| Index: content/browser/child_process_security_policy_impl.cc
|
| diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc
|
| index 58bf3e36ed02f95b3597094821260202ee853dee..8a67465b9f4a683adcb2a4deecc5076f1c9fd0f8 100644
|
| --- a/content/browser/child_process_security_policy_impl.cc
|
| +++ b/content/browser/child_process_security_policy_impl.cc
|
| @@ -214,17 +214,6 @@ class ChildProcessSecurityPolicyImpl::SecurityState {
|
| return false;
|
| }
|
|
|
| - bool CanLoadPage(const GURL& gurl) {
|
| - if (origin_lock_.is_empty())
|
| - return true;
|
| -
|
| - // TODO(creis): We must pass the valid browser_context to convert hosted
|
| - // apps URLs. Currently, hosted apps cannot be loaded in this mode.
|
| - // See http://crbug.com/160576.
|
| - GURL site_gurl = SiteInstanceImpl::GetSiteForURL(NULL, gurl);
|
| - return origin_lock_ == site_gurl;
|
| - }
|
| -
|
| bool CanAccessDataForOrigin(const GURL& gurl) {
|
| if (origin_lock_.is_empty())
|
| return true;
|
| @@ -561,21 +550,6 @@ void ChildProcessSecurityPolicyImpl::RevokeReadRawCookies(int child_id) {
|
| state->second->RevokeReadRawCookies();
|
| }
|
|
|
| -bool ChildProcessSecurityPolicyImpl::CanLoadPage(int child_id,
|
| - const GURL& url,
|
| - ResourceType resource_type) {
|
| - // If --site-per-process flag is passed, we should enforce
|
| - // stronger security restrictions on page navigation.
|
| - if (base::CommandLine::ForCurrentProcess()->HasSwitch(
|
| - switches::kSitePerProcess) &&
|
| - IsResourceTypeFrame(resource_type)) {
|
| - // TODO(nasko): Do the proper check for site-per-process, once
|
| - // out-of-process iframes is ready to go.
|
| - return true;
|
| - }
|
| - return true;
|
| -}
|
| -
|
| bool ChildProcessSecurityPolicyImpl::CanRequestURL(
|
| int child_id, const GURL& url) {
|
| if (!url.is_valid())
|
|
|