Index: content/browser/child_process_security_policy_impl.cc |
diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc |
index 3e8868aa682761c7884170a534fc7bd2b990e928..3cf58583613241881c9693fdf628da682ed2c3ae 100644 |
--- a/content/browser/child_process_security_policy_impl.cc |
+++ b/content/browser/child_process_security_policy_impl.cc |
@@ -30,7 +30,6 @@ |
#include "storage/browser/fileapi/isolated_context.h" |
#include "storage/common/fileapi/file_system_util.h" |
#include "url/gurl.h" |
-#include "url/url_util.h" |
namespace content { |
@@ -629,7 +628,7 @@ bool ChildProcessSecurityPolicyImpl::CanRequestURL( |
if (IsPseudoScheme(url.scheme())) { |
// Every child process can request <about:blank>, <about:blank?foo>, |
// <about:blank/#foo> and <about:srcdoc>. |
- if (url::IsAboutBlank(url) || url == kAboutSrcDocURL) |
+ if (url.IsAboutBlank() || url == kAboutSrcDocURL) |
return true; |
// URLs like <about:version>, <about:crash>, <view-source:...> shouldn't be |
// requestable by any child process. Also, this case covers |