Index: extensions/browser/api/web_request/web_request_permissions.cc |
diff --git a/extensions/browser/api/web_request/web_request_permissions.cc b/extensions/browser/api/web_request/web_request_permissions.cc |
index ccfe22ba48e4572d463701f67c91c540220beaea..a683ec3a66b7ed3e021bba438a91301488a6c019 100644 |
--- a/extensions/browser/api/web_request/web_request_permissions.cc |
+++ b/extensions/browser/api/web_request/web_request_permissions.cc |
@@ -19,6 +19,7 @@ |
#include "extensions/common/permissions/permissions_data.h" |
#include "net/url_request/url_request.h" |
#include "url/gurl.h" |
+#include "url/origin.h" |
#if defined(OS_CHROMEOS) |
#include "chromeos/login/login_state.h" |
@@ -150,8 +151,7 @@ |
const GURL& url, |
int tab_id, |
bool crosses_incognito, |
- HostPermissionsCheck host_permissions_check, |
- const base::Optional<url::Origin>& initiator) { |
+ HostPermissionsCheck host_permissions_check) { |
// extension_info_map can be NULL in testing. |
if (!extension_info_map) |
return PermissionsData::ACCESS_ALLOWED; |
@@ -159,12 +159,6 @@ |
const extensions::Extension* extension = |
extension_info_map->extensions().GetByID(extension_id); |
if (!extension) |
- return PermissionsData::ACCESS_DENIED; |
- |
- // Prevent viewing / modifying requests initiated by a host protected by |
- // policy. |
- if (initiator && extension->permissions_data()->IsRuntimeBlockedHost( |
- initiator->GetPhysicalOrigin().GetURL())) |
return PermissionsData::ACCESS_DENIED; |
// When we are in a Public Session, allow all URLs for webRequests initiated |