| Index: third_party/WebKit/Source/core/dom/DocumentInit.cpp
|
| diff --git a/third_party/WebKit/Source/core/dom/DocumentInit.cpp b/third_party/WebKit/Source/core/dom/DocumentInit.cpp
|
| index 19d9eb60be68cea26400c506b69b71865ad1288c..0ac3139e5fd37d342bb0014552ab3b297a9cbf45 100644
|
| --- a/third_party/WebKit/Source/core/dom/DocumentInit.cpp
|
| +++ b/third_party/WebKit/Source/core/dom/DocumentInit.cpp
|
| @@ -96,13 +96,13 @@ SandboxFlags DocumentInit::getSandboxFlags() const {
|
| FrameLoader* loader = &frameForSecurityContext()->loader();
|
| SandboxFlags flags = loader->effectiveSandboxFlags();
|
|
|
| - // If the load was blocked by X-Frame-Options or CSP, force the Document's
|
| - // origin to be unique, so that the blocked document appears to be a normal
|
| - // cross-origin document's load per CSP spec:
|
| - // https://www.w3.org/TR/CSP2/#directive-frame-ancestors
|
| + // If the load was blocked by CSP, force the Document's origin to be unique,
|
| + // so that the blocked document appears to be a normal cross-origin document's
|
| + // load per CSP spec: https://www.w3.org/TR/CSP3/#directive-frame-ancestors.
|
| if (loader->documentLoader() &&
|
| - loader->documentLoader()->wasBlockedAfterXFrameOptionsOrCSP())
|
| + loader->documentLoader()->wasBlockedAfterCSP()) {
|
| flags |= SandboxOrigin;
|
| + }
|
|
|
| return flags;
|
| }
|
|
|