| Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
|
| diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
|
| index 2df252450035ef6b9a2f5743622acb5fed441688..ba3c6333bc14d2a96881e5af9b8c4f689d8cbe60 100644
|
| --- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
|
| +++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
|
| @@ -841,16 +841,6 @@ static void gatherSecurityPolicyViolationEventData(SecurityPolicyViolationEventI
|
| void ContentSecurityPolicy::reportViolation(const String& directiveText, const String& effectiveDirective, const String& consoleMessage, const KURL& blockedURL, const Vector<String>& reportEndpoints, const String& header, ViolationType violationType, LocalFrame* contextFrame, RedirectStatus redirectStatus, int contextLine)
|
| {
|
| ASSERT(violationType == URLViolation || blockedURL.isEmpty());
|
| -
|
| - // TODO(lukasza): Support sending reports from OOPIFs - https://crbug.com/611232
|
| - // (or move CSP child-src and frame-src checks to the browser process - see
|
| - // https://crbug.com/376522).
|
| - if (!m_executionContext && !contextFrame) {
|
| - DCHECK(equalIgnoringCase(effectiveDirective, ContentSecurityPolicy::ChildSrc)
|
| - || equalIgnoringCase(effectiveDirective, ContentSecurityPolicy::FrameSrc));
|
| - return;
|
| - }
|
| -
|
| ASSERT((m_executionContext && !contextFrame) || (equalIgnoringCase(effectiveDirective, ContentSecurityPolicy::FrameAncestors) && contextFrame));
|
|
|
| // FIXME: Support sending reports from worker.
|
|
|