| Index: chrome/browser/chrome_security_exploit_browsertest.cc
|
| diff --git a/chrome/browser/chrome_security_exploit_browsertest.cc b/chrome/browser/chrome_security_exploit_browsertest.cc
|
| index 35bb23f3a83daf1bef353c13146a5500cfcb72be..1069113e1fe5d7df0c844e20df2b74309dcb90aa 100644
|
| --- a/chrome/browser/chrome_security_exploit_browsertest.cc
|
| +++ b/chrome/browser/chrome_security_exploit_browsertest.cc
|
| @@ -72,13 +72,6 @@ IN_PROC_BROWSER_TEST_F(ChromeSecurityExploitBrowserTest,
|
| // create a "blob:chrome-extension://" resource.
|
| IN_PROC_BROWSER_TEST_F(ChromeSecurityExploitBrowserTest,
|
| CreateBlobInExtensionOrigin) {
|
| - // This test relies on extensions documents running in extension processes,
|
| - // which is guaranteed with --isolate-extensions. Without it, the checks are
|
| - // not enforced and this test will time out waiting for the process to be
|
| - // killed.
|
| - if (!extensions::IsIsolateExtensionsEnabled())
|
| - return;
|
| -
|
| ui_test_utils::NavigateToURL(
|
| browser(),
|
| embedded_test_server()->GetURL("a.root-servers.net", "/title1.html"));
|
| @@ -181,15 +174,9 @@ IN_PROC_BROWSER_TEST_F(ChromeSecurityExploitBrowserTest,
|
| EXPECT_TRUE(content::ExecuteScriptAndExtractString(
|
| rfh, "window.domAutomationController.send(document.body.innerText);",
|
| &body));
|
| - if (extensions::IsIsolateExtensionsEnabled()) {
|
| - EXPECT_EQ(
|
| - "\nYour file was not found\n\n"
|
| - "It may have been moved or deleted.\n"
|
| - "ERR_FILE_NOT_FOUND\n",
|
| - body);
|
| - } else {
|
| - // Without --isolate-extensions, the above steps must succeed, since
|
| - // unblessed extension frames are allowed in ordinary renderer processes.
|
| - EXPECT_EQ("pwned.", body);
|
| - }
|
| + EXPECT_EQ(
|
| + "\nYour file was not found\n\n"
|
| + "It may have been moved or deleted.\n"
|
| + "ERR_FILE_NOT_FOUND\n",
|
| + body);
|
| }
|
|
|