summaryrefslogtreecommitdiff
path: root/chromium/content/browser/security_exploit_browsertest.cc
diff options
context:
space:
mode:
authorAllan Sandfeld Jensen <allan.jensen@qt.io>2017-05-03 17:20:32 +0200
committerAllan Sandfeld Jensen <allan.jensen@qt.io>2017-05-05 09:28:09 +0000
commitbb09965444b5bb20b096a291445170876225268d (patch)
treeb5f6596f7e6e941b1d7d72f0ce5181500c261529 /chromium/content/browser/security_exploit_browsertest.cc
parent7324afb043a0b1e623d8e8eb906cdc53bdeb4685 (diff)
downloadqtwebengine-chromium-bb09965444b5bb20b096a291445170876225268d.tar.gz
BASELINE: Update Chromium to 58.0.3029.98
Change-Id: Ib913750d687f29e036959c62a0cabf2412a8faa7 Reviewed-by: Alexandru Croitor <alexandru.croitor@qt.io>
Diffstat (limited to 'chromium/content/browser/security_exploit_browsertest.cc')
-rw-r--r--chromium/content/browser/security_exploit_browsertest.cc2
1 files changed, 1 insertions, 1 deletions
diff --git a/chromium/content/browser/security_exploit_browsertest.cc b/chromium/content/browser/security_exploit_browsertest.cc
index 3d61efb0e97..780d8223741 100644
--- a/chromium/content/browser/security_exploit_browsertest.cc
+++ b/chromium/content/browser/security_exploit_browsertest.cc
@@ -421,7 +421,7 @@ void OnHttpHeaderReceived(const std::string& header,
int child_process_id,
content::ResourceContext* resource_context,
OnHeaderProcessedCallback callback) {
- callback.Run(false, content::bad_message::RDH_ILLEGAL_ORIGIN);
+ callback.Run(HeaderInterceptorResult::KILL);
}
// Renderer processes should not be able to spoof Origin HTTP headers.