| Index: chrome/browser/extensions/api/mdns/mdns_api_unittest.cc
|
| diff --git a/chrome/browser/extensions/api/mdns/mdns_api_unittest.cc b/chrome/browser/extensions/api/mdns/mdns_api_unittest.cc
|
| index 962fde4e0ff22ac3f403c97ba734311d81ef5c3e..c69265417e56a505cf3242d66e46607c2e614c42 100644
|
| --- a/chrome/browser/extensions/api/mdns/mdns_api_unittest.cc
|
| +++ b/chrome/browser/extensions/api/mdns/mdns_api_unittest.cc
|
| @@ -376,7 +376,7 @@ TEST_F(MDnsAPITest, ExtensionRespectsWhitelist) {
|
| scoped_refptr<extensions::Extension> extension =
|
| CreateExtension("Dinosaur networker", false, kExtId);
|
| ExtensionRegistry::Get(browser_context())->AddEnabled(extension);
|
| - ASSERT_EQ(Manifest::TYPE_EXTENSION, extension.get()->GetType());
|
| + ASSERT_EQ(Manifest::TYPE_EXTENSION, extension->GetType());
|
|
|
| // There is a whitelist of mdns service types extensions may access, which
|
| // includes "_testing._tcp.local" and exludes "_trex._tcp.local"
|
| @@ -426,7 +426,7 @@ TEST_F(MDnsAPITest, PlatformAppsNotSubjectToWhitelist) {
|
| scoped_refptr<extensions::Extension> extension =
|
| CreateExtension("Dinosaur networker", true, kExtId);
|
| ExtensionRegistry::Get(browser_context())->AddEnabled(extension);
|
| - ASSERT_TRUE(extension.get()->is_platform_app());
|
| + ASSERT_TRUE(extension->is_platform_app());
|
|
|
| base::DictionaryValue filter;
|
| filter.SetString(kEventFilterServiceTypeKey, "_trex._tcp.local");
|
|
|