| Index: third_party/WebKit/Source/core/dom/DocumentInit.cpp
|
| diff --git a/third_party/WebKit/Source/core/dom/DocumentInit.cpp b/third_party/WebKit/Source/core/dom/DocumentInit.cpp
|
| index df71028100069e2471b3b152f2cad66d4a932f10..6a8c79eaf283ef8f83ed812faf53b2704e7a6be7 100644
|
| --- a/third_party/WebKit/Source/core/dom/DocumentInit.cpp
|
| +++ b/third_party/WebKit/Source/core/dom/DocumentInit.cpp
|
| @@ -98,11 +98,10 @@ SandboxFlags DocumentInit::getSandboxFlags() const
|
| FrameLoader* loader = &frameForSecurityContext()->loader();
|
| SandboxFlags flags = loader->effectiveSandboxFlags();
|
|
|
| - // If the load was blocked by X-Frame-Options or CSP, force the Document's
|
| - // origin to be unique, so that the blocked document appears to be a normal
|
| - // cross-origin document's load per CSP spec:
|
| + // If the load was blocked by CSP, force the Document's origin to be unique, so that
|
| + // the blocked document appears to be a normal cross-origin document's load per CSP spec:
|
| // https://www.w3.org/TR/CSP2/#directive-frame-ancestors
|
| - if (loader->documentLoader() && loader->documentLoader()->wasBlockedAfterXFrameOptionsOrCSP())
|
| + if (loader->documentLoader() && loader->documentLoader()->wasBlockedAfterCSP())
|
| flags |= SandboxOrigin;
|
|
|
| return flags;
|
|
|