Index: chrome/browser/ui/browser_commands.cc |
diff --git a/chrome/browser/ui/browser_commands.cc b/chrome/browser/ui/browser_commands.cc |
index 788e76ce5225aa0b9eeaf9c42b343ea0a71ccc0b..57533e8afedd2d88e25f84702c7fe3ebad6f8638 100644 |
--- a/chrome/browser/ui/browser_commands.cc |
+++ b/chrome/browser/ui/browser_commands.cc |
@@ -1157,17 +1157,6 @@ void ViewSource(Browser* browser, WebContents* contents) { |
if (!entry) |
return; |
- // The URL "data:," is a special case, since Blink uses it when it wants to |
- // show a "blocked page" from its reflected XSS filter. When the XSS filter |
- // triggers, the current entry gets marked as containing an XSS, and then a |
- // new navigation to "data:," occurs on top of it. Showing that page in place |
- // of the "data:," URL permits examination of the cause of the reflection. |
- if (entry->GetURL() == GURL("data:,")) { |
- NavigationEntry* previous = contents->GetController().GetEntryAtOffset(-1); |
- if (previous && previous->GetXssDetected()) |
- entry = previous; |
- } |
- |
ViewSource(browser, contents, entry->GetURL(), entry->GetPageState()); |
} |