| Index: chrome/browser/browsing_data/chrome_browsing_data_remover_delegate_unittest.cc
|
| diff --git a/chrome/browser/browsing_data/chrome_browsing_data_remover_delegate_unittest.cc b/chrome/browser/browsing_data/chrome_browsing_data_remover_delegate_unittest.cc
|
| index 9b26180312a80bf44653210c5dd9f2fee490453b..1c61a7a3fef3351a1bfd076ae4421f2ec9d562b3 100644
|
| --- a/chrome/browser/browsing_data/chrome_browsing_data_remover_delegate_unittest.cc
|
| +++ b/chrome/browser/browsing_data/chrome_browsing_data_remover_delegate_unittest.cc
|
| @@ -1565,6 +1565,49 @@ TEST_F(ChromeBrowsingDataRemoverDelegateTest,
|
| << host_settings[2].primary_pattern.ToString();
|
| }
|
|
|
| +TEST_F(ChromeBrowsingDataRemoverDelegateTest, RemoveAllContentSettings) {
|
| + auto* map = HostContentSettingsMapFactory::GetForProfile(GetProfile());
|
| + map->SetContentSettingDefaultScope(kOrigin1, kOrigin1,
|
| + CONTENT_SETTINGS_TYPE_GEOLOCATION, "",
|
| + CONTENT_SETTING_ALLOW);
|
| + map->SetContentSettingDefaultScope(kOrigin2, kOrigin2,
|
| + CONTENT_SETTINGS_TYPE_GEOLOCATION, "",
|
| + CONTENT_SETTING_ALLOW);
|
| +
|
| + // Clear all except for origin1 and origin3.
|
| + std::unique_ptr<BrowsingDataFilterBuilder> filter(
|
| + BrowsingDataFilterBuilder::Create(BrowsingDataFilterBuilder::BLACKLIST));
|
| + filter->AddRegisterableDomain(kTestRegisterableDomain1);
|
| + filter->AddRegisterableDomain(kTestRegisterableDomain3);
|
| + BlockUntilOriginDataRemoved(
|
| + AnHourAgo(), base::Time::Max(),
|
| + ChromeBrowsingDataRemoverDelegate::DATA_TYPE_CONTENT_SETTINGS,
|
| + std::move(filter));
|
| +
|
| + EXPECT_EQ(ChromeBrowsingDataRemoverDelegate::DATA_TYPE_CONTENT_SETTINGS,
|
| + GetRemovalMask());
|
| + EXPECT_EQ(BrowsingDataRemover::ORIGIN_TYPE_UNPROTECTED_WEB,
|
| + GetOriginTypeMask());
|
| +
|
| + // Verify we only have allow for the first origin.
|
| + ContentSettingsForOneType host_settings;
|
| + map->GetSettingsForOneType(CONTENT_SETTINGS_TYPE_GEOLOCATION, std::string(),
|
| + &host_settings);
|
| +
|
| + ASSERT_EQ(2u, host_settings.size());
|
| + // Only the first should should have a setting.
|
| + EXPECT_EQ(ContentSettingsPattern::FromURLNoWildcard(kOrigin1),
|
| + host_settings[0].primary_pattern)
|
| + << host_settings[0].primary_pattern.ToString();
|
| + EXPECT_EQ(CONTENT_SETTING_ALLOW, host_settings[0].setting);
|
| +
|
| + // And our wildcard.
|
| + EXPECT_EQ(ContentSettingsPattern::Wildcard(),
|
| + host_settings[1].primary_pattern)
|
| + << host_settings[1].primary_pattern.ToString();
|
| + EXPECT_EQ(CONTENT_SETTING_ASK, host_settings[1].setting);
|
| +}
|
| +
|
| TEST_F(ChromeBrowsingDataRemoverDelegateTest, RemoveDurablePermission) {
|
| // Add our settings.
|
| HostContentSettingsMap* host_content_settings_map =
|
|
|