diff options
author | Allan Sandfeld Jensen <allan.jensen@qt.io> | 2017-05-03 17:20:32 +0200 |
---|---|---|
committer | Allan Sandfeld Jensen <allan.jensen@qt.io> | 2017-05-05 09:28:09 +0000 |
commit | bb09965444b5bb20b096a291445170876225268d (patch) | |
tree | b5f6596f7e6e941b1d7d72f0ce5181500c261529 /chromium/content/browser/security_exploit_browsertest.cc | |
parent | 7324afb043a0b1e623d8e8eb906cdc53bdeb4685 (diff) | |
download | qtwebengine-chromium-bb09965444b5bb20b096a291445170876225268d.tar.gz |
BASELINE: Update Chromium to 58.0.3029.98
Change-Id: Ib913750d687f29e036959c62a0cabf2412a8faa7
Reviewed-by: Alexandru Croitor <alexandru.croitor@qt.io>
Diffstat (limited to 'chromium/content/browser/security_exploit_browsertest.cc')
-rw-r--r-- | chromium/content/browser/security_exploit_browsertest.cc | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/chromium/content/browser/security_exploit_browsertest.cc b/chromium/content/browser/security_exploit_browsertest.cc index 3d61efb0e97..780d8223741 100644 --- a/chromium/content/browser/security_exploit_browsertest.cc +++ b/chromium/content/browser/security_exploit_browsertest.cc @@ -421,7 +421,7 @@ void OnHttpHeaderReceived(const std::string& header, int child_process_id, content::ResourceContext* resource_context, OnHeaderProcessedCallback callback) { - callback.Run(false, content::bad_message::RDH_ILLEGAL_ORIGIN); + callback.Run(HeaderInterceptorResult::KILL); } // Renderer processes should not be able to spoof Origin HTTP headers. |