| Index: chrome/browser/extensions/api/storage/policy_value_store.cc
|
| diff --git a/chrome/browser/extensions/api/storage/policy_value_store.cc b/chrome/browser/extensions/api/storage/policy_value_store.cc
|
| index 9691e2bf01c832a43b7e6db4d6c8710d2d7858f6..f5da68205785a23105b728cac0fa2feef3c39eba 100644
|
| --- a/chrome/browser/extensions/api/storage/policy_value_store.cc
|
| +++ b/chrome/browser/extensions/api/storage/policy_value_store.cc
|
| @@ -57,17 +57,6 @@
|
| // must be removed.
|
| base::DictionaryValue previous_policy;
|
| ValueStore::ReadResult read_result = delegate_->Get();
|
| -
|
| - // If the database is corrupted, try to restore it.
|
| - // This may have the unfortunate side-effect of incorrectly informing the
|
| - // extension of a "new" key, which isn't new and was corrupted. Unfortunately,
|
| - // there's not always a way around this - if the database is corrupted, there
|
| - // may be no way of telling which keys were previously present.
|
| - if (read_result->IsCorrupted()) {
|
| - if (delegate_->Restore())
|
| - read_result = delegate_->Get();
|
| - }
|
| -
|
| if (read_result->HasError()) {
|
| LOG(WARNING) << "Failed to read managed settings for extension "
|
| << extension_id_ << ": " << read_result->error().message;
|
| @@ -172,10 +161,4 @@
|
| return MakeWriteResult(ReadOnlyError(util::NoKey()));
|
| }
|
|
|
| -bool PolicyValueStore::Restore() { return delegate_->Restore(); }
|
| -
|
| -bool PolicyValueStore::RestoreKey(const std::string& key) {
|
| - return delegate_->RestoreKey(key);
|
| -}
|
| -
|
| } // namespace extensions
|
|
|