| Index: content/child/site_isolation_stats_gatherer.cc
|
| diff --git a/content/child/site_isolation_stats_gatherer.cc b/content/child/site_isolation_stats_gatherer.cc
|
| index aeea241a06e6a86615854fff414aa39ce3e73655..9350a5b1d654f329c7e7b04456ea758246c41a97 100644
|
| --- a/content/child/site_isolation_stats_gatherer.cc
|
| +++ b/content/child/site_isolation_stats_gatherer.cc
|
| @@ -126,8 +126,7 @@ SiteIsolationStatsGatherer::OnReceivedResponse(
|
|
|
| // TODO(csharrison): Add a path for IsSameSite/IsValidCorsHeaderSet to take an
|
| // Origin.
|
| - GURL frame_origin_url = frame_origin.GetURL();
|
| - if (CrossSiteDocumentClassifier::IsSameSite(frame_origin_url, response_url))
|
| + if (CrossSiteDocumentClassifier::IsSameSite(frame_origin, response_url))
|
| return nullptr;
|
|
|
| CrossSiteDocumentMimeType canonical_mime_type =
|
| @@ -146,8 +145,9 @@ SiteIsolationStatsGatherer::OnReceivedResponse(
|
| info.headers->EnumerateHeader(NULL, "access-control-allow-origin",
|
| &access_control_origin);
|
| if (CrossSiteDocumentClassifier::IsValidCorsHeaderSet(
|
| - frame_origin_url, response_url, access_control_origin))
|
| + frame_origin, response_url, access_control_origin)) {
|
| return nullptr;
|
| + }
|
|
|
| // Real XSD data collection starts from here.
|
| std::string no_sniff;
|
| @@ -155,7 +155,6 @@ SiteIsolationStatsGatherer::OnReceivedResponse(
|
|
|
| std::unique_ptr<SiteIsolationResponseMetaData> resp_data(
|
| new SiteIsolationResponseMetaData);
|
| - resp_data->frame_origin = frame_origin_url.spec();
|
| resp_data->response_url = response_url;
|
| resp_data->resource_type = resource_type;
|
| resp_data->canonical_mime_type = canonical_mime_type;
|
|
|