| Index: chrome/browser/extensions/content_script_apitest.cc
|
| diff --git a/chrome/browser/extensions/content_script_apitest.cc b/chrome/browser/extensions/content_script_apitest.cc
|
| index 251ec774c9a5d3224354da4088e0333bdbb3ff8a..839c2f975572093fafc81f3947cf091541478e0a 100644
|
| --- a/chrome/browser/extensions/content_script_apitest.cc
|
| +++ b/chrome/browser/extensions/content_script_apitest.cc
|
| @@ -13,7 +13,9 @@
|
| #include "build/build_config.h"
|
| #include "chrome/browser/extensions/api/permissions/permissions_api.h"
|
| #include "chrome/browser/extensions/extension_apitest.h"
|
| +#include "chrome/browser/extensions/extension_management_test_util.h"
|
| #include "chrome/browser/extensions/extension_service.h"
|
| +#include "chrome/browser/extensions/extension_with_management_policy_apitest.h"
|
| #include "chrome/browser/extensions/test_extension_dir.h"
|
| #include "chrome/browser/ui/browser.h"
|
| #include "chrome/browser/ui/tabs/tab_strip_model.h"
|
| @@ -503,6 +505,18 @@ IN_PROC_BROWSER_TEST_P(ContentScriptApiTest,
|
| ASSERT_TRUE(RunExtensionTest("content_scripts/permissions")) << message_;
|
| }
|
|
|
| +IN_PROC_BROWSER_TEST_F(ExtensionApiTestWithManagementPolicy,
|
| + ContentScriptPolicy) {
|
| + // Set enterprise policy to block injection to policy specified host.
|
| + {
|
| + ExtensionManagementPolicyUpdater pref(&policy_provider_);
|
| + pref.AddRuntimeBlockedHost("*", "*://example.com/*");
|
| + }
|
| + host_resolver()->AddRule("*.com", "127.0.0.1");
|
| + ASSERT_TRUE(StartEmbeddedTestServer());
|
| + ASSERT_TRUE(RunExtensionTest("content_scripts/policy")) << message_;
|
| +}
|
| +
|
| IN_PROC_BROWSER_TEST_P(ContentScriptApiTest, ContentScriptBypassPageCSP) {
|
| ASSERT_TRUE(StartEmbeddedTestServer());
|
| ASSERT_TRUE(RunExtensionTest("content_scripts/bypass_page_csp")) << message_;
|
|
|