Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(5)

Side by Side Diff: chrome/common/extensions/permissions/permission_set_unittest.cc

Issue 12381035: Move Mime type handling to streamsPrivate API, so that it works on Desktop Chrome. (Closed) Base URL: http://git.chromium.org/chromium/src.git@master
Patch Set: Initialize test variable Created 7 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/command_line.h" 5 #include "base/command_line.h"
6 #include "base/json/json_file_value_serializer.h" 6 #include "base/json/json_file_value_serializer.h"
7 #include "base/logging.h" 7 #include "base/logging.h"
8 #include "base/path_service.h" 8 #include "base/path_service.h"
9 #include "base/utf_string_conversions.h" 9 #include "base/utf_string_conversions.h"
10 #include "chrome/common/chrome_paths.h" 10 #include "chrome/common/chrome_paths.h"
(...skipping 711 matching lines...) Expand 10 before | Expand all | Expand 10 after
722 skip.insert(APIPermission::kEchoPrivate); 722 skip.insert(APIPermission::kEchoPrivate);
723 skip.insert(APIPermission::kFileBrowserHandlerInternal); 723 skip.insert(APIPermission::kFileBrowserHandlerInternal);
724 skip.insert(APIPermission::kFileBrowserPrivate); 724 skip.insert(APIPermission::kFileBrowserPrivate);
725 skip.insert(APIPermission::kInputMethodPrivate); 725 skip.insert(APIPermission::kInputMethodPrivate);
726 skip.insert(APIPermission::kManagedModePrivate); 726 skip.insert(APIPermission::kManagedModePrivate);
727 skip.insert(APIPermission::kMediaGalleriesPrivate); 727 skip.insert(APIPermission::kMediaGalleriesPrivate);
728 skip.insert(APIPermission::kMediaPlayerPrivate); 728 skip.insert(APIPermission::kMediaPlayerPrivate);
729 skip.insert(APIPermission::kMetricsPrivate); 729 skip.insert(APIPermission::kMetricsPrivate);
730 skip.insert(APIPermission::kNetworkingPrivate); 730 skip.insert(APIPermission::kNetworkingPrivate);
731 skip.insert(APIPermission::kRtcPrivate); 731 skip.insert(APIPermission::kRtcPrivate);
732 skip.insert(APIPermission::kStreamsPrivate);
732 skip.insert(APIPermission::kSystemPrivate); 733 skip.insert(APIPermission::kSystemPrivate);
733 skip.insert(APIPermission::kTerminalPrivate); 734 skip.insert(APIPermission::kTerminalPrivate);
734 skip.insert(APIPermission::kWallpaperPrivate); 735 skip.insert(APIPermission::kWallpaperPrivate);
735 skip.insert(APIPermission::kWebRequestInternal); 736 skip.insert(APIPermission::kWebRequestInternal);
736 skip.insert(APIPermission::kWebSocketProxyPrivate); 737 skip.insert(APIPermission::kWebSocketProxyPrivate);
737 skip.insert(APIPermission::kWebstorePrivate); 738 skip.insert(APIPermission::kWebstorePrivate);
738 739
739 // Available only on trunk. 740 // Available only on trunk.
740 // TODO(kinuko) add a string for this permission. 741 // TODO(kinuko) add a string for this permission.
741 skip.insert(APIPermission::kSyncFileSystem); 742 skip.insert(APIPermission::kSyncFileSystem);
(...skipping 627 matching lines...) Expand 10 before | Expand all | Expand 10 after
1369 apis.insert(APIPermission::kWebRequest); 1370 apis.insert(APIPermission::kWebRequest);
1370 apis.insert(APIPermission::kFileBrowserHandler); 1371 apis.insert(APIPermission::kFileBrowserHandler);
1371 EXPECT_EQ(2U, apis.size()); 1372 EXPECT_EQ(2U, apis.size());
1372 1373
1373 scoped_refptr<PermissionSet> perm_set; 1374 scoped_refptr<PermissionSet> perm_set;
1374 perm_set = new PermissionSet(apis, empty_extent, empty_extent); 1375 perm_set = new PermissionSet(apis, empty_extent, empty_extent);
1375 EXPECT_EQ(4U, perm_set->apis().size()); 1376 EXPECT_EQ(4U, perm_set->apis().size());
1376 } 1377 }
1377 1378
1378 } // namespace extensions 1379 } // namespace extensions
OLDNEW
« no previous file with comments | « chrome/common/extensions/permissions/api_permission.cc ('k') | chrome/common/extensions_api_resources.grd » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698