Index: chrome/common/extensions/csp_validator_unittest.cc |
diff --git a/chrome/common/extensions/csp_validator_unittest.cc b/chrome/common/extensions/csp_validator_unittest.cc |
index e96c42da0d0efeedd2c0c8fd1d24a698ec67ba19..13cbfe80174feee164e09ecb903e32c1d621e626 100644 |
--- a/chrome/common/extensions/csp_validator_unittest.cc |
+++ b/chrome/common/extensions/csp_validator_unittest.cc |
@@ -23,10 +23,10 @@ TEST(ExtensionCSPValidator, IsLegal) { |
} |
TEST(ExtensionCSPValidator, IsSecure) { |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "", Manifest::TYPE_EXTENSION)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
- "img-src https://google.com", Manifest::TYPE_EXTENSION)); |
+ EXPECT_FALSE( |
+ ContentSecurityPolicyIsSecure(std::string(), Manifest::TYPE_EXTENSION)); |
+ EXPECT_FALSE(ContentSecurityPolicyIsSecure("img-src https://google.com", |
+ Manifest::TYPE_EXTENSION)); |
EXPECT_FALSE(ContentSecurityPolicyIsSecure( |
"default-src *", Manifest::TYPE_EXTENSION)); |
@@ -146,9 +146,10 @@ TEST(ExtensionCSPValidator, IsSecure) { |
} |
TEST(ExtensionCSPValidator, IsSandboxed) { |
- EXPECT_FALSE(ContentSecurityPolicyIsSandboxed("", Manifest::TYPE_EXTENSION)); |
- EXPECT_FALSE(ContentSecurityPolicyIsSandboxed( |
- "img-src https://google.com", Manifest::TYPE_EXTENSION)); |
+ EXPECT_FALSE(ContentSecurityPolicyIsSandboxed(std::string(), |
+ Manifest::TYPE_EXTENSION)); |
+ EXPECT_FALSE(ContentSecurityPolicyIsSandboxed("img-src https://google.com", |
+ Manifest::TYPE_EXTENSION)); |
// Sandbox directive is required. |
EXPECT_TRUE(ContentSecurityPolicyIsSandboxed( |