Index: trunk/src/content/browser/browser_plugin/browser_plugin_host_browsertest.cc |
=================================================================== |
--- trunk/src/content/browser/browser_plugin/browser_plugin_host_browsertest.cc (revision 188924) |
+++ trunk/src/content/browser/browser_plugin/browser_plugin_host_browsertest.cc (working copy) |
@@ -14,7 +14,6 @@ |
#include "content/browser/browser_plugin/test_browser_plugin_embedder.h" |
#include "content/browser/browser_plugin/test_browser_plugin_guest.h" |
#include "content/browser/browser_plugin/test_browser_plugin_guest_manager.h" |
-#include "content/browser/child_process_security_policy_impl.h" |
#include "content/browser/renderer_host/render_view_host_impl.h" |
#include "content/browser/web_contents/web_contents_impl.h" |
#include "content/common/view_messages.h" |
@@ -853,18 +852,12 @@ |
{ |
// Navigate the guest to an illegal chrome:// URL. |
- GURL test_url("chrome://newtab"); |
- ChildProcessSecurityPolicyImpl* policy = |
- ChildProcessSecurityPolicyImpl::GetInstance(); |
- // Register chrome:// as a safe scheme so as to bypass |
- // ChildProcessSecurityPolicyImpl::CanRequestURL(). |
- if (!policy->IsWebSafeScheme(test_url.scheme())) |
- policy->RegisterWebSafeScheme(test_url.scheme()); |
const string16 expected_title = ASCIIToUTF16("ERR_INVALID_URL"); |
content::TitleWatcher title_watcher(test_embedder()->web_contents(), |
expected_title); |
RenderViewHostImpl* rvh = static_cast<RenderViewHostImpl*>( |
test_embedder()->web_contents()->GetRenderViewHost()); |
+ GURL test_url("chrome://newtab"); |
ExecuteSyncJSFunction( |
rvh, base::StringPrintf("SetSrc('%s');", test_url.spec().c_str())); |
string16 actual_title = title_watcher.WaitAndGetTitle(); |