Index: chrome/renderer/chrome_content_renderer_client.cc |
diff --git a/chrome/renderer/chrome_content_renderer_client.cc b/chrome/renderer/chrome_content_renderer_client.cc |
index 0da8e2001bef73e2441c659308c19acfd7c55026..699869dfadfb131c980bf8ff8215d137de0f0daf 100644 |
--- a/chrome/renderer/chrome_content_renderer_client.cc |
+++ b/chrome/renderer/chrome_content_renderer_client.cc |
@@ -400,23 +400,22 @@ void ChromeContentRendererClient::RenderThreadStarted() { |
WebSecurityPolicy::registerURLSchemeAsNotAllowingJavascriptURLs( |
chrome_search_scheme); |
- // chrome:, chrome-search:, and chrome-extension: resources shouldn't trigger |
- // insecure content warnings. |
+ // chrome:, chrome-search:, chrome-extension:, and chrome-extension-resource: |
+ // resources shouldn't trigger insecure content warnings. |
WebSecurityPolicy::registerURLSchemeAsSecure(chrome_ui_scheme); |
WebSecurityPolicy::registerURLSchemeAsSecure(chrome_search_scheme); |
WebString extension_scheme(ASCIIToUTF16(extensions::kExtensionScheme)); |
WebSecurityPolicy::registerURLSchemeAsSecure(extension_scheme); |
- // chrome-extension: resources should be allowed to receive CORS requests. |
- WebSecurityPolicy::registerURLSchemeAsCORSEnabled(extension_scheme); |
- |
WebString extension_resource_scheme( |
ASCIIToUTF16(extensions::kExtensionResourceScheme)); |
WebSecurityPolicy::registerURLSchemeAsSecure(extension_resource_scheme); |
- // chrome-extension-resource: resources should be allowed to receive CORS |
- // requests. |
+ // chrome:, chrome-extension:, chrome-extension-resource: resources should be |
+ // allowed to receive CORS requests. |
+ WebSecurityPolicy::registerURLSchemeAsCORSEnabled(chrome_ui_scheme); |
+ WebSecurityPolicy::registerURLSchemeAsCORSEnabled(extension_scheme); |
WebSecurityPolicy::registerURLSchemeAsCORSEnabled(extension_resource_scheme); |
// chrome-extension: resources should bypass Content Security Policy checks |