| Index: chrome/browser/browser_process_impl.cc
|
| diff --git a/chrome/browser/browser_process_impl.cc b/chrome/browser/browser_process_impl.cc
|
| index a0d1638fd5f2b85bb1981b1b0be0f4c7faf05893..7f1689a149734d91154fd838fba6a58514b1dab0 100644
|
| --- a/chrome/browser/browser_process_impl.cc
|
| +++ b/chrome/browser/browser_process_impl.cc
|
| @@ -21,7 +21,6 @@
|
| #include "base/location.h"
|
| #include "base/macros.h"
|
| #include "base/memory/ptr_util.h"
|
| -#include "base/metrics/field_trial.h"
|
| #include "base/metrics/histogram_macros.h"
|
| #include "base/path_service.h"
|
| #include "base/single_thread_task_runner.h"
|
| @@ -1078,18 +1077,10 @@ void BrowserProcessImpl::CreateLocalState() {
|
|
|
| void BrowserProcessImpl::PreCreateThreads() {
|
| #if BUILDFLAG(ENABLE_EXTENSIONS)
|
| - // Register the chrome-extension scheme to reflect the extension process
|
| - // model. Controlled by a field trial, so we can't do this earlier.
|
| - base::FieldTrialList::FindFullName("SiteIsolationExtensions");
|
| - if (extensions::IsIsolateExtensionsEnabled()) {
|
| - // chrome-extension:// URLs are safe to request anywhere, but may only
|
| - // commit (including in iframes) in extension processes.
|
| - ChildProcessSecurityPolicy::GetInstance()->RegisterWebSafeIsolatedScheme(
|
| - extensions::kExtensionScheme, true);
|
| - } else {
|
| - ChildProcessSecurityPolicy::GetInstance()->RegisterWebSafeScheme(
|
| - extensions::kExtensionScheme);
|
| - }
|
| + // chrome-extension:// URLs are safe to request anywhere, but may only
|
| + // commit (including in iframes) in extension processes.
|
| + ChildProcessSecurityPolicy::GetInstance()->RegisterWebSafeIsolatedScheme(
|
| + extensions::kExtensionScheme, true);
|
| #endif
|
|
|
| io_thread_.reset(
|
|
|