Index: chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc |
diff --git a/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc b/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc |
index 50278908f83fe53878a59678390565f9eb0147b7..af510af86735240e7a438e069a3b5efb0fdc04f1 100644 |
--- a/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc |
+++ b/chrome/browser/extensions/api/web_request/web_request_permissions_unittest.cc |
@@ -100,7 +100,7 @@ TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) { |
for (size_t i = 0; i < arraysize(sensitive_urls); ++i) { |
GURL sensitive_url(sensitive_urls[i]); |
scoped_ptr<net::URLRequest> request(context.CreateRequest( |
- sensitive_url, net::DEFAULT_PRIORITY, NULL, NULL)); |
+ sensitive_url, net::DEFAULT_PRIORITY, NULL)); |
EXPECT_TRUE(WebRequestPermissions::HideRequest( |
extension_info_map_.get(), request.get())) << sensitive_urls[i]; |
} |
@@ -108,7 +108,7 @@ TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) { |
for (size_t i = 0; i < arraysize(non_sensitive_urls); ++i) { |
GURL non_sensitive_url(non_sensitive_urls[i]); |
scoped_ptr<net::URLRequest> request(context.CreateRequest( |
- non_sensitive_url, net::DEFAULT_PRIORITY, NULL, NULL)); |
+ non_sensitive_url, net::DEFAULT_PRIORITY, NULL)); |
EXPECT_FALSE(WebRequestPermissions::HideRequest( |
extension_info_map_.get(), request.get())) << non_sensitive_urls[i]; |
} |
@@ -118,7 +118,7 @@ TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) { |
// Normally this request is not protected: |
GURL non_sensitive_url("http://www.google.com/test.js"); |
scoped_ptr<net::URLRequest> non_sensitive_request(context.CreateRequest( |
- non_sensitive_url, net::DEFAULT_PRIORITY, NULL, NULL)); |
+ non_sensitive_url, net::DEFAULT_PRIORITY, NULL)); |
EXPECT_FALSE(WebRequestPermissions::HideRequest( |
extension_info_map_.get(), non_sensitive_request.get())); |
// If the origin is labeled by the WebStoreAppId, it becomes protected. |
@@ -127,7 +127,7 @@ TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) { |
int site_instance_id = 23; |
int view_id = 17; |
scoped_ptr<net::URLRequest> sensitive_request(context.CreateRequest( |
- non_sensitive_url, net::DEFAULT_PRIORITY, NULL, NULL)); |
+ non_sensitive_url, net::DEFAULT_PRIORITY, NULL)); |
ResourceRequestInfo::AllocateForTesting(sensitive_request.get(), |
content::RESOURCE_TYPE_SCRIPT, |
NULL, |
@@ -148,7 +148,7 @@ TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, TestHideRequestForURL) { |
TEST_F(ExtensionWebRequestHelpersTestWithThreadsTest, |
TestCanExtensionAccessURL_HostPermissions) { |
scoped_ptr<net::URLRequest> request(context.CreateRequest( |
- GURL("http://example.com"), net::DEFAULT_PRIORITY, NULL, NULL)); |
+ GURL("http://example.com"), net::DEFAULT_PRIORITY, NULL)); |
EXPECT_TRUE(WebRequestPermissions::CanExtensionAccessURL( |
extension_info_map_.get(), |