Index: content/browser/child_process_security_policy_impl.h |
diff --git a/content/browser/child_process_security_policy_impl.h b/content/browser/child_process_security_policy_impl.h |
index 60dc521045f282335bac7c5e37c906f0917845a8..5a5e7407064fe1a0ba9dcb3c8ae2985d74e4051f 100644 |
--- a/content/browser/child_process_security_policy_impl.h |
+++ b/content/browser/child_process_security_policy_impl.h |
@@ -270,13 +270,6 @@ |
// as ensuring that there are no active SiteInstances in that origin. |
void RemoveIsolatedOriginForTesting(const url::Origin& origin); |
- // Returns false for redirects that must be blocked no matter which renderer |
- // process initiated the request (if any). |
- // Note: Checking CanRedirectToURL is not enough. CanRequestURL(child_id, url) |
- // represents a stricter subset. It must also be used for |
- // renderer-initiated navigations. |
- bool CanRedirectToURL(const GURL& url); |
- |
private: |
friend class ChildProcessSecurityPolicyInProcessBrowserTest; |
friend class ChildProcessSecurityPolicyTest; |