Index: chrome/renderer/chrome_content_renderer_client.cc |
diff --git a/chrome/renderer/chrome_content_renderer_client.cc b/chrome/renderer/chrome_content_renderer_client.cc |
index 59de107ca5069b00d9b84ab1490be9064a249b03..9fe13cfcf4252b3a346e398ec0fdded593a0085d 100644 |
--- a/chrome/renderer/chrome_content_renderer_client.cc |
+++ b/chrome/renderer/chrome_content_renderer_client.cc |
@@ -1538,12 +1538,12 @@ bool ChromeContentRendererClient::ShouldReportDetailedMessageForSource( |
#endif |
} |
-bool ChromeContentRendererClient::ShouldEnableSiteIsolationPolicy() const { |
- // SiteIsolationPolicy is off by default. We would like to activate cross-site |
- // document blocking (for UMA data collection) for normal renderer processes |
- // running a normal web page from the Internet. We only turn on |
- // SiteIsolationPolicy for a renderer process that does not have the extension |
- // flag on. |
+bool ChromeContentRendererClient::ShouldGatherSiteIsolationStats() const { |
+ // Site isolation stats are gathered currently for non-extension renderer |
+ // processes running a normal web page from the Internet. |
+ // TODO(nick): https://crbug.com/268640 Gather stats for extension processes |
+ // too; we would need to check the extension's manifest to know which sites |
+ // it's allowed to access. |
#if defined(ENABLE_EXTENSIONS) |
base::CommandLine* command_line = base::CommandLine::ForCurrentProcess(); |
return !command_line->HasSwitch(extensions::switches::kExtensionProcess); |