| Index: chrome/browser/extensions/extension_service_unittest.cc
|
| diff --git a/chrome/browser/extensions/extension_service_unittest.cc b/chrome/browser/extensions/extension_service_unittest.cc
|
| index 68f942949f945858d85b527bccf4a702379ae17b..d40ebf19d75e8436f5d83d0df7a81937685139ac 100644
|
| --- a/chrome/browser/extensions/extension_service_unittest.cc
|
| +++ b/chrome/browser/extensions/extension_service_unittest.cc
|
| @@ -792,10 +792,10 @@ class ExtensionServiceTest : public extensions::ExtensionServiceTestBase,
|
| // set for extension |id|.
|
| void GrantAllOptionalPermissions(const std::string& id) {
|
| const Extension* extension = service()->GetInstalledExtension(id);
|
| - scoped_refptr<const PermissionSet> all_optional_permissions =
|
| + const PermissionSet* all_optional_permissions =
|
| extensions::PermissionsParser::GetOptionalPermissions(extension);
|
| extensions::PermissionsUpdater perms_updater(profile());
|
| - perms_updater.AddPermissions(extension, all_optional_permissions.get());
|
| + perms_updater.AddPermissions(extension, all_optional_permissions);
|
| }
|
|
|
| // Helper method to set up a WindowedNotificationObserver to wait for a
|
| @@ -1851,9 +1851,7 @@ TEST_F(ExtensionServiceTest, GrantedPermissions) {
|
|
|
| // Make sure there aren't any granted permissions before the
|
| // extension is installed.
|
| - scoped_refptr<const PermissionSet> known_perms(
|
| - prefs->GetGrantedPermissions(permissions_crx));
|
| - EXPECT_FALSE(known_perms.get());
|
| + EXPECT_FALSE(prefs->GetGrantedPermissions(permissions_crx).get());
|
|
|
| const Extension* extension = PackAndInstallCRX(path, pem_path, INSTALL_NEW);
|
|
|
| @@ -1869,7 +1867,8 @@ TEST_F(ExtensionServiceTest, GrantedPermissions) {
|
| AddPattern(&expected_host_perms, "http://*.google.com.hk/*");
|
| AddPattern(&expected_host_perms, "http://www.example.com/*");
|
|
|
| - known_perms = prefs->GetGrantedPermissions(extension->id());
|
| + scoped_ptr<const PermissionSet> known_perms =
|
| + prefs->GetGrantedPermissions(extension->id());
|
| EXPECT_TRUE(known_perms.get());
|
| EXPECT_FALSE(known_perms->IsEmpty());
|
| EXPECT_EQ(expected_api_perms, known_perms->apis());
|
| @@ -1898,9 +1897,7 @@ TEST_F(ExtensionServiceTest, DefaultAppsGrantedPermissions) {
|
|
|
| // Make sure there aren't any granted permissions before the
|
| // extension is installed.
|
| - scoped_refptr<const PermissionSet> known_perms(
|
| - prefs->GetGrantedPermissions(permissions_crx));
|
| - EXPECT_FALSE(known_perms.get());
|
| + EXPECT_FALSE(prefs->GetGrantedPermissions(permissions_crx).get());
|
|
|
| const Extension* extension = PackAndInstallCRX(
|
| path, pem_path, INSTALL_NEW, Extension::WAS_INSTALLED_BY_DEFAULT);
|
| @@ -1912,7 +1909,8 @@ TEST_F(ExtensionServiceTest, DefaultAppsGrantedPermissions) {
|
| // Verify that the valid API permissions have been recognized.
|
| expected_api_perms.insert(APIPermission::kTab);
|
|
|
| - known_perms = prefs->GetGrantedPermissions(extension->id());
|
| + scoped_ptr<const PermissionSet> known_perms =
|
| + prefs->GetGrantedPermissions(extension->id());
|
| EXPECT_TRUE(known_perms.get());
|
| EXPECT_FALSE(known_perms->IsEmpty());
|
| EXPECT_EQ(expected_api_perms, known_perms->apis());
|
| @@ -1935,8 +1933,8 @@ TEST_F(ExtensionServiceTest, GrantedFullAccessPermissions) {
|
| EXPECT_EQ(1u, registry()->enabled_extensions().size());
|
| ExtensionPrefs* prefs = ExtensionPrefs::Get(profile());
|
|
|
| - scoped_refptr<const PermissionSet> permissions(
|
| - prefs->GetGrantedPermissions(extension->id()));
|
| + scoped_ptr<const PermissionSet> permissions =
|
| + prefs->GetGrantedPermissions(extension->id());
|
| EXPECT_FALSE(permissions->IsEmpty());
|
| EXPECT_TRUE(permissions->HasEffectiveFullAccess());
|
| EXPECT_FALSE(permissions->apis().empty());
|
| @@ -1998,8 +1996,8 @@ TEST_F(ExtensionServiceTest, GrantedAPIAndHostPermissions) {
|
| ASSERT_TRUE(service()->IsExtensionEnabled(extension_id));
|
| ASSERT_FALSE(prefs->DidExtensionEscalatePermissions(extension_id));
|
|
|
| - scoped_refptr<const PermissionSet> current_perms(
|
| - prefs->GetGrantedPermissions(extension_id));
|
| + scoped_ptr<const PermissionSet> current_perms =
|
| + prefs->GetGrantedPermissions(extension_id);
|
| ASSERT_TRUE(current_perms.get());
|
| ASSERT_FALSE(current_perms->IsEmpty());
|
| ASSERT_FALSE(current_perms->HasEffectiveFullAccess());
|
| @@ -2893,8 +2891,8 @@ TEST_F(ExtensionServiceTest, LoadExtensionsWithPlugins) {
|
| EXPECT_TRUE(registry()->enabled_extensions().Contains(good2));
|
|
|
| // Make sure the granted permissions have been setup.
|
| - scoped_refptr<const PermissionSet> permissions(
|
| - ExtensionPrefs::Get(profile())->GetGrantedPermissions(good1));
|
| + scoped_ptr<const PermissionSet> permissions =
|
| + ExtensionPrefs::Get(profile())->GetGrantedPermissions(good1);
|
| EXPECT_FALSE(permissions->IsEmpty());
|
| EXPECT_TRUE(permissions->HasEffectiveFullAccess());
|
| EXPECT_FALSE(permissions->apis().empty());
|
| @@ -4282,8 +4280,8 @@ TEST_F(ExtensionServiceTest, PolicyBlockedPermissionPolicyUpdate) {
|
| GrantAllOptionalPermissions(ext2);
|
| GrantAllOptionalPermissions(ext2_forced);
|
|
|
| - scoped_refptr<const PermissionSet> active_permissions(
|
| - ExtensionPrefs::Get(profile())->GetActivePermissions(ext1));
|
| + scoped_ptr<const PermissionSet> active_permissions =
|
| + ExtensionPrefs::Get(profile())->GetActivePermissions(ext1);
|
| EXPECT_TRUE(active_permissions->HasAPIPermission(
|
| extensions::APIPermission::kDownloads));
|
|
|
| @@ -6616,8 +6614,8 @@ TEST_F(ExtensionServiceTest, ProcessSyncDataNewExtension) {
|
| : DISABLED);
|
| EXPECT_EQ(test_case.expect_disable_reasons,
|
| prefs->GetDisableReasons(good_crx));
|
| - scoped_refptr<const PermissionSet> permissions(
|
| - prefs->GetGrantedPermissions(good_crx));
|
| + scoped_ptr<const PermissionSet> permissions =
|
| + prefs->GetGrantedPermissions(good_crx);
|
| EXPECT_EQ(test_case.expect_permissions_granted, !permissions->IsEmpty());
|
| ASSERT_FALSE(service()->pending_extension_manager()->IsIdPending(good_crx));
|
|
|
| @@ -6961,8 +6959,8 @@ TEST_F(ExtensionServiceTest, ProcessSyncDataPermissionApproval) {
|
| }
|
| ASSERT_TRUE(registry()->enabled_extensions().Contains(id));
|
|
|
| - scoped_refptr<const PermissionSet> granted_permissions_v1(
|
| - prefs->GetGrantedPermissions(id));
|
| + scoped_ptr<const PermissionSet> granted_permissions_v1 =
|
| + prefs->GetGrantedPermissions(id);
|
|
|
| // Update to a new version with increased permissions.
|
| UpdateExtension(id, crx_path_v2, DISABLED);
|
| @@ -6978,8 +6976,8 @@ TEST_F(ExtensionServiceTest, ProcessSyncDataPermissionApproval) {
|
| id, Extension::DISABLE_PERMISSIONS_INCREASE));
|
|
|
| // No new permissions should have been granted.
|
| - scoped_refptr<const PermissionSet> granted_permissions_v2(
|
| - prefs->GetGrantedPermissions(id));
|
| + scoped_ptr<const PermissionSet> granted_permissions_v2 =
|
| + prefs->GetGrantedPermissions(id);
|
| ASSERT_EQ(*granted_permissions_v1, *granted_permissions_v2);
|
|
|
| // Now a sync update comes in.
|
| @@ -7001,11 +6999,11 @@ TEST_F(ExtensionServiceTest, ProcessSyncDataPermissionApproval) {
|
|
|
| // Check expectations.
|
| EXPECT_TRUE(registry()->GetExtensionById(id, ExtensionRegistry::ENABLED));
|
| - scoped_refptr<const PermissionSet> granted_permissions(
|
| - prefs->GetGrantedPermissions(id));
|
| + scoped_ptr<const PermissionSet> granted_permissions =
|
| + prefs->GetGrantedPermissions(id);
|
| if (test_case.expect_permissions_granted) {
|
| - scoped_refptr<const PermissionSet> active_permissions(
|
| - prefs->GetActivePermissions(id));
|
| + scoped_ptr<const PermissionSet> active_permissions =
|
| + prefs->GetActivePermissions(id);
|
| EXPECT_EQ(*granted_permissions, *active_permissions);
|
| } else {
|
| EXPECT_EQ(*granted_permissions, *granted_permissions_v1);
|
|
|