Index: third_party/WebKit/Source/core/dom/DocumentInit.cpp |
diff --git a/third_party/WebKit/Source/core/dom/DocumentInit.cpp b/third_party/WebKit/Source/core/dom/DocumentInit.cpp |
index df71028100069e2471b3b152f2cad66d4a932f10..6a8c79eaf283ef8f83ed812faf53b2704e7a6be7 100644 |
--- a/third_party/WebKit/Source/core/dom/DocumentInit.cpp |
+++ b/third_party/WebKit/Source/core/dom/DocumentInit.cpp |
@@ -98,11 +98,10 @@ SandboxFlags DocumentInit::getSandboxFlags() const |
FrameLoader* loader = &frameForSecurityContext()->loader(); |
SandboxFlags flags = loader->effectiveSandboxFlags(); |
- // If the load was blocked by X-Frame-Options or CSP, force the Document's |
- // origin to be unique, so that the blocked document appears to be a normal |
- // cross-origin document's load per CSP spec: |
+ // If the load was blocked by CSP, force the Document's origin to be unique, so that |
+ // the blocked document appears to be a normal cross-origin document's load per CSP spec: |
// https://www.w3.org/TR/CSP2/#directive-frame-ancestors |
- if (loader->documentLoader() && loader->documentLoader()->wasBlockedAfterXFrameOptionsOrCSP()) |
+ if (loader->documentLoader() && loader->documentLoader()->wasBlockedAfterCSP()) |
flags |= SandboxOrigin; |
return flags; |