Index: content/browser/child_process_security_policy_impl.cc |
diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc |
index e219bdfac772f9c86fbeb3f37e703b34f2d551c7..51b08cdf48791c461b741e369b3d8a99ebf7e22f 100644 |
--- a/content/browser/child_process_security_policy_impl.cc |
+++ b/content/browser/child_process_security_policy_impl.cc |
@@ -508,15 +508,9 @@ bool ChildProcessSecurityPolicyImpl::CanLoadPage( |
// stronger security restrictions on page navigation. |
if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kSitePerProcess) && |
ResourceType::IsFrame(resource_type)) { |
- // TODO(irobert): This currently breaks some WebUI page such as |
- // "chrome://extensions/" (belongs to site chrome://chrome/) which |
- // will load an iframe for the page "chrome://uber-frame/" |
- // (belongs to site chrome://uber-frame/). |
- base::AutoLock lock(lock_); |
- SecurityStateMap::iterator state = security_state_.find(child_id); |
- if (state == security_state_.end()) |
- return false; |
- return state->second->CanLoadPage(url); |
+ // TODO(nasko): Do the proper check for site-per-process, once |
+ // out-of-process iframes is ready to go. |
Charlie Reis
2013/01/17 19:44:54
Wasn't this from your other CL? Did you want to l
nasko
2013/01/17 22:19:13
As discussed, I've decided to drop the other CL an
Charlie Reis
2013/01/18 05:37:07
Ok. In that case, can you add the bug number from
|
+ return true; |
} |
return true; |
} |