GetDocument().Url();
|
|
|
| - // The browser process uses the top frame's URL for a content settings check
|
| - // to determine whether the popup is allowed. If the top frame is remote,
|
| - // its URL is not available, so use its replicated origin instead.
|
| - //
|
| - // TODO(alexmos): This works fine for regular origins but may break path
|
| - // matching for file URLs with OOP subframes that open popups. This should
|
| - // be fixed by either moving this lookup to the browser process or removing
|
| - // path-based matching for file URLs from content settings. See
|
| - // https://crbug.com/466297.
|
| - if (creator->Top()->IsWebLocalFrame()) {
|
| - params->opener_top_level_frame_url = creator->Top()->GetDocument().Url();
|
| - } else {
|
| - params->opener_top_level_frame_url =
|
| - url::Origin(creator->Top()->GetSecurityOrigin()).GetURL();
|
| - }
|
| -
|
| - GURL security_url(
|
| - url::Origin(creator->GetDocument().GetSecurityOrigin()).GetURL());
|
| - if (!security_url.is_valid())
|
| - security_url = GURL();
|
| - params->opener_security_origin = security_url;
|
| params->opener_suppressed = suppress_opener;
|
| params->disposition = NavigationPolicyToDisposition(policy);
|
| if (!request.IsNull()) {
|
|
|