Index: content/browser/renderer_host/render_view_host_unittest.cc |
diff --git a/content/browser/renderer_host/render_view_host_unittest.cc b/content/browser/renderer_host/render_view_host_unittest.cc |
index 7e3746cea992fbd9993c2886e1d16bb79e09a9df..610e4a63e7dd0c1cb2b51af8f2e165486a73c276 100644 |
--- a/content/browser/renderer_host/render_view_host_unittest.cc |
+++ b/content/browser/renderer_host/render_view_host_unittest.cc |
@@ -170,9 +170,11 @@ TEST_F(RenderViewHostTest, DragEnteredFileURLsStillBlocked) { |
GURL dragged_file_url = net::FilePathToFileURL(dragged_file_path); |
GURL sensitive_file_url = net::FilePathToFileURL(sensitive_file_path); |
dropped_data.url = highlighted_file_url; |
+ dropped_data.has_url = true; |
dropped_data.filenames.push_back( |
ui::FileInfo(dragged_file_path, base::FilePath())); |
+ rvh()->FilterDropData(&dropped_data); |
rvh()->DragTargetDragEnter(dropped_data, client_point, screen_point, |
blink::WebDragOperationNone, 0); |
@@ -180,10 +182,11 @@ TEST_F(RenderViewHostTest, DragEnteredFileURLsStillBlocked) { |
ChildProcessSecurityPolicyImpl* policy = |
ChildProcessSecurityPolicyImpl::GetInstance(); |
+ // Permissions are not granted at DragEnter. |
EXPECT_FALSE(policy->CanRequestURL(id, highlighted_file_url)); |
EXPECT_FALSE(policy->CanReadFile(id, highlighted_file_path)); |
- EXPECT_TRUE(policy->CanRequestURL(id, dragged_file_url)); |
- EXPECT_TRUE(policy->CanReadFile(id, dragged_file_path)); |
+ EXPECT_FALSE(policy->CanRequestURL(id, dragged_file_url)); |
+ EXPECT_FALSE(policy->CanReadFile(id, dragged_file_path)); |
EXPECT_FALSE(policy->CanRequestURL(id, sensitive_file_url)); |
EXPECT_FALSE(policy->CanReadFile(id, sensitive_file_path)); |
} |