Index: content/renderer/render_frame_impl.cc |
diff --git a/content/renderer/render_frame_impl.cc b/content/renderer/render_frame_impl.cc |
index f67a40a2a53ed746c35dccead80b3d1f505057bb..0a1c3568eeb2022e3612c542841d8abd51374ba2 100644 |
--- a/content/renderer/render_frame_impl.cc |
+++ b/content/renderer/render_frame_impl.cc |
@@ -4150,34 +4150,6 @@ WebNavigationPolicy RenderFrameImpl::DecidePolicyForNavigation( |
bool is_content_initiated = |
document_state->navigation_state()->IsContentInitiated(); |
- // Experimental: |
- // If --enable-strict-site-isolation is enabled, send all top-level |
- // navigations to the browser to let it swap processes when crossing site |
- // boundaries. This is currently expected to break some script calls and |
- // navigations, such as form submissions. |
- bool force_swap_due_to_flag = |
- command_line.HasSwitch(switches::kEnableStrictSiteIsolation); |
- if (force_swap_due_to_flag && |
- !info.frame->parent() && (is_content_initiated || info.isRedirect)) { |
- WebString origin_str = info.frame->document().securityOrigin().toString(); |
- GURL frame_url(origin_str.utf8().data()); |
- // TODO(cevans): revisit whether this site check is still necessary once |
- // crbug.com/101395 is fixed. |
- bool same_domain_or_host = |
- net::registry_controlled_domains::SameDomainOrHost( |
- frame_url, |
- url, |
- net::registry_controlled_domains::INCLUDE_PRIVATE_REGISTRIES); |
- // Only keep same-site (domain + scheme) and data URLs in the same process. |
- bool is_same_site = |
- (same_domain_or_host && frame_url.scheme() == url.scheme()) || |
- url.SchemeIs(url::kDataScheme); |
- if (!is_same_site) { |
- OpenURL(info.frame, url, referrer, info.defaultPolicy); |
- return blink::WebNavigationPolicyIgnore; |
- } |
- } |
- |
// If the browser is interested, then give it a chance to look at the request. |
if (is_content_initiated) { |
bool is_form_post = |