summaryrefslogtreecommitdiffstats
path: root/chrome/renderer/extensions/extension_process_bindings.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chrome/renderer/extensions/extension_process_bindings.cc')
-rw-r--r--chrome/renderer/extensions/extension_process_bindings.cc25
1 files changed, 0 insertions, 25 deletions
diff --git a/chrome/renderer/extensions/extension_process_bindings.cc b/chrome/renderer/extensions/extension_process_bindings.cc
index fed2fe3..bdbb9aa 100644
--- a/chrome/renderer/extensions/extension_process_bindings.cc
+++ b/chrome/renderer/extensions/extension_process_bindings.cc
@@ -63,10 +63,6 @@ typedef std::set<std::string> PermissionsList;
// A map of extension ID to permissions map.
typedef std::map<std::string, PermissionsList> ExtensionPermissionsList;
-// A map of extension ID to whether this extension can access data from other
-// profiles.
-typedef std::map<std::string, bool> CrossIncognitoAccessMap;
-
const char kExtensionName[] = "chrome/ExtensionProcessBindings";
const char* kExtensionDeps[] = {
BaseJsV8Extension::kName,
@@ -80,7 +76,6 @@ struct SingletonData {
std::set<std::string> function_names_;
PageActionIdMap page_action_ids_;
ExtensionPermissionsList permissions_;
- CrossIncognitoAccessMap cross_incognito_access_map_;
};
static std::set<std::string>* GetFunctionNameSet() {
@@ -95,10 +90,6 @@ static PermissionsList* GetPermissionsList(const std::string& extension_id) {
return &Singleton<SingletonData>()->permissions_[extension_id];
}
-static CrossIncognitoAccessMap* GetCrossIncognitoAccessMap() {
- return &Singleton<SingletonData>()->cross_incognito_access_map_;
-}
-
static void GetActiveExtensionIDs(std::set<std::string>* extension_ids) {
ExtensionPermissionsList& permissions =
Singleton<SingletonData>()->permissions_;
@@ -581,22 +572,6 @@ void ExtensionProcessBindings::SetFunctionNames(
ExtensionImpl::SetFunctionNames(names);
}
-void ExtensionProcessBindings::SetIncognitoEnabled(
- const std::string& extension_id, bool enabled, bool incognito_split_mode) {
- // We allow the extension to see events and data from another profile iff it
- // uses "spanning" behavior and it has incognito access. "split" mode
- // extensions only see events for a matching profile.
- (*GetCrossIncognitoAccessMap())[extension_id] =
- enabled && !incognito_split_mode;
-}
-
-// static
-bool ExtensionProcessBindings::AllowCrossIncognito(
- const std::string& extension_id) {
- return (!extension_id.empty() &&
- (*GetCrossIncognitoAccessMap())[extension_id]);
-}
-
// static
void ExtensionProcessBindings::HandleResponse(int request_id, bool success,
const std::string& response,