| Index: extensions/browser/api/web_request/web_request_permissions.cc
|
| diff --git a/extensions/browser/api/web_request/web_request_permissions.cc b/extensions/browser/api/web_request/web_request_permissions.cc
|
| index ccfe22ba48e4572d463701f67c91c540220beaea..a683ec3a66b7ed3e021bba438a91301488a6c019 100644
|
| --- a/extensions/browser/api/web_request/web_request_permissions.cc
|
| +++ b/extensions/browser/api/web_request/web_request_permissions.cc
|
| @@ -19,6 +19,7 @@
|
| #include "extensions/common/permissions/permissions_data.h"
|
| #include "net/url_request/url_request.h"
|
| #include "url/gurl.h"
|
| +#include "url/origin.h"
|
|
|
| #if defined(OS_CHROMEOS)
|
| #include "chromeos/login/login_state.h"
|
| @@ -150,8 +151,7 @@
|
| const GURL& url,
|
| int tab_id,
|
| bool crosses_incognito,
|
| - HostPermissionsCheck host_permissions_check,
|
| - const base::Optional<url::Origin>& initiator) {
|
| + HostPermissionsCheck host_permissions_check) {
|
| // extension_info_map can be NULL in testing.
|
| if (!extension_info_map)
|
| return PermissionsData::ACCESS_ALLOWED;
|
| @@ -159,12 +159,6 @@
|
| const extensions::Extension* extension =
|
| extension_info_map->extensions().GetByID(extension_id);
|
| if (!extension)
|
| - return PermissionsData::ACCESS_DENIED;
|
| -
|
| - // Prevent viewing / modifying requests initiated by a host protected by
|
| - // policy.
|
| - if (initiator && extension->permissions_data()->IsRuntimeBlockedHost(
|
| - initiator->GetPhysicalOrigin().GetURL()))
|
| return PermissionsData::ACCESS_DENIED;
|
|
|
| // When we are in a Public Session, allow all URLs for webRequests initiated
|
|
|