| Index: chrome/browser/ui/browser_commands.cc
|
| diff --git a/chrome/browser/ui/browser_commands.cc b/chrome/browser/ui/browser_commands.cc
|
| index 788e76ce5225aa0b9eeaf9c42b343ea0a71ccc0b..57533e8afedd2d88e25f84702c7fe3ebad6f8638 100644
|
| --- a/chrome/browser/ui/browser_commands.cc
|
| +++ b/chrome/browser/ui/browser_commands.cc
|
| @@ -1157,17 +1157,6 @@ void ViewSource(Browser* browser, WebContents* contents) {
|
| if (!entry)
|
| return;
|
|
|
| - // The URL "data:," is a special case, since Blink uses it when it wants to
|
| - // show a "blocked page" from its reflected XSS filter. When the XSS filter
|
| - // triggers, the current entry gets marked as containing an XSS, and then a
|
| - // new navigation to "data:," occurs on top of it. Showing that page in place
|
| - // of the "data:," URL permits examination of the cause of the reflection.
|
| - if (entry->GetURL() == GURL("data:,")) {
|
| - NavigationEntry* previous = contents->GetController().GetEntryAtOffset(-1);
|
| - if (previous && previous->GetXssDetected())
|
| - entry = previous;
|
| - }
|
| -
|
| ViewSource(browser, contents, entry->GetURL(), entry->GetPageState());
|
| }
|
|
|
|
|