| Index: extensions/renderer/script_context.cc
|
| diff --git a/extensions/renderer/script_context.cc b/extensions/renderer/script_context.cc
|
| index 47a3c2a6cc0b5d050e492a833a175d29a1dbe935..e5677aadb10597498e0b4d5019bc8cc4d084fd8f 100644
|
| --- a/extensions/renderer/script_context.cc
|
| +++ b/extensions/renderer/script_context.cc
|
| @@ -13,19 +13,15 @@
|
| #include "content/public/common/url_constants.h"
|
| #include "content/public/renderer/render_frame.h"
|
| #include "content/public/renderer/render_view.h"
|
| -#include "extensions/common/constants.h"
|
| #include "extensions/common/extension.h"
|
| #include "extensions/common/extension_api.h"
|
| -#include "extensions/common/extension_set.h"
|
| #include "extensions/common/extension_urls.h"
|
| #include "extensions/common/features/base_feature_provider.h"
|
| -#include "extensions/common/manifest_handlers/sandboxed_page_info.h"
|
| #include "extensions/common/permissions/permissions_data.h"
|
| #include "gin/per_context_data.h"
|
| #include "third_party/WebKit/public/web/WebDataSource.h"
|
| #include "third_party/WebKit/public/web/WebDocument.h"
|
| #include "third_party/WebKit/public/web/WebFrame.h"
|
| -#include "third_party/WebKit/public/web/WebLocalFrame.h"
|
| #include "third_party/WebKit/public/web/WebScopedMicrotaskSuppression.h"
|
| #include "third_party/WebKit/public/web/WebSecurityOrigin.h"
|
| #include "third_party/WebKit/public/web/WebView.h"
|
| @@ -79,7 +75,7 @@
|
| };
|
|
|
| ScriptContext::ScriptContext(const v8::Handle<v8::Context>& v8_context,
|
| - blink::WebLocalFrame* web_frame,
|
| + blink::WebFrame* web_frame,
|
| const Extension* extension,
|
| Feature::Context context_type,
|
| const Extension* effective_extension,
|
| @@ -114,21 +110,6 @@
|
| Invalidate();
|
| }
|
|
|
| -// static
|
| -bool ScriptContext::IsSandboxedPage(const ExtensionSet& extensions,
|
| - const GURL& url) {
|
| - // TODO(kalman): This is checking for the wrong thing, it should be checking
|
| - // if the frame's security origin is unique. The extension sandbox directive
|
| - // is checked for in extensions/common/manifest_handlers/csp_info.cc.
|
| - if (url.SchemeIs(kExtensionScheme)) {
|
| - const Extension* extension = extensions.GetByID(url.host());
|
| - if (extension) {
|
| - return SandboxedPageInfo::IsSandboxedPage(extension, url.path());
|
| - }
|
| - }
|
| - return false;
|
| -}
|
| -
|
| void ScriptContext::Invalidate() {
|
| if (!is_valid())
|
| return;
|
|
|