| Index: content/browser/loader/mime_sniffing_resource_handler.cc
|
| diff --git a/content/browser/loader/mime_sniffing_resource_handler.cc b/content/browser/loader/mime_sniffing_resource_handler.cc
|
| index fb70d6ef5924a8ba8dff5466487105ea0574db4d..111e3f69ddf970f8245d43d9b3836cdfad835257 100644
|
| --- a/content/browser/loader/mime_sniffing_resource_handler.cc
|
| +++ b/content/browser/loader/mime_sniffing_resource_handler.cc
|
| @@ -365,16 +365,6 @@ bool MimeSniffingResourceHandler::MaybeStartInterception(bool* defer) {
|
| ResourceRequestInfoImpl* info = GetRequestInfo();
|
| const std::string& mime_type = response_->head.mime_type;
|
|
|
| - // https://crbug.com/568184 - Temporary hack to track servers that aren't
|
| - // setting Content-Disposition when sending x-x509-user-cert and expecting
|
| - // the browser to automatically install certificates; this is being
|
| - // deprecated and will be removed upon full <keygen> removal.
|
| - if (mime_type == "application/x-x509-user-cert" && response_->head.headers) {
|
| - UMA_HISTOGRAM_BOOLEAN(
|
| - "UserCert.ContentDisposition",
|
| - response_->head.headers->HasHeader("Content-Disposition"));
|
| - }
|
| -
|
| // Allow requests for object/embed tags to be intercepted as streams.
|
| if (info->GetResourceType() == content::RESOURCE_TYPE_OBJECT) {
|
| DCHECK(!info->allow_download());
|
|
|