| Index: third_party/WebKit/Source/core/xmlhttprequest/XMLHttpRequest.cpp
|
| diff --git a/third_party/WebKit/Source/core/xmlhttprequest/XMLHttpRequest.cpp b/third_party/WebKit/Source/core/xmlhttprequest/XMLHttpRequest.cpp
|
| index 9e6bb4c5f8a9b3dbd7f19301df7b6165b0252468..beeb6308c82ec5ce4755b195ce27d7a04a321115 100644
|
| --- a/third_party/WebKit/Source/core/xmlhttprequest/XMLHttpRequest.cpp
|
| +++ b/third_party/WebKit/Source/core/xmlhttprequest/XMLHttpRequest.cpp
|
| @@ -627,17 +627,6 @@ void XMLHttpRequest::open(const AtomicString& method,
|
| m_error = false;
|
| m_uploadComplete = false;
|
|
|
| - if (!ContentSecurityPolicy::shouldBypassMainWorld(getExecutionContext()) &&
|
| - !getExecutionContext()->contentSecurityPolicy()->allowConnectToSource(
|
| - url)) {
|
| - // We can safely expose the URL to JavaScript, as these checks happen
|
| - // synchronously before redirection. JavaScript receives no new information.
|
| - exceptionState.throwSecurityError(
|
| - "Refused to connect to '" + url.elidedString() +
|
| - "' because it violates the document's Content Security Policy.");
|
| - return;
|
| - }
|
| -
|
| if (!async && getExecutionContext()->isDocument()) {
|
| if (document()->settings() &&
|
| !document()->settings()->syncXHRInDocumentsEnabled()) {
|
|
|