Index: chrome/browser/browser_process_impl.cc |
diff --git a/chrome/browser/browser_process_impl.cc b/chrome/browser/browser_process_impl.cc |
index a0d1638fd5f2b85bb1981b1b0be0f4c7faf05893..7f1689a149734d91154fd838fba6a58514b1dab0 100644 |
--- a/chrome/browser/browser_process_impl.cc |
+++ b/chrome/browser/browser_process_impl.cc |
@@ -21,7 +21,6 @@ |
#include "base/location.h" |
#include "base/macros.h" |
#include "base/memory/ptr_util.h" |
-#include "base/metrics/field_trial.h" |
#include "base/metrics/histogram_macros.h" |
#include "base/path_service.h" |
#include "base/single_thread_task_runner.h" |
@@ -1078,18 +1077,10 @@ void BrowserProcessImpl::CreateLocalState() { |
void BrowserProcessImpl::PreCreateThreads() { |
#if BUILDFLAG(ENABLE_EXTENSIONS) |
- // Register the chrome-extension scheme to reflect the extension process |
- // model. Controlled by a field trial, so we can't do this earlier. |
- base::FieldTrialList::FindFullName("SiteIsolationExtensions"); |
- if (extensions::IsIsolateExtensionsEnabled()) { |
- // chrome-extension:// URLs are safe to request anywhere, but may only |
- // commit (including in iframes) in extension processes. |
- ChildProcessSecurityPolicy::GetInstance()->RegisterWebSafeIsolatedScheme( |
- extensions::kExtensionScheme, true); |
- } else { |
- ChildProcessSecurityPolicy::GetInstance()->RegisterWebSafeScheme( |
- extensions::kExtensionScheme); |
- } |
+ // chrome-extension:// URLs are safe to request anywhere, but may only |
+ // commit (including in iframes) in extension processes. |
+ ChildProcessSecurityPolicy::GetInstance()->RegisterWebSafeIsolatedScheme( |
+ extensions::kExtensionScheme, true); |
#endif |
io_thread_.reset( |