| Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
|
| diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
|
| index 7c759fd48a6dd1dedb0226303b9ec9e93bea3407..43c90dcde17078a6476d7fe09c88bcb038c4cb37 100644
|
| --- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
|
| +++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp
|
| @@ -841,16 +841,6 @@ static void gatherSecurityPolicyViolationEventData(SecurityPolicyViolationEventI
|
| void ContentSecurityPolicy::reportViolation(const String& directiveText, const String& effectiveDirective, const String& consoleMessage, const KURL& blockedURL, const Vector<String>& reportEndpoints, const String& header, ViolationType violationType, LocalFrame* contextFrame, RedirectStatus redirectStatus, int contextLine)
|
| {
|
| ASSERT(violationType == URLViolation || blockedURL.isEmpty());
|
| -
|
| - // TODO(lukasza): Support sending reports from OOPIFs - https://crbug.com/611232
|
| - // (or move CSP child-src and frame-src checks to the browser process - see
|
| - // https://crbug.com/376522).
|
| - if (!m_executionContext && !contextFrame) {
|
| - DCHECK(equalIgnoringCase(effectiveDirective, ContentSecurityPolicy::ChildSrc)
|
| - || equalIgnoringCase(effectiveDirective, ContentSecurityPolicy::FrameSrc));
|
| - return;
|
| - }
|
| -
|
| ASSERT((m_executionContext && !contextFrame) || (equalIgnoringCase(effectiveDirective, ContentSecurityPolicy::FrameAncestors) && contextFrame));
|
|
|
| // FIXME: Support sending reports from worker.
|
|
|