diff options
author | msw@chromium.org <msw@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2013-12-14 00:33:02 +0000 |
---|---|---|
committer | msw@chromium.org <msw@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2013-12-14 00:33:02 +0000 |
commit | 218ebce4d1ea1554cfa9ad6f14c24ae699c6841d (patch) | |
tree | a90756f85e033cbd539a5fbd61bb3c4ecf2a6efe /chrome/renderer/content_settings_observer_unittest.cc | |
parent | c74876d2cc8be84a4b4c4acdf2497d17716e1d3a (diff) | |
download | chromium_src-218ebce4d1ea1554cfa9ad6f14c24ae699c6841d.zip chromium_src-218ebce4d1ea1554cfa9ad6f14c24ae699c6841d.tar.gz chromium_src-218ebce4d1ea1554cfa9ad6f14c24ae699c6841d.tar.bz2 |
Remove chrome-internal scheme, chrome::kChromeInternalScheme.
The chrome-internal scheme was once used to host the NTP.
It's now hosted at about:newtab, aka. chrome://newtab.
There's no compelling reason to support chrome-internal.
BUG=6564,327845
R=jam@chromium.org
TEST=chrome-internal://foo no longer redirects to the new tab page, no one gets upset.
Review URL: https://codereview.chromium.org/114883002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@240819 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/renderer/content_settings_observer_unittest.cc')
-rw-r--r-- | chrome/renderer/content_settings_observer_unittest.cc | 6 |
1 files changed, 0 insertions, 6 deletions
diff --git a/chrome/renderer/content_settings_observer_unittest.cc b/chrome/renderer/content_settings_observer_unittest.cc index 0588944..6e97117 100644 --- a/chrome/renderer/content_settings_observer_unittest.cc +++ b/chrome/renderer/content_settings_observer_unittest.cc @@ -36,12 +36,6 @@ TEST_F(ContentSettingsObserverTest, WhitelistedSchemes) { WebSecurityOrigin::create(extension_url), GURL())); - GURL chrome_internal_url = - GURL(std::string(chrome::kChromeInternalScheme).append(end_url)); - EXPECT_TRUE(ContentSettingsObserver::IsWhitelistedForContentSettings( - WebSecurityOrigin::create(chrome_internal_url), - GURL())); - GURL file_url("file:///dir/"); EXPECT_TRUE(ContentSettingsObserver::IsWhitelistedForContentSettings( WebSecurityOrigin::create(file_url), |