| Index: content/browser/child_process_security_policy_impl.cc
|
| diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc
|
| index 5c8f029b552c11d08cf5ea2611d261ddfff48a14..3b8db440dc171da82743fb99f6f16d850e5d8277 100644
|
| --- a/content/browser/child_process_security_policy_impl.cc
|
| +++ b/content/browser/child_process_security_policy_impl.cc
|
| @@ -176,7 +176,7 @@ class ChildProcessSecurityPolicyImpl::SecurityState {
|
|
|
| // file:// URLs are more granular. The child may have been given
|
| // permission to a specific file but not the file:// scheme in general.
|
| - if (url.SchemeIs(chrome::kFileScheme)) {
|
| + if (url.SchemeIs(kFileScheme)) {
|
| base::FilePath path;
|
| if (net::FileURLToFilePath(url, &path))
|
| return ContainsKey(request_file_set_, path);
|
| @@ -434,7 +434,7 @@ void ChildProcessSecurityPolicyImpl::GrantRequestURL(
|
| void ChildProcessSecurityPolicyImpl::GrantRequestSpecificFileURL(
|
| int child_id,
|
| const GURL& url) {
|
| - if (!url.SchemeIs(chrome::kFileScheme))
|
| + if (!url.SchemeIs(kFileScheme))
|
| return;
|
|
|
| {
|
| @@ -548,7 +548,7 @@ void ChildProcessSecurityPolicyImpl::GrantWebUIBindings(int child_id) {
|
| state->second->GrantScheme(chrome::kChromeUIScheme);
|
|
|
| // Web UI pages can contain links to file:// URLs.
|
| - state->second->GrantScheme(chrome::kFileScheme);
|
| + state->second->GrantScheme(kFileScheme);
|
| }
|
|
|
| void ChildProcessSecurityPolicyImpl::GrantReadRawCookies(int child_id) {
|
|
|