| Index: content/browser/site_instance_unittest.cc
|
| ===================================================================
|
| --- content/browser/site_instance_unittest.cc (revision 110571)
|
| +++ content/browser/site_instance_unittest.cc (working copy)
|
| @@ -9,7 +9,7 @@
|
| #include "content/browser/browsing_instance.h"
|
| #include "content/browser/child_process_security_policy.h"
|
| #include "content/browser/mock_content_browser_client.h"
|
| -#include "content/browser/renderer_host/browser_render_process_host.h"
|
| +#include "content/browser/renderer_host/render_process_host_impl.h"
|
| #include "content/browser/renderer_host/render_view_host.h"
|
| #include "content/browser/renderer_host/test_render_view_host.h"
|
| #include "content/browser/site_instance.h"
|
| @@ -68,9 +68,9 @@
|
| url == GURL(chrome::kAboutCrashURL);
|
| }
|
|
|
| - virtual bool IsSuitableHost(RenderProcessHost* process_host,
|
| + virtual bool IsSuitableHost(content::RenderProcessHost* process_host,
|
| const GURL& site_url) OVERRIDE {
|
| - return (privileged_process_id_ == process_host->id()) ==
|
| + return (privileged_process_id_ == process_host->GetID()) ==
|
| site_url.SchemeIs(kPrivilegedScheme);
|
| }
|
|
|
| @@ -295,7 +295,7 @@
|
| TEST_F(SiteInstanceTest, GetProcess) {
|
| // Ensure that GetProcess returns a process.
|
| scoped_ptr<TestBrowserContext> browser_context(new TestBrowserContext());
|
| - scoped_ptr<RenderProcessHost> host1;
|
| + scoped_ptr<content::RenderProcessHost> host1;
|
| scoped_refptr<SiteInstance> instance(
|
| SiteInstance::CreateSiteInstance(browser_context.get()));
|
| host1.reset(instance->GetProcess());
|
| @@ -304,7 +304,7 @@
|
| // Ensure that GetProcess creates a new process.
|
| scoped_refptr<SiteInstance> instance2(
|
| SiteInstance::CreateSiteInstance(browser_context.get()));
|
| - scoped_ptr<RenderProcessHost> host2(instance2->GetProcess());
|
| + scoped_ptr<content::RenderProcessHost> host2(instance2->GetProcess());
|
| EXPECT_TRUE(host2.get() != NULL);
|
| EXPECT_NE(host1.get(), host2.get());
|
| }
|
| @@ -514,8 +514,8 @@
|
| // browsing_instances will be deleted when their SiteInstances are deleted
|
| }
|
|
|
| -static SiteInstance* CreateSiteInstance(RenderProcessHostFactory* factory,
|
| - const GURL& url) {
|
| +static SiteInstance* CreateSiteInstance(
|
| + content::RenderProcessHostFactory* factory, const GURL& url) {
|
| SiteInstance* instance = SiteInstance::CreateSiteInstanceForURL(NULL, url);
|
| instance->set_render_process_host_factory(factory);
|
| return instance;
|
| @@ -537,13 +537,13 @@
|
| scoped_refptr<SiteInstance> extension1_instance(
|
| CreateSiteInstance(&rph_factory,
|
| GURL(kPrivilegedScheme + std::string("://foo/bar"))));
|
| - SetPrivilegedProcessId(extension1_instance->GetProcess()->id());
|
| + SetPrivilegedProcessId(extension1_instance->GetProcess()->GetID());
|
|
|
| scoped_refptr<SiteInstance> extension2_instance(
|
| CreateSiteInstance(&rph_factory,
|
| GURL(kPrivilegedScheme + std::string("://baz/bar"))));
|
|
|
| - scoped_ptr<RenderProcessHost> extension_host(
|
| + scoped_ptr<content::RenderProcessHost> extension_host(
|
| extension1_instance->GetProcess());
|
| EXPECT_EQ(extension1_instance->GetProcess(),
|
| extension2_instance->GetProcess());
|
| @@ -551,12 +551,13 @@
|
| // Create some WebUI instances and make sure they share a process.
|
| scoped_refptr<SiteInstance> webui1_instance(CreateSiteInstance(&rph_factory,
|
| GURL(chrome::kChromeUIScheme + std::string("://newtab"))));
|
| - policy->GrantWebUIBindings(webui1_instance->GetProcess()->id());
|
| + policy->GrantWebUIBindings(webui1_instance->GetProcess()->GetID());
|
|
|
| scoped_refptr<SiteInstance> webui2_instance( CreateSiteInstance(&rph_factory,
|
| GURL(chrome::kChromeUIScheme + std::string("://history"))));
|
|
|
| - scoped_ptr<RenderProcessHost> dom_host(webui1_instance->GetProcess());
|
| + scoped_ptr<content::RenderProcessHost> dom_host(
|
| + webui1_instance->GetProcess());
|
| EXPECT_EQ(webui1_instance->GetProcess(), webui2_instance->GetProcess());
|
|
|
| // Make sure none of differing privilege processes are mixed.
|
|
|