| Index: content/browser/renderer_host/render_process_host_impl.cc
|
| diff --git a/content/browser/renderer_host/render_process_host_impl.cc b/content/browser/renderer_host/render_process_host_impl.cc
|
| index 7d19b6f55387aa80794b08a7193c75ae3a31505c..30c8c29b405424da01369f286174da9ada2cd651 100644
|
| --- a/content/browser/renderer_host/render_process_host_impl.cc
|
| +++ b/content/browser/renderer_host/render_process_host_impl.cc
|
| @@ -1585,12 +1585,7 @@ void RenderProcessHostImpl::FilterURL(RenderProcessHost* rph,
|
| RecordAction(base::UserMetricsAction("FilterURLTermiate_About"));
|
| }
|
|
|
| - // Do not allow browser plugin guests to navigate to non-web URLs, since they
|
| - // cannot swap processes or grant bindings.
|
| - bool non_web_url_in_guest = rph->IsGuest() &&
|
| - !(url->is_valid() && policy->IsWebSafeScheme(url->scheme()));
|
| -
|
| - if (non_web_url_in_guest || !policy->CanRequestURL(rph->GetID(), *url)) {
|
| + if (!policy->CanRequestURL(rph->GetID(), *url)) {
|
| // If this renderer is not permitted to request this URL, we invalidate the
|
| // URL. This prevents us from storing the blocked URL and becoming confused
|
| // later.
|
|
|