| Index: content/browser/child_process_security_policy_impl.h
|
| diff --git a/content/browser/child_process_security_policy_impl.h b/content/browser/child_process_security_policy_impl.h
|
| index 61486b9a28b483f12e35da14426f0bbfb3f173f1..7ec669b68a50450c7944fddd9eb5e59649918004 100644
|
| --- a/content/browser/child_process_security_policy_impl.h
|
| +++ b/content/browser/child_process_security_policy_impl.h
|
| @@ -74,6 +74,7 @@ class CONTENT_EXPORT ChildProcessSecurityPolicyImpl
|
| const std::string& filesystem_id) override;
|
| bool HasWebUIBindings(int child_id) override;
|
| void GrantSendMidiSysExMessage(int child_id) override;
|
| + bool CanAccessDataForOrigin(int child_id, const GURL& url) override;
|
|
|
| // Pseudo schemes are treated differently than other schemes because they
|
| // cannot be requested like normal URLs. There is no mechanism for revoking
|
| @@ -145,12 +146,6 @@ class CONTENT_EXPORT ChildProcessSecurityPolicyImpl
|
| // Returns true if the specified child_id has been granted ReadRawCookies.
|
| bool CanReadRawCookies(int child_id);
|
|
|
| - // Returns true if the process is permitted to read and modify the cookies for
|
| - // the given origin. Does not affect cookies attached to or set by network
|
| - // requests.
|
| - // Only might return false if the --site-per-process flag is used.
|
| - bool CanAccessCookiesForOrigin(int child_id, const GURL& gurl);
|
| -
|
| // Sets the process as only permitted to use and see the cookies for the
|
| // given origin.
|
| // Origin lock is applied only if the --site-per-process flag is used.
|
|
|