Index: chrome/browser/extensions/api/mdns/mdns_api_unittest.cc |
diff --git a/chrome/browser/extensions/api/mdns/mdns_api_unittest.cc b/chrome/browser/extensions/api/mdns/mdns_api_unittest.cc |
index 962fde4e0ff22ac3f403c97ba734311d81ef5c3e..c69265417e56a505cf3242d66e46607c2e614c42 100644 |
--- a/chrome/browser/extensions/api/mdns/mdns_api_unittest.cc |
+++ b/chrome/browser/extensions/api/mdns/mdns_api_unittest.cc |
@@ -376,7 +376,7 @@ TEST_F(MDnsAPITest, ExtensionRespectsWhitelist) { |
scoped_refptr<extensions::Extension> extension = |
CreateExtension("Dinosaur networker", false, kExtId); |
ExtensionRegistry::Get(browser_context())->AddEnabled(extension); |
- ASSERT_EQ(Manifest::TYPE_EXTENSION, extension.get()->GetType()); |
+ ASSERT_EQ(Manifest::TYPE_EXTENSION, extension->GetType()); |
// There is a whitelist of mdns service types extensions may access, which |
// includes "_testing._tcp.local" and exludes "_trex._tcp.local" |
@@ -426,7 +426,7 @@ TEST_F(MDnsAPITest, PlatformAppsNotSubjectToWhitelist) { |
scoped_refptr<extensions::Extension> extension = |
CreateExtension("Dinosaur networker", true, kExtId); |
ExtensionRegistry::Get(browser_context())->AddEnabled(extension); |
- ASSERT_TRUE(extension.get()->is_platform_app()); |
+ ASSERT_TRUE(extension->is_platform_app()); |
base::DictionaryValue filter; |
filter.SetString(kEventFilterServiceTypeKey, "_trex._tcp.local"); |