| Index: third_party/WebKit/Source/core/loader/FrameLoader.cpp
|
| diff --git a/third_party/WebKit/Source/core/loader/FrameLoader.cpp b/third_party/WebKit/Source/core/loader/FrameLoader.cpp
|
| index c1c682d307eeb3b3702af5394873188c034fe27b..9f1fb8f9711f8afa4a2a051a96cd71da65e5d01f 100644
|
| --- a/third_party/WebKit/Source/core/loader/FrameLoader.cpp
|
| +++ b/third_party/WebKit/Source/core/loader/FrameLoader.cpp
|
| @@ -1371,10 +1371,7 @@ bool FrameLoader::shouldContinueForNavigationPolicy(const ResourceRequest& reque
|
| Frame* parentFrame = m_frame->tree().parent();
|
| if (parentFrame) {
|
| ContentSecurityPolicy* parentPolicy = parentFrame->securityContext()->contentSecurityPolicy();
|
| - ContentSecurityPolicy::RedirectStatus redirectStatus = request.followedRedirect()
|
| - ? ContentSecurityPolicy::DidRedirect
|
| - : ContentSecurityPolicy::DidNotRedirect;
|
| - if (!parentPolicy->allowChildFrameFromSource(request.url(), redirectStatus)) {
|
| + if (!parentPolicy->allowChildFrameFromSource(request.url(), request.redirectStatus())) {
|
| // Fire a load event, as timing attacks would otherwise reveal that the
|
| // frame was blocked. This way, it looks like every other cross-origin
|
| // page load.
|
|
|