Commit 211fda6e authored by Peter Beverloo's avatar Peter Beverloo Committed by Commit Bot

Delete a proprietary check from Background Fetch code

We have no plans to standardize this for the time being, so let's remove
it.

Change-Id: Ia039368ca2e732bcbbee6acff94260b14c3bff0d
Reviewed-on: https://chromium-review.googlesource.com/1163783Reviewed-by: default avatarMugdha Lakhani <nator@chromium.org>
Commit-Queue: Peter Beverloo <peter@chromium.org>
Cr-Commit-Position: refs/heads/master@{#583791}
parent 682c3793
...@@ -90,22 +90,8 @@ bool ShouldBlockMixedContent(ExecutionContext* execution_context, ...@@ -90,22 +90,8 @@ bool ShouldBlockMixedContent(ExecutionContext* execution_context,
const KURL& request_url) { const KURL& request_url) {
// TODO(crbug.com/757441): Using MixedContentChecker::ShouldBlockFetch would // TODO(crbug.com/757441): Using MixedContentChecker::ShouldBlockFetch would
// log better metrics. // log better metrics.
if (MixedContentChecker::IsMixedContent( return MixedContentChecker::IsMixedContent(
execution_context->GetSecurityOrigin(), request_url)) { execution_context->GetSecurityOrigin(), request_url);
return true;
}
// Normally requests from e.g. http://127.0.0.1 aren't subject to Mixed
// Content checks even though that is a secure context. Since this is a new
// API only exposed on secure contexts, be strict pending the discussion in
// https://groups.google.com/a/chromium.org/d/topic/security-dev/29Ftfgn-w0I/discussion
// https://w3c.github.io/webappsec-mixed-content/#a-priori-authenticated-url
if (!SecurityOrigin::Create(request_url)->IsPotentiallyTrustworthy() &&
!request_url.ProtocolIsData()) {
return true;
}
return false;
} }
bool ShouldBlockDanglingMarkup(const KURL& request_url) { bool ShouldBlockDanglingMarkup(const KURL& request_url) {
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment