| Index: third_party/WebKit/Source/core/xmlhttprequest/XMLHttpRequest.cpp
|
| diff --git a/third_party/WebKit/Source/core/xmlhttprequest/XMLHttpRequest.cpp b/third_party/WebKit/Source/core/xmlhttprequest/XMLHttpRequest.cpp
|
| index de095344db1d56bdaa02ef95f2162afbef6beadd..d1c2274bc4007a3aa10cd7544f458cef853ee9b8 100644
|
| --- a/third_party/WebKit/Source/core/xmlhttprequest/XMLHttpRequest.cpp
|
| +++ b/third_party/WebKit/Source/core/xmlhttprequest/XMLHttpRequest.cpp
|
| @@ -617,17 +617,6 @@ void XMLHttpRequest::open(const AtomicString& method,
|
| m_error = false;
|
| m_uploadComplete = false;
|
|
|
| - if (!ContentSecurityPolicy::shouldBypassMainWorld(getExecutionContext()) &&
|
| - !getExecutionContext()->contentSecurityPolicy()->allowConnectToSource(
|
| - url)) {
|
| - // We can safely expose the URL to JavaScript, as these checks happen
|
| - // synchronously before redirection. JavaScript receives no new information.
|
| - exceptionState.throwSecurityError(
|
| - "Refused to connect to '" + url.elidedString() +
|
| - "' because it violates the document's Content Security Policy.");
|
| - return;
|
| - }
|
| -
|
| if (!async && getExecutionContext()->isDocument()) {
|
| if (document()->settings() &&
|
| !document()->settings()->getSyncXHRInDocumentsEnabled()) {
|
|
|