| Index: chrome/browser/extensions/active_script_controller_browsertest.cc
|
| diff --git a/chrome/browser/extensions/active_script_controller_browsertest.cc b/chrome/browser/extensions/active_script_controller_browsertest.cc
|
| index 6234be632b03aae07a700e022288c18b34e73c83..ded056ec99fc611f79cd3a26fcb7844290301743 100644
|
| --- a/chrome/browser/extensions/active_script_controller_browsertest.cc
|
| +++ b/chrome/browser/extensions/active_script_controller_browsertest.cc
|
| @@ -16,6 +16,7 @@
|
| #include "chrome/browser/ui/tabs/tab_strip_model.h"
|
| #include "chrome/test/base/ui_test_utils.h"
|
| #include "extensions/common/feature_switch.h"
|
| +#include "extensions/common/switches.h"
|
| #include "net/test/embedded_test_server/embedded_test_server.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
|
|
| @@ -61,10 +62,9 @@ enum RequiresConsent {
|
|
|
| class ActiveScriptControllerBrowserTest : public ExtensionBrowserTest {
|
| public:
|
| - ActiveScriptControllerBrowserTest()
|
| - : feature_override_(FeatureSwitch::scripts_require_action(),
|
| - FeatureSwitch::OVERRIDE_ENABLED) {}
|
| + ActiveScriptControllerBrowserTest() {}
|
|
|
| + virtual void SetUpCommandLine(base::CommandLine* command_line) OVERRIDE;
|
| virtual void CleanUpOnMainThread() OVERRIDE;
|
|
|
| // Returns an extension with the given |host_type| and |injection_type|. If
|
| @@ -75,11 +75,18 @@ class ActiveScriptControllerBrowserTest : public ExtensionBrowserTest {
|
| InjectionType injection_type);
|
|
|
| private:
|
| - FeatureSwitch::ScopedOverride feature_override_;
|
| ScopedVector<TestExtensionDir> test_extension_dirs_;
|
| std::vector<const Extension*> extensions_;
|
| };
|
|
|
| +void ActiveScriptControllerBrowserTest::SetUpCommandLine(
|
| + base::CommandLine* command_line) {
|
| + // We append the actual switch to the commandline because it needs to be
|
| + // passed over to the renderer, which a FeatureSwitch::ScopedOverride will
|
| + // not do.
|
| + command_line->AppendSwitch(switches::kEnableScriptsRequireAction);
|
| +}
|
| +
|
| void ActiveScriptControllerBrowserTest::CleanUpOnMainThread() {
|
| test_extension_dirs_.clear();
|
| }
|
| @@ -266,10 +273,7 @@ testing::AssertionResult ActiveScriptTester::Verify() {
|
|
|
| // Otherwise, we don't have permission, and have to grant it. Ensure the
|
| // script has *not* already executed.
|
| - // Currently, it's okay for content scripts to execute, because we don't
|
| - // block them.
|
| - // TODO(rdevlin.cronin): Fix this.
|
| - if (inject_success_listener_->was_satisfied() && type_ != CONTENT_SCRIPT) {
|
| + if (inject_success_listener_->was_satisfied()) {
|
| return testing::AssertionFailure() <<
|
| name_ << "'s script ran without permission.";
|
| }
|
|
|