Index: content/browser/child_process_security_policy_impl.cc |
diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc |
index 3c207c2c185162d81e83cfdc34138da57563d56f..f1aa1c74d71df72530020a7be37b54ab32fee7f7 100644 |
--- a/content/browser/child_process_security_policy_impl.cc |
+++ b/content/browser/child_process_security_policy_impl.cc |
@@ -626,8 +626,8 @@ |
return false; // Can't request invalid URLs. |
if (IsPseudoScheme(url.scheme())) { |
- // Every child process can request <about:blank> and <about:srcdoc>. |
- if (url == url::kAboutBlankURL || url == kAboutSrcDocURL) |
+ // Every child process can request <about:blank>. |
+ if (base::LowerCaseEqualsASCII(url.spec(), url::kAboutBlankURL)) |
return true; |
// URLs like <about:version>, <about:crash>, <view-source:...> shouldn't be |
// requestable by any child process. Also, this case covers |
@@ -664,10 +664,9 @@ |
if (!url.is_valid()) |
return false; // Can't commit invalid URLs. |
- // Of all the pseudo schemes, only about:blank and about:srcdoc are allowed to |
- // commit. |
+ // Of all the pseudo schemes, only about:blank is allowed to commit. |
if (IsPseudoScheme(url.scheme())) |
- return url == url::kAboutBlankURL || url == kAboutSrcDocURL; |
+ return base::LowerCaseEqualsASCII(url.spec(), url::kAboutBlankURL); |
// Blob and filesystem URLs require special treatment; validate the inner |
// origin they embed. |
@@ -718,10 +717,6 @@ |
return true; |
} |
- // about:srcdoc cannot be used as an origin |
- if (url == kAboutSrcDocURL) |
- return false; |
- |
// If this process can commit |url|, it can use |url| as an origin for |
// outbound requests. |
if (CanCommitURL(child_id, url)) |