Index: chrome/browser/chrome_security_exploit_browsertest.cc |
diff --git a/chrome/browser/chrome_security_exploit_browsertest.cc b/chrome/browser/chrome_security_exploit_browsertest.cc |
index 35bb23f3a83daf1bef353c13146a5500cfcb72be..1069113e1fe5d7df0c844e20df2b74309dcb90aa 100644 |
--- a/chrome/browser/chrome_security_exploit_browsertest.cc |
+++ b/chrome/browser/chrome_security_exploit_browsertest.cc |
@@ -72,13 +72,6 @@ IN_PROC_BROWSER_TEST_F(ChromeSecurityExploitBrowserTest, |
// create a "blob:chrome-extension://" resource. |
IN_PROC_BROWSER_TEST_F(ChromeSecurityExploitBrowserTest, |
CreateBlobInExtensionOrigin) { |
- // This test relies on extensions documents running in extension processes, |
- // which is guaranteed with --isolate-extensions. Without it, the checks are |
- // not enforced and this test will time out waiting for the process to be |
- // killed. |
- if (!extensions::IsIsolateExtensionsEnabled()) |
- return; |
- |
ui_test_utils::NavigateToURL( |
browser(), |
embedded_test_server()->GetURL("a.root-servers.net", "/title1.html")); |
@@ -181,15 +174,9 @@ IN_PROC_BROWSER_TEST_F(ChromeSecurityExploitBrowserTest, |
EXPECT_TRUE(content::ExecuteScriptAndExtractString( |
rfh, "window.domAutomationController.send(document.body.innerText);", |
&body)); |
- if (extensions::IsIsolateExtensionsEnabled()) { |
- EXPECT_EQ( |
- "\nYour file was not found\n\n" |
- "It may have been moved or deleted.\n" |
- "ERR_FILE_NOT_FOUND\n", |
- body); |
- } else { |
- // Without --isolate-extensions, the above steps must succeed, since |
- // unblessed extension frames are allowed in ordinary renderer processes. |
- EXPECT_EQ("pwned.", body); |
- } |
+ EXPECT_EQ( |
+ "\nYour file was not found\n\n" |
+ "It may have been moved or deleted.\n" |
+ "ERR_FILE_NOT_FOUND\n", |
+ body); |
} |