Index: net/cookies/canonical_cookie.cc |
diff --git a/net/cookies/canonical_cookie.cc b/net/cookies/canonical_cookie.cc |
index de2fbbe6c65f03826722b05646936e95ad0ae536..2b53e4ee497fa4ed7e3fa6652afd0e8221e53b16 100644 |
--- a/net/cookies/canonical_cookie.cc |
+++ b/net/cookies/canonical_cookie.cc |
@@ -195,8 +195,7 @@ std::unique_ptr<CanonicalCookie> CanonicalCookie::Create( |
// origins", if the cookie's "secure-only-flag" is "true" and the requesting |
// URL does not have a secure scheme, the cookie should be thrown away. |
// https://tools.ietf.org/html/draft-ietf-httpbis-cookie-alone |
- if (options.enforce_strict_secure() && parsed_cookie.IsSecure() && |
- !url.SchemeIsCryptographic()) { |
+ if (parsed_cookie.IsSecure() && !url.SchemeIsCryptographic()) { |
VLOG(kVlogSetCookies) |
<< "Create() is trying to create a secure cookie from an insecure URL"; |
return nullptr; |
@@ -240,7 +239,6 @@ std::unique_ptr<CanonicalCookie> CanonicalCookie::Create( |
bool secure, |
bool http_only, |
CookieSameSite same_site, |
- bool enforce_strict_secure, |
CookiePriority priority) { |
// Expect valid attribute tokens and values, as defined by the ParsedCookie |
// logic, otherwise don't create the cookie. |
@@ -260,7 +258,7 @@ std::unique_ptr<CanonicalCookie> CanonicalCookie::Create( |
return nullptr; |
} |
- if (enforce_strict_secure && secure && !url.SchemeIsCryptographic()) |
+ if (secure && !url.SchemeIsCryptographic()) |
return nullptr; |
std::string parsed_path = ParsedCookie::ParseValueString(path); |