Chromium Code Reviews| Index: content/browser/child_process_security_policy_impl.cc | 
| diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc | 
| index e219bdfac772f9c86fbeb3f37e703b34f2d551c7..51b08cdf48791c461b741e369b3d8a99ebf7e22f 100644 | 
| --- a/content/browser/child_process_security_policy_impl.cc | 
| +++ b/content/browser/child_process_security_policy_impl.cc | 
| @@ -508,15 +508,9 @@ bool ChildProcessSecurityPolicyImpl::CanLoadPage( | 
| // stronger security restrictions on page navigation. | 
| if (CommandLine::ForCurrentProcess()->HasSwitch(switches::kSitePerProcess) && | 
| ResourceType::IsFrame(resource_type)) { | 
| - // TODO(irobert): This currently breaks some WebUI page such as | 
| - // "chrome://extensions/" (belongs to site chrome://chrome/) which | 
| - // will load an iframe for the page "chrome://uber-frame/" | 
| - // (belongs to site chrome://uber-frame/). | 
| - base::AutoLock lock(lock_); | 
| - SecurityStateMap::iterator state = security_state_.find(child_id); | 
| - if (state == security_state_.end()) | 
| - return false; | 
| - return state->second->CanLoadPage(url); | 
| + // TODO(nasko): Do the proper check for site-per-process, once | 
| + // out-of-process iframes is ready to go. | 
| 
 
Charlie Reis
2013/01/17 19:44:54
Wasn't this from your other CL?  Did you want to l
 
nasko
2013/01/17 22:19:13
As discussed, I've decided to drop the other CL an
 
Charlie Reis
2013/01/18 05:37:07
Ok.  In that case, can you add the bug number from
 
 | 
| + return true; | 
| } | 
| return true; | 
| } |