| Index: content/browser/child_process_security_policy_impl.cc
|
| diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc
|
| index c285ff22ac52aee6c2a9d12fb2c005c8b2214ac3..779aa5b398a5868d21dd407cf5a658a7f22ca328 100644
|
| --- a/content/browser/child_process_security_policy_impl.cc
|
| +++ b/content/browser/child_process_security_policy_impl.cc
|
| @@ -671,30 +671,6 @@
|
| !net::URLRequest::IsHandledURL(url);
|
| }
|
|
|
| -bool ChildProcessSecurityPolicyImpl::CanRedirectToURL(const GURL& url) {
|
| - if (!url.is_valid())
|
| - return false; // Can't redirect to invalid URLs.
|
| -
|
| - const std::string& scheme = url.scheme();
|
| -
|
| - if (IsPseudoScheme(scheme)) {
|
| - // Redirects to a pseudo scheme (about, javascript, view-source, ...) are
|
| - // not allowed. An exception is made for <about:blank> and its variations.
|
| - return url.IsAboutBlank();
|
| - }
|
| -
|
| - // Note about redirects and special URLs:
|
| - // * data-url: Blocked by net::DataProtocolHandler::IsSafeRedirectTarget().
|
| - // Depending on their inner origins and if the request is browser-initiated or
|
| - // renderer-initiated, blob-urls and filesystem-urls might get blocked by
|
| - // CanCommitURL or in DocumentLoader::RedirectReceived.
|
| - // * blob-url: If not blocked, a 'file not found' response will be
|
| - // generated in net::BlobURLRequestJob::DidStart().
|
| - // * filesystem-url: If not blocked, the response is displayed.
|
| -
|
| - return true;
|
| -}
|
| -
|
| bool ChildProcessSecurityPolicyImpl::CanCommitURL(int child_id,
|
| const GURL& url) {
|
| if (!url.is_valid())
|
|
|