| Index: content/browser/child_process_security_policy_impl.h
|
| diff --git a/content/browser/child_process_security_policy_impl.h b/content/browser/child_process_security_policy_impl.h
|
| index 5a5e7407064fe1a0ba9dcb3c8ae2985d74e4051f..60dc521045f282335bac7c5e37c906f0917845a8 100644
|
| --- a/content/browser/child_process_security_policy_impl.h
|
| +++ b/content/browser/child_process_security_policy_impl.h
|
| @@ -270,6 +270,13 @@ class CONTENT_EXPORT ChildProcessSecurityPolicyImpl
|
| // as ensuring that there are no active SiteInstances in that origin.
|
| void RemoveIsolatedOriginForTesting(const url::Origin& origin);
|
|
|
| + // Returns false for redirects that must be blocked no matter which renderer
|
| + // process initiated the request (if any).
|
| + // Note: Checking CanRedirectToURL is not enough. CanRequestURL(child_id, url)
|
| + // represents a stricter subset. It must also be used for
|
| + // renderer-initiated navigations.
|
| + bool CanRedirectToURL(const GURL& url);
|
| +
|
| private:
|
| friend class ChildProcessSecurityPolicyInProcessBrowserTest;
|
| friend class ChildProcessSecurityPolicyTest;
|
|
|