Index: third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp |
diff --git a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp |
index 2bef27e76e580e7c90839ac791d3a713817daad5..10c3665d7f81fa19c4a74df0672861de564d469d 100644 |
--- a/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp |
+++ b/third_party/WebKit/Source/core/frame/csp/ContentSecurityPolicy.cpp |
@@ -92,7 +92,6 @@ const char ContentSecurityPolicy::ChildSrc[] = "child-src"; |
const char ContentSecurityPolicy::FormAction[] = "form-action"; |
const char ContentSecurityPolicy::FrameAncestors[] = "frame-ancestors"; |
const char ContentSecurityPolicy::PluginTypes[] = "plugin-types"; |
-const char ContentSecurityPolicy::ReflectedXSS[] = "reflected-xss"; |
const char ContentSecurityPolicy::Referrer[] = "referrer"; |
// CSP Editor's Draft: |
@@ -127,7 +126,6 @@ bool ContentSecurityPolicy::isDirectiveName(const String& name) { |
equalIgnoringCase(name, FormAction) || |
equalIgnoringCase(name, FrameAncestors) || |
equalIgnoringCase(name, PluginTypes) || |
- equalIgnoringCase(name, ReflectedXSS) || |
equalIgnoringCase(name, Referrer) || |
equalIgnoringCase(name, ManifestSrc) || |
equalIgnoringCase(name, BlockAllMixedContent) || |
@@ -1010,16 +1008,6 @@ bool ContentSecurityPolicy::isActive() const { |
return !m_policies.isEmpty(); |
} |
-ReflectedXSSDisposition ContentSecurityPolicy::getReflectedXSSDisposition() |
- const { |
- ReflectedXSSDisposition disposition = ReflectedXSSUnset; |
- for (const auto& policy : m_policies) { |
- if (policy->getReflectedXSSDisposition() > disposition) |
- disposition = std::max(disposition, policy->getReflectedXSSDisposition()); |
- } |
- return disposition; |
-} |
- |
bool ContentSecurityPolicy::didSetReferrerPolicy() const { |
for (const auto& policy : m_policies) { |
if (policy->didSetReferrerPolicy()) |
@@ -1406,15 +1394,6 @@ void ContentSecurityPolicy::reportInvalidSandboxFlags( |
invalidFlags); |
} |
-void ContentSecurityPolicy::reportInvalidReflectedXSS( |
- const String& invalidValue) { |
- logToConsole( |
- "The 'reflected-xss' Content Security Policy directive has the invalid " |
- "value \"" + |
- invalidValue + |
- "\". Valid values are \"allow\", \"filter\", and \"block\"."); |
-} |
- |
void ContentSecurityPolicy::reportInvalidRequireSRIForTokens( |
const String& invalidTokens) { |
logToConsole( |