| Index: chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc
|
| diff --git a/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc b/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc
|
| index 5df284b55b63d5be0be834780a18ba36f29a8082..f8d784559e7f6ab7ee419676a0c6936397f8208a 100644
|
| --- a/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc
|
| +++ b/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc
|
| @@ -102,7 +102,7 @@ TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) {
|
| for (size_t i = 0; i < arraysize(sensitive_urls); ++i) {
|
| GURL sensitive_url(sensitive_urls[i]);
|
| scoped_ptr<net::URLRequest> request(context.CreateRequest(
|
| - sensitive_url, net::DEFAULT_PRIORITY, NULL, NULL));
|
| + sensitive_url, net::DEFAULT_PRIORITY, NULL));
|
| EXPECT_TRUE(WebRequestPermissions::HideRequest(
|
| extension_info_map_.get(), request.get())) << sensitive_urls[i];
|
| }
|
| @@ -110,7 +110,7 @@ TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) {
|
| for (size_t i = 0; i < arraysize(non_sensitive_urls); ++i) {
|
| GURL non_sensitive_url(non_sensitive_urls[i]);
|
| scoped_ptr<net::URLRequest> request(context.CreateRequest(
|
| - non_sensitive_url, net::DEFAULT_PRIORITY, NULL, NULL));
|
| + non_sensitive_url, net::DEFAULT_PRIORITY, NULL));
|
| EXPECT_FALSE(WebRequestPermissions::HideRequest(
|
| extension_info_map_.get(), request.get())) << non_sensitive_urls[i];
|
| }
|
| @@ -120,7 +120,7 @@ TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) {
|
| // Normally this request is not protected:
|
| GURL non_sensitive_url("http://www.google.com/test.js");
|
| scoped_ptr<net::URLRequest> non_sensitive_request(context.CreateRequest(
|
| - non_sensitive_url, net::DEFAULT_PRIORITY, NULL, NULL));
|
| + non_sensitive_url, net::DEFAULT_PRIORITY, NULL));
|
| EXPECT_FALSE(WebRequestPermissions::HideRequest(
|
| extension_info_map_.get(), non_sensitive_request.get()));
|
| // If the origin is labeled by the WebStoreAppId, it becomes protected.
|
| @@ -129,7 +129,7 @@ TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) {
|
| int site_instance_id = 23;
|
| int view_id = 17;
|
| scoped_ptr<net::URLRequest> sensitive_request(context.CreateRequest(
|
| - non_sensitive_url, net::DEFAULT_PRIORITY, NULL, NULL));
|
| + non_sensitive_url, net::DEFAULT_PRIORITY, NULL));
|
| ResourceRequestInfo::AllocateForTesting(sensitive_request.get(),
|
| content::RESOURCE_TYPE_SCRIPT,
|
| NULL,
|
| @@ -150,7 +150,7 @@ TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) {
|
| int process_id = kSigninProcessId;
|
| int view_id = 19;
|
| scoped_ptr<net::URLRequest> sensitive_request(context.CreateRequest(
|
| - non_sensitive_url, net::DEFAULT_PRIORITY, NULL, NULL));
|
| + non_sensitive_url, net::DEFAULT_PRIORITY, NULL));
|
| ResourceRequestInfo::AllocateForTesting(sensitive_request.get(),
|
| content::RESOURCE_TYPE_SCRIPT,
|
| NULL,
|
| @@ -169,7 +169,7 @@ TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) {
|
| TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest,
|
| TestCanExtensionAccessURL_HostPermissions) {
|
| scoped_ptr<net::URLRequest> request(context.CreateRequest(
|
| - GURL("http://example.com"), net::DEFAULT_PRIORITY, NULL, NULL));
|
| + GURL("http://example.com"), net::DEFAULT_PRIORITY, NULL));
|
|
|
| EXPECT_TRUE(WebRequestPermissions::CanExtensionAccessURL(
|
| extension_info_map_.get(),
|
|
|