| Index: chrome/renderer/chrome_render_view_observer.cc
|
| diff --git a/chrome/renderer/chrome_render_view_observer.cc b/chrome/renderer/chrome_render_view_observer.cc
|
| index 36fe553d6022982efb4936d3e2ff1125dc2a8885..feee9616994e105e212076ef27dc0d802e0323de 100644
|
| --- a/chrome/renderer/chrome_render_view_observer.cc
|
| +++ b/chrome/renderer/chrome_render_view_observer.cc
|
| @@ -429,8 +429,10 @@ bool ChromeRenderViewObserver::allowStorage(WebFrame* frame, bool local) {
|
| bool ChromeRenderViewObserver::allowReadFromClipboard(WebFrame* frame,
|
| bool default_value) {
|
| bool allowed = false;
|
| + // TODO(dcheng): Should we consider a toURL() method on WebSecurityOrigin?
|
| Send(new ChromeViewHostMsg_CanTriggerClipboardRead(
|
| - routing_id(), frame->document().url(), &allowed));
|
| + routing_id(), GURL(frame->document().securityOrigin().toString().utf8()),
|
| + &allowed));
|
| return allowed;
|
| }
|
|
|
| @@ -438,7 +440,8 @@ bool ChromeRenderViewObserver::allowWriteToClipboard(WebFrame* frame,
|
| bool default_value) {
|
| bool allowed = false;
|
| Send(new ChromeViewHostMsg_CanTriggerClipboardWrite(
|
| - routing_id(), frame->document().url(), &allowed));
|
| + routing_id(), GURL(frame->document().securityOrigin().toString().utf8()),
|
| + &allowed));
|
| return allowed;
|
| }
|
|
|
|
|