Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp |
diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp |
index 7c759fd48a6dd1dedb0226303b9ec9e93bea3407..43c90dcde17078a6476d7fe09c88bcb038c4cb37 100644 |
--- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp |
+++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp |
@@ -841,16 +841,6 @@ static void gatherSecurityPolicyViolationEventData(SecurityPolicyViolationEventI |
void ContentSecurityPolicy::reportViolation(const String& directiveText, const String& effectiveDirective, const String& consoleMessage, const KURL& blockedURL, const Vector<String>& reportEndpoints, const String& header, ViolationType violationType, LocalFrame* contextFrame, RedirectStatus redirectStatus, int contextLine) |
{ |
ASSERT(violationType == URLViolation || blockedURL.isEmpty()); |
- |
- // TODO(lukasza): Support sending reports from OOPIFs - https://crbug.com/611232 |
- // (or move CSP child-src and frame-src checks to the browser process - see |
- // https://crbug.com/376522). |
- if (!m_executionContext && !contextFrame) { |
- DCHECK(equalIgnoringCase(effectiveDirective, ContentSecurityPolicy::ChildSrc) |
- || equalIgnoringCase(effectiveDirective, ContentSecurityPolicy::FrameSrc)); |
- return; |
- } |
- |
ASSERT((m_executionContext && !contextFrame) || (equalIgnoringCase(effectiveDirective, ContentSecurityPolicy::FrameAncestors) && contextFrame)); |
// FIXME: Support sending reports from worker. |