Index: third_party/WebKit/Source/core/loader/FrameLoader.cpp |
diff --git a/third_party/WebKit/Source/core/loader/FrameLoader.cpp b/third_party/WebKit/Source/core/loader/FrameLoader.cpp |
index c1c682d307eeb3b3702af5394873188c034fe27b..9f1fb8f9711f8afa4a2a051a96cd71da65e5d01f 100644 |
--- a/third_party/WebKit/Source/core/loader/FrameLoader.cpp |
+++ b/third_party/WebKit/Source/core/loader/FrameLoader.cpp |
@@ -1371,10 +1371,7 @@ bool FrameLoader::shouldContinueForNavigationPolicy(const ResourceRequest& reque |
Frame* parentFrame = m_frame->tree().parent(); |
if (parentFrame) { |
ContentSecurityPolicy* parentPolicy = parentFrame->securityContext()->contentSecurityPolicy(); |
- ContentSecurityPolicy::RedirectStatus redirectStatus = request.followedRedirect() |
- ? ContentSecurityPolicy::DidRedirect |
- : ContentSecurityPolicy::DidNotRedirect; |
- if (!parentPolicy->allowChildFrameFromSource(request.url(), redirectStatus)) { |
+ if (!parentPolicy->allowChildFrameFromSource(request.url(), request.redirectStatus())) { |
// Fire a load event, as timing attacks would otherwise reveal that the |
// frame was blocked. This way, it looks like every other cross-origin |
// page load. |